Feb 13 04:55:47.548804 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 04:55:47.548817 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 04:55:47.548824 kernel: BIOS-provided physical RAM map: Feb 13 04:55:47.548827 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 04:55:47.548831 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 04:55:47.548835 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 04:55:47.548839 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 04:55:47.548843 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 04:55:47.548847 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000819cafff] usable Feb 13 04:55:47.548851 kernel: BIOS-e820: [mem 0x00000000819cb000-0x00000000819cbfff] ACPI NVS Feb 13 04:55:47.548855 kernel: BIOS-e820: [mem 0x00000000819cc000-0x00000000819ccfff] reserved Feb 13 04:55:47.548859 kernel: BIOS-e820: [mem 0x00000000819cd000-0x000000008afccfff] usable Feb 13 04:55:47.548863 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 04:55:47.548867 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 04:55:47.548872 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 04:55:47.548877 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 04:55:47.548881 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 04:55:47.548885 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 04:55:47.548889 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 04:55:47.548893 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 04:55:47.548897 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 04:55:47.548901 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 04:55:47.548905 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 04:55:47.548909 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 04:55:47.548913 kernel: NX (Execute Disable) protection: active Feb 13 04:55:47.548918 kernel: SMBIOS 3.2.1 present. Feb 13 04:55:47.548922 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 04:55:47.548927 kernel: tsc: Detected 3400.000 MHz processor Feb 13 04:55:47.548931 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 04:55:47.548935 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 04:55:47.548940 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 04:55:47.548944 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 04:55:47.548948 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 04:55:47.548953 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 04:55:47.548957 kernel: Using GB pages for direct mapping Feb 13 04:55:47.548961 kernel: ACPI: Early table checksum verification disabled Feb 13 04:55:47.548966 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 04:55:47.548970 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 04:55:47.548975 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 04:55:47.548979 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 04:55:47.548985 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 04:55:47.548990 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 04:55:47.548995 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 04:55:47.549000 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 04:55:47.549004 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 04:55:47.549009 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 04:55:47.549014 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 04:55:47.549018 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 04:55:47.549023 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 04:55:47.549027 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:55:47.549033 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 04:55:47.549037 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 04:55:47.549042 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:55:47.549047 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:55:47.549051 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 04:55:47.549056 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 04:55:47.549060 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:55:47.549065 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 04:55:47.549070 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 04:55:47.549075 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 04:55:47.549079 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 04:55:47.549084 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 04:55:47.549089 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 04:55:47.549093 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 04:55:47.549098 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 04:55:47.549102 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 04:55:47.549107 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 04:55:47.549112 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 04:55:47.549117 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 04:55:47.549121 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 04:55:47.549126 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 04:55:47.549131 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 04:55:47.549135 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 04:55:47.549140 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 04:55:47.549144 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 04:55:47.549150 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 04:55:47.549154 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 04:55:47.549159 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 04:55:47.549163 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 04:55:47.549168 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 04:55:47.549172 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 04:55:47.549177 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 04:55:47.549182 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 04:55:47.549186 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 04:55:47.549191 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 04:55:47.549196 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 04:55:47.549201 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 04:55:47.549205 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 04:55:47.549210 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 04:55:47.549214 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 04:55:47.549219 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 04:55:47.549223 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 04:55:47.549228 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 04:55:47.549233 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 04:55:47.549238 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 04:55:47.549242 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 04:55:47.549247 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 04:55:47.549251 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 04:55:47.549256 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 04:55:47.549261 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 04:55:47.549265 kernel: No NUMA configuration found Feb 13 04:55:47.549270 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 04:55:47.549275 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 04:55:47.549280 kernel: Zone ranges: Feb 13 04:55:47.549284 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 04:55:47.549289 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 04:55:47.549294 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 04:55:47.549298 kernel: Movable zone start for each node Feb 13 04:55:47.549303 kernel: Early memory node ranges Feb 13 04:55:47.549307 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 04:55:47.549312 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 04:55:47.549316 kernel: node 0: [mem 0x0000000040400000-0x00000000819cafff] Feb 13 04:55:47.549322 kernel: node 0: [mem 0x00000000819cd000-0x000000008afccfff] Feb 13 04:55:47.549327 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 04:55:47.549331 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 04:55:47.549336 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 04:55:47.549340 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 04:55:47.549345 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 04:55:47.549353 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 04:55:47.549359 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 04:55:47.549363 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 04:55:47.549368 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 04:55:47.549374 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 04:55:47.549379 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 04:55:47.549384 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 04:55:47.549389 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 04:55:47.549394 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 04:55:47.549399 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 04:55:47.549404 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 04:55:47.549410 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 04:55:47.549414 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 04:55:47.549419 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 04:55:47.549424 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 04:55:47.549429 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 04:55:47.549434 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 04:55:47.549441 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 04:55:47.549449 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 04:55:47.549454 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 04:55:47.549460 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 04:55:47.549465 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 04:55:47.549469 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 04:55:47.549474 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 04:55:47.549479 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 04:55:47.549484 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 04:55:47.549489 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 04:55:47.549494 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 04:55:47.549499 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 04:55:47.549505 kernel: TSC deadline timer available Feb 13 04:55:47.549510 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 04:55:47.549515 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 04:55:47.549520 kernel: Booting paravirtualized kernel on bare hardware Feb 13 04:55:47.549525 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 04:55:47.549530 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 04:55:47.549535 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 04:55:47.549540 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 04:55:47.549544 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 04:55:47.549550 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 04:55:47.549555 kernel: Policy zone: Normal Feb 13 04:55:47.549560 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 04:55:47.549565 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 04:55:47.549570 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 04:55:47.549575 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 04:55:47.549580 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 04:55:47.549586 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 04:55:47.549591 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 04:55:47.549596 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 04:55:47.549601 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 04:55:47.549606 kernel: rcu: Hierarchical RCU implementation. Feb 13 04:55:47.549611 kernel: rcu: RCU event tracing is enabled. Feb 13 04:55:47.549616 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 04:55:47.549621 kernel: Rude variant of Tasks RCU enabled. Feb 13 04:55:47.549626 kernel: Tracing variant of Tasks RCU enabled. Feb 13 04:55:47.549632 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 04:55:47.549637 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 04:55:47.549642 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 04:55:47.549647 kernel: random: crng init done Feb 13 04:55:47.549652 kernel: Console: colour dummy device 80x25 Feb 13 04:55:47.549657 kernel: printk: console [tty0] enabled Feb 13 04:55:47.549662 kernel: printk: console [ttyS1] enabled Feb 13 04:55:47.549667 kernel: ACPI: Core revision 20210730 Feb 13 04:55:47.549672 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 04:55:47.549677 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 04:55:47.549682 kernel: DMAR: Host address width 39 Feb 13 04:55:47.549687 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 04:55:47.549692 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 04:55:47.549697 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 04:55:47.549702 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 04:55:47.549707 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 04:55:47.549712 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 04:55:47.549717 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 04:55:47.549722 kernel: x2apic enabled Feb 13 04:55:47.549728 kernel: Switched APIC routing to cluster x2apic. Feb 13 04:55:47.549733 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 04:55:47.549738 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 04:55:47.549743 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 04:55:47.549748 kernel: process: using mwait in idle threads Feb 13 04:55:47.549752 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 04:55:47.549757 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 04:55:47.549762 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 04:55:47.549767 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 04:55:47.549773 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 04:55:47.549778 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 04:55:47.549783 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 04:55:47.549788 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 04:55:47.549792 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 04:55:47.549797 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 04:55:47.549802 kernel: TAA: Mitigation: TSX disabled Feb 13 04:55:47.549807 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 04:55:47.549812 kernel: SRBDS: Mitigation: Microcode Feb 13 04:55:47.549817 kernel: GDS: Vulnerable: No microcode Feb 13 04:55:47.549822 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 04:55:47.549827 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 04:55:47.549832 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 04:55:47.549837 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 04:55:47.549842 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 04:55:47.549847 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 04:55:47.549851 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 04:55:47.549856 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 04:55:47.549861 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 04:55:47.549866 kernel: Freeing SMP alternatives memory: 32K Feb 13 04:55:47.549871 kernel: pid_max: default: 32768 minimum: 301 Feb 13 04:55:47.549876 kernel: LSM: Security Framework initializing Feb 13 04:55:47.549881 kernel: SELinux: Initializing. Feb 13 04:55:47.549886 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 04:55:47.549891 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 04:55:47.549896 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 04:55:47.549901 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 04:55:47.549906 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 04:55:47.549911 kernel: ... version: 4 Feb 13 04:55:47.549916 kernel: ... bit width: 48 Feb 13 04:55:47.549921 kernel: ... generic registers: 4 Feb 13 04:55:47.549926 kernel: ... value mask: 0000ffffffffffff Feb 13 04:55:47.549931 kernel: ... max period: 00007fffffffffff Feb 13 04:55:47.549936 kernel: ... fixed-purpose events: 3 Feb 13 04:55:47.549941 kernel: ... event mask: 000000070000000f Feb 13 04:55:47.549946 kernel: signal: max sigframe size: 2032 Feb 13 04:55:47.549951 kernel: rcu: Hierarchical SRCU implementation. Feb 13 04:55:47.549956 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 04:55:47.549961 kernel: smp: Bringing up secondary CPUs ... Feb 13 04:55:47.549966 kernel: x86: Booting SMP configuration: Feb 13 04:55:47.549971 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 04:55:47.549976 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 04:55:47.549981 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 04:55:47.549986 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 04:55:47.549991 kernel: smpboot: Max logical packages: 1 Feb 13 04:55:47.549996 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 04:55:47.550001 kernel: devtmpfs: initialized Feb 13 04:55:47.550006 kernel: x86/mm: Memory block size: 128MB Feb 13 04:55:47.550011 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x819cb000-0x819cbfff] (4096 bytes) Feb 13 04:55:47.550016 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 04:55:47.550022 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 04:55:47.550027 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 04:55:47.550031 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 04:55:47.550036 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 04:55:47.550041 kernel: audit: initializing netlink subsys (disabled) Feb 13 04:55:47.550046 kernel: audit: type=2000 audit(1707800142.040:1): state=initialized audit_enabled=0 res=1 Feb 13 04:55:47.550051 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 04:55:47.550056 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 04:55:47.550061 kernel: cpuidle: using governor menu Feb 13 04:55:47.550067 kernel: ACPI: bus type PCI registered Feb 13 04:55:47.550072 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 04:55:47.550077 kernel: dca service started, version 1.12.1 Feb 13 04:55:47.550081 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 04:55:47.550086 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 04:55:47.550091 kernel: PCI: Using configuration type 1 for base access Feb 13 04:55:47.550096 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 04:55:47.550101 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 04:55:47.550106 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 04:55:47.550112 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 04:55:47.550117 kernel: ACPI: Added _OSI(Module Device) Feb 13 04:55:47.550122 kernel: ACPI: Added _OSI(Processor Device) Feb 13 04:55:47.550127 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 04:55:47.550132 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 04:55:47.550137 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 04:55:47.550142 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 04:55:47.550146 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 04:55:47.550151 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 04:55:47.550157 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:55:47.550162 kernel: ACPI: SSDT 0xFFFF938640213C00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 04:55:47.550167 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 04:55:47.550172 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:55:47.550177 kernel: ACPI: SSDT 0xFFFF938641AE7C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 04:55:47.550182 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:55:47.550187 kernel: ACPI: SSDT 0xFFFF938641A58000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 04:55:47.550191 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:55:47.550196 kernel: ACPI: SSDT 0xFFFF938641A5B000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 04:55:47.550201 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:55:47.550207 kernel: ACPI: SSDT 0xFFFF93864014C000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 04:55:47.550212 kernel: ACPI: Dynamic OEM Table Load: Feb 13 04:55:47.550216 kernel: ACPI: SSDT 0xFFFF938641AE1400 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 04:55:47.550221 kernel: ACPI: Interpreter enabled Feb 13 04:55:47.550226 kernel: ACPI: PM: (supports S0 S5) Feb 13 04:55:47.550231 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 04:55:47.550236 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 04:55:47.550241 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 04:55:47.550246 kernel: HEST: Table parsing has been initialized. Feb 13 04:55:47.550252 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 04:55:47.550257 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 04:55:47.550262 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 04:55:47.550266 kernel: ACPI: PM: Power Resource [USBC] Feb 13 04:55:47.550271 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 04:55:47.550276 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 04:55:47.550281 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 04:55:47.550286 kernel: ACPI: PM: Power Resource [WRST] Feb 13 04:55:47.550291 kernel: ACPI: PM: Power Resource [FN00] Feb 13 04:55:47.550296 kernel: ACPI: PM: Power Resource [FN01] Feb 13 04:55:47.550301 kernel: ACPI: PM: Power Resource [FN02] Feb 13 04:55:47.550306 kernel: ACPI: PM: Power Resource [FN03] Feb 13 04:55:47.550311 kernel: ACPI: PM: Power Resource [FN04] Feb 13 04:55:47.550316 kernel: ACPI: PM: Power Resource [PIN] Feb 13 04:55:47.550321 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 04:55:47.550383 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 04:55:47.550428 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 04:55:47.550476 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 04:55:47.550484 kernel: PCI host bridge to bus 0000:00 Feb 13 04:55:47.550526 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 04:55:47.550563 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 04:55:47.550600 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 04:55:47.550636 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 04:55:47.550671 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 04:55:47.550709 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 04:55:47.550760 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 04:55:47.550810 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 04:55:47.550854 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.550899 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 04:55:47.550940 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 04:55:47.550987 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 04:55:47.551029 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 04:55:47.551074 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 04:55:47.551117 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 04:55:47.551159 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 04:55:47.551204 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 04:55:47.551246 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 04:55:47.551287 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 04:55:47.551330 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 04:55:47.551371 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 04:55:47.551419 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 04:55:47.551467 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 04:55:47.551516 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 04:55:47.551556 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 04:55:47.551598 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 04:55:47.551641 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 04:55:47.551682 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 04:55:47.551723 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 04:55:47.551766 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 04:55:47.551809 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 04:55:47.551849 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 04:55:47.551893 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 04:55:47.551933 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 04:55:47.551974 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 04:55:47.552013 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 04:55:47.552053 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 04:55:47.552100 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 04:55:47.552142 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 04:55:47.552183 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 04:55:47.552227 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 04:55:47.552269 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.552314 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 04:55:47.552355 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.552404 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 04:55:47.552448 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.552495 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 04:55:47.552536 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.552582 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 04:55:47.552625 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.552670 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 04:55:47.552711 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 04:55:47.552756 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 04:55:47.552803 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 04:55:47.552845 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 04:55:47.552887 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 04:55:47.552933 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 04:55:47.552975 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 04:55:47.553021 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 04:55:47.553066 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 04:55:47.553108 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 04:55:47.553150 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 04:55:47.553193 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 04:55:47.553234 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 04:55:47.553282 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 04:55:47.553324 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 04:55:47.553368 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 04:55:47.553410 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 04:55:47.553455 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 04:55:47.553497 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 04:55:47.553539 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 04:55:47.553582 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 04:55:47.553623 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 04:55:47.553667 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 04:55:47.553714 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 04:55:47.553758 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 04:55:47.553801 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 04:55:47.553843 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 04:55:47.553885 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.553926 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 04:55:47.553967 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 04:55:47.554011 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 04:55:47.554056 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 04:55:47.554100 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 04:55:47.554142 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 04:55:47.554216 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 04:55:47.554299 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 04:55:47.554340 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 04:55:47.554382 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 04:55:47.554424 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 04:55:47.554472 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 04:55:47.554520 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 04:55:47.554563 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 04:55:47.554605 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 04:55:47.554649 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 04:55:47.554690 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 04:55:47.554732 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 04:55:47.554775 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:55:47.554821 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 04:55:47.554870 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 04:55:47.554915 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 04:55:47.554960 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 04:55:47.555004 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 04:55:47.555049 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 04:55:47.555095 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 04:55:47.555141 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 04:55:47.555183 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 04:55:47.555225 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 04:55:47.555267 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:55:47.555275 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 04:55:47.555280 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 04:55:47.555287 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 04:55:47.555292 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 04:55:47.555297 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 04:55:47.555303 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 04:55:47.555308 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 04:55:47.555313 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 04:55:47.555318 kernel: iommu: Default domain type: Translated Feb 13 04:55:47.555324 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 04:55:47.555367 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 04:55:47.555412 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 04:55:47.555464 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 04:55:47.555472 kernel: vgaarb: loaded Feb 13 04:55:47.555478 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 04:55:47.555484 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 04:55:47.555489 kernel: PTP clock support registered Feb 13 04:55:47.555494 kernel: PCI: Using ACPI for IRQ routing Feb 13 04:55:47.555499 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 04:55:47.555505 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 04:55:47.555511 kernel: e820: reserve RAM buffer [mem 0x819cb000-0x83ffffff] Feb 13 04:55:47.555516 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 04:55:47.555521 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 04:55:47.555526 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 04:55:47.555531 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 04:55:47.555537 kernel: clocksource: Switched to clocksource tsc-early Feb 13 04:55:47.555542 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 04:55:47.555547 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 04:55:47.555553 kernel: pnp: PnP ACPI init Feb 13 04:55:47.555596 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 04:55:47.555639 kernel: pnp 00:02: [dma 0 disabled] Feb 13 04:55:47.555679 kernel: pnp 00:03: [dma 0 disabled] Feb 13 04:55:47.555721 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 04:55:47.555758 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 04:55:47.555798 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 04:55:47.555841 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 04:55:47.555878 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 04:55:47.555916 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 04:55:47.555953 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 04:55:47.555990 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 04:55:47.556026 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 04:55:47.556062 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 04:55:47.556101 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 04:55:47.556141 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 04:55:47.556178 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 04:55:47.556215 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 04:55:47.556252 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 04:55:47.556287 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 04:55:47.556325 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 04:55:47.556363 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 04:55:47.556403 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 04:55:47.556411 kernel: pnp: PnP ACPI: found 10 devices Feb 13 04:55:47.556416 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 04:55:47.556422 kernel: NET: Registered PF_INET protocol family Feb 13 04:55:47.556427 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 04:55:47.556432 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 04:55:47.556442 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 04:55:47.556449 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 04:55:47.556454 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 04:55:47.556459 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 04:55:47.556465 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 04:55:47.556470 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 04:55:47.556475 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 04:55:47.556481 kernel: NET: Registered PF_XDP protocol family Feb 13 04:55:47.556525 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 04:55:47.556568 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 04:55:47.556610 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 04:55:47.556652 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 04:55:47.556696 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 04:55:47.556739 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 04:55:47.556781 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 04:55:47.556822 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 04:55:47.556863 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 04:55:47.556906 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 04:55:47.556947 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 04:55:47.556989 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 04:55:47.557030 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 04:55:47.557071 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 04:55:47.557114 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 04:55:47.557155 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 04:55:47.557196 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 04:55:47.557236 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 04:55:47.557279 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 04:55:47.557322 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 04:55:47.557365 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:55:47.557406 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 04:55:47.557454 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 04:55:47.557497 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 04:55:47.557536 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 04:55:47.557573 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 04:55:47.557608 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 04:55:47.557645 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 04:55:47.557680 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 04:55:47.557717 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 04:55:47.557758 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 04:55:47.557799 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 04:55:47.557843 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 04:55:47.557881 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 04:55:47.557923 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 04:55:47.557961 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 04:55:47.558004 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 04:55:47.558044 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 04:55:47.558084 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 04:55:47.558124 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 04:55:47.558132 kernel: PCI: CLS 64 bytes, default 64 Feb 13 04:55:47.558137 kernel: DMAR: No ATSR found Feb 13 04:55:47.558143 kernel: DMAR: No SATC found Feb 13 04:55:47.558148 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 04:55:47.558190 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 04:55:47.558233 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 04:55:47.558275 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 04:55:47.558316 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 04:55:47.558357 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 04:55:47.558398 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 04:55:47.558441 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 04:55:47.558485 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 04:55:47.558529 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 04:55:47.558569 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 04:55:47.558610 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 04:55:47.558650 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 04:55:47.558691 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 04:55:47.558731 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 04:55:47.558772 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 04:55:47.558813 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 04:55:47.558853 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 04:55:47.558896 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 04:55:47.558937 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 04:55:47.558978 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 04:55:47.559018 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 04:55:47.559061 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 04:55:47.559104 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 04:55:47.559146 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 04:55:47.559189 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 04:55:47.559233 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 04:55:47.559277 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 04:55:47.559285 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 04:55:47.559291 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 04:55:47.559296 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 04:55:47.559302 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 04:55:47.559307 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 04:55:47.559312 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 04:55:47.559319 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 04:55:47.559362 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 04:55:47.559370 kernel: Initialise system trusted keyrings Feb 13 04:55:47.559376 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 04:55:47.559381 kernel: Key type asymmetric registered Feb 13 04:55:47.559386 kernel: Asymmetric key parser 'x509' registered Feb 13 04:55:47.559391 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 04:55:47.559396 kernel: io scheduler mq-deadline registered Feb 13 04:55:47.559403 kernel: io scheduler kyber registered Feb 13 04:55:47.559408 kernel: io scheduler bfq registered Feb 13 04:55:47.559458 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 04:55:47.559501 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 04:55:47.559543 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 04:55:47.559584 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 04:55:47.559626 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 04:55:47.559667 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 04:55:47.559715 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 04:55:47.559723 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 04:55:47.559729 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 04:55:47.559734 kernel: pstore: Registered erst as persistent store backend Feb 13 04:55:47.559739 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 04:55:47.559745 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 04:55:47.559750 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 04:55:47.559755 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 04:55:47.559762 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 04:55:47.559805 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 04:55:47.559813 kernel: i8042: PNP: No PS/2 controller found. Feb 13 04:55:47.559850 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 04:55:47.559889 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 04:55:47.559926 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T04:55:46 UTC (1707800146) Feb 13 04:55:47.559964 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 04:55:47.559972 kernel: fail to initialize ptp_kvm Feb 13 04:55:47.559978 kernel: intel_pstate: Intel P-state driver initializing Feb 13 04:55:47.559984 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 04:55:47.559989 kernel: intel_pstate: HWP enabled Feb 13 04:55:47.559994 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 04:55:47.559999 kernel: vesafb: scrolling: redraw Feb 13 04:55:47.560005 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 04:55:47.560010 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000007f751df3, using 768k, total 768k Feb 13 04:55:47.560015 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 04:55:47.560021 kernel: fb0: VESA VGA frame buffer device Feb 13 04:55:47.560027 kernel: NET: Registered PF_INET6 protocol family Feb 13 04:55:47.560032 kernel: Segment Routing with IPv6 Feb 13 04:55:47.560037 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 04:55:47.560042 kernel: NET: Registered PF_PACKET protocol family Feb 13 04:55:47.560048 kernel: Key type dns_resolver registered Feb 13 04:55:47.560053 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 04:55:47.560058 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 04:55:47.560063 kernel: IPI shorthand broadcast: enabled Feb 13 04:55:47.560069 kernel: sched_clock: Marking stable (1680548461, 1339831163)->(4438881846, -1418502222) Feb 13 04:55:47.560075 kernel: registered taskstats version 1 Feb 13 04:55:47.560080 kernel: Loading compiled-in X.509 certificates Feb 13 04:55:47.560085 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 04:55:47.560090 kernel: Key type .fscrypt registered Feb 13 04:55:47.560096 kernel: Key type fscrypt-provisioning registered Feb 13 04:55:47.560101 kernel: pstore: Using crash dump compression: deflate Feb 13 04:55:47.560106 kernel: ima: Allocated hash algorithm: sha1 Feb 13 04:55:47.560111 kernel: ima: No architecture policies found Feb 13 04:55:47.560118 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 04:55:47.560123 kernel: Write protecting the kernel read-only data: 28672k Feb 13 04:55:47.560128 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 04:55:47.560134 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 04:55:47.560139 kernel: Run /init as init process Feb 13 04:55:47.560144 kernel: with arguments: Feb 13 04:55:47.560149 kernel: /init Feb 13 04:55:47.560154 kernel: with environment: Feb 13 04:55:47.560159 kernel: HOME=/ Feb 13 04:55:47.560165 kernel: TERM=linux Feb 13 04:55:47.560171 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 04:55:47.560177 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 04:55:47.560183 systemd[1]: Detected architecture x86-64. Feb 13 04:55:47.560189 systemd[1]: Running in initrd. Feb 13 04:55:47.560194 systemd[1]: No hostname configured, using default hostname. Feb 13 04:55:47.560199 systemd[1]: Hostname set to . Feb 13 04:55:47.560205 systemd[1]: Initializing machine ID from random generator. Feb 13 04:55:47.560211 systemd[1]: Queued start job for default target initrd.target. Feb 13 04:55:47.560217 systemd[1]: Started systemd-ask-password-console.path. Feb 13 04:55:47.560222 systemd[1]: Reached target cryptsetup.target. Feb 13 04:55:47.560227 systemd[1]: Reached target paths.target. Feb 13 04:55:47.560232 systemd[1]: Reached target slices.target. Feb 13 04:55:47.560238 systemd[1]: Reached target swap.target. Feb 13 04:55:47.560243 systemd[1]: Reached target timers.target. Feb 13 04:55:47.560248 systemd[1]: Listening on iscsid.socket. Feb 13 04:55:47.560255 systemd[1]: Listening on iscsiuio.socket. Feb 13 04:55:47.560260 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 04:55:47.560266 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 04:55:47.560271 systemd[1]: Listening on systemd-journald.socket. Feb 13 04:55:47.560277 kernel: tsc: Refined TSC clocksource calibration: 3407.998 MHz Feb 13 04:55:47.560282 systemd[1]: Listening on systemd-networkd.socket. Feb 13 04:55:47.560287 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd208cfc, max_idle_ns: 440795283699 ns Feb 13 04:55:47.560293 kernel: clocksource: Switched to clocksource tsc Feb 13 04:55:47.560299 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 04:55:47.560304 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 04:55:47.560310 systemd[1]: Reached target sockets.target. Feb 13 04:55:47.560315 systemd[1]: Starting kmod-static-nodes.service... Feb 13 04:55:47.560320 systemd[1]: Finished network-cleanup.service. Feb 13 04:55:47.560326 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 04:55:47.560331 systemd[1]: Starting systemd-journald.service... Feb 13 04:55:47.560336 systemd[1]: Starting systemd-modules-load.service... Feb 13 04:55:47.560344 systemd-journald[267]: Journal started Feb 13 04:55:47.560369 systemd-journald[267]: Runtime Journal (/run/log/journal/9961f5e1fb81420797149b3a436d57e5) is 8.0M, max 640.1M, 632.1M free. Feb 13 04:55:47.562989 systemd-modules-load[268]: Inserted module 'overlay' Feb 13 04:55:47.569000 audit: BPF prog-id=6 op=LOAD Feb 13 04:55:47.587560 kernel: audit: type=1334 audit(1707800147.569:2): prog-id=6 op=LOAD Feb 13 04:55:47.587574 systemd[1]: Starting systemd-resolved.service... Feb 13 04:55:47.636477 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 04:55:47.636492 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 04:55:47.666465 kernel: Bridge firewalling registered Feb 13 04:55:47.666484 systemd[1]: Started systemd-journald.service. Feb 13 04:55:47.681386 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 13 04:55:47.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.687283 systemd-resolved[270]: Positive Trust Anchors: Feb 13 04:55:47.786641 kernel: audit: type=1130 audit(1707800147.689:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.786652 kernel: SCSI subsystem initialized Feb 13 04:55:47.786659 kernel: audit: type=1130 audit(1707800147.741:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.687289 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 04:55:47.908522 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 04:55:47.908537 kernel: audit: type=1130 audit(1707800147.813:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.908545 kernel: device-mapper: uevent: version 1.0.3 Feb 13 04:55:47.908551 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 04:55:47.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.687309 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 04:55:47.982689 kernel: audit: type=1130 audit(1707800147.916:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.688854 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 13 04:55:47.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.689651 systemd[1]: Started systemd-resolved.service. Feb 13 04:55:48.090884 kernel: audit: type=1130 audit(1707800147.991:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.090970 kernel: audit: type=1130 audit(1707800148.044:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:47.741614 systemd[1]: Finished kmod-static-nodes.service. Feb 13 04:55:47.813607 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 04:55:47.909725 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 13 04:55:47.916734 systemd[1]: Finished systemd-modules-load.service. Feb 13 04:55:47.991795 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 04:55:48.044733 systemd[1]: Reached target nss-lookup.target. Feb 13 04:55:48.100022 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 04:55:48.120940 systemd[1]: Starting systemd-sysctl.service... Feb 13 04:55:48.121226 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 04:55:48.124144 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 04:55:48.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.124863 systemd[1]: Finished systemd-sysctl.service. Feb 13 04:55:48.174651 kernel: audit: type=1130 audit(1707800148.123:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.186777 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 04:55:48.252480 kernel: audit: type=1130 audit(1707800148.186:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.244046 systemd[1]: Starting dracut-cmdline.service... Feb 13 04:55:48.267538 dracut-cmdline[292]: dracut-dracut-053 Feb 13 04:55:48.267538 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 04:55:48.267538 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 04:55:48.334532 kernel: Loading iSCSI transport class v2.0-870. Feb 13 04:55:48.334545 kernel: iscsi: registered transport (tcp) Feb 13 04:55:48.365445 kernel: iscsi: registered transport (qla4xxx) Feb 13 04:55:48.365466 kernel: QLogic iSCSI HBA Driver Feb 13 04:55:48.399950 systemd[1]: Finished dracut-cmdline.service. Feb 13 04:55:48.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:48.410231 systemd[1]: Starting dracut-pre-udev.service... Feb 13 04:55:48.467513 kernel: raid6: avx2x4 gen() 42187 MB/s Feb 13 04:55:48.503516 kernel: raid6: avx2x4 xor() 21325 MB/s Feb 13 04:55:48.538473 kernel: raid6: avx2x2 gen() 52438 MB/s Feb 13 04:55:48.573510 kernel: raid6: avx2x2 xor() 32009 MB/s Feb 13 04:55:48.608474 kernel: raid6: avx2x1 gen() 45117 MB/s Feb 13 04:55:48.643513 kernel: raid6: avx2x1 xor() 27807 MB/s Feb 13 04:55:48.677513 kernel: raid6: sse2x4 gen() 21276 MB/s Feb 13 04:55:48.711514 kernel: raid6: sse2x4 xor() 11939 MB/s Feb 13 04:55:48.745509 kernel: raid6: sse2x2 gen() 21578 MB/s Feb 13 04:55:48.779514 kernel: raid6: sse2x2 xor() 13395 MB/s Feb 13 04:55:48.813473 kernel: raid6: sse2x1 gen() 18234 MB/s Feb 13 04:55:48.865243 kernel: raid6: sse2x1 xor() 8893 MB/s Feb 13 04:55:48.865258 kernel: raid6: using algorithm avx2x2 gen() 52438 MB/s Feb 13 04:55:48.865266 kernel: raid6: .... xor() 32009 MB/s, rmw enabled Feb 13 04:55:48.883421 kernel: raid6: using avx2x2 recovery algorithm Feb 13 04:55:48.929470 kernel: xor: automatically using best checksumming function avx Feb 13 04:55:49.008472 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 04:55:49.013564 systemd[1]: Finished dracut-pre-udev.service. Feb 13 04:55:49.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:49.021000 audit: BPF prog-id=7 op=LOAD Feb 13 04:55:49.021000 audit: BPF prog-id=8 op=LOAD Feb 13 04:55:49.022432 systemd[1]: Starting systemd-udevd.service... Feb 13 04:55:49.030174 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 13 04:55:49.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:49.036666 systemd[1]: Started systemd-udevd.service. Feb 13 04:55:49.076585 dracut-pre-trigger[488]: rd.md=0: removing MD RAID activation Feb 13 04:55:49.053056 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 04:55:49.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:49.078077 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 04:55:49.093321 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 04:55:49.169436 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 04:55:49.196574 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 04:55:49.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:49.199446 kernel: libata version 3.00 loaded. Feb 13 04:55:49.199466 kernel: ACPI: bus type USB registered Feb 13 04:55:49.233836 kernel: usbcore: registered new interface driver usbfs Feb 13 04:55:49.233865 kernel: usbcore: registered new interface driver hub Feb 13 04:55:49.251652 kernel: usbcore: registered new device driver usb Feb 13 04:55:49.292450 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 04:55:49.292495 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 04:55:49.310446 kernel: AES CTR mode by8 optimization enabled Feb 13 04:55:49.310468 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 04:55:49.350775 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 04:55:49.351470 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Feb 13 04:55:49.388792 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 04:55:49.388894 kernel: scsi host0: ahci Feb 13 04:55:49.403519 kernel: scsi host1: ahci Feb 13 04:55:49.419476 kernel: scsi host2: ahci Feb 13 04:55:49.419499 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 04:55:49.419507 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 04:55:49.419571 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 04:55:49.420480 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 04:55:49.421483 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 04:55:49.421555 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 04:55:49.421608 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 04:55:49.421656 kernel: hub 1-0:1.0: USB hub found Feb 13 04:55:49.421717 kernel: hub 1-0:1.0: 16 ports detected Feb 13 04:55:49.422475 kernel: hub 2-0:1.0: USB hub found Feb 13 04:55:49.422553 kernel: hub 2-0:1.0: 10 ports detected Feb 13 04:55:49.422609 kernel: usb: port power management may be unreliable Feb 13 04:55:49.446307 kernel: scsi host3: ahci Feb 13 04:55:49.446330 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 04:55:49.498249 kernel: pps pps0: new PPS source ptp0 Feb 13 04:55:49.498320 kernel: scsi host4: ahci Feb 13 04:55:49.498335 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 04:55:49.513455 kernel: scsi host5: ahci Feb 13 04:55:49.544811 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 04:55:49.556886 kernel: scsi host6: ahci Feb 13 04:55:49.556908 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:31:6c Feb 13 04:55:49.580213 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 13 04:55:49.591500 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 04:55:49.591672 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 13 04:55:49.613217 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 04:55:49.613394 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 13 04:55:49.665445 kernel: pps pps1: new PPS source ptp1 Feb 13 04:55:49.665529 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 04:55:49.670448 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 13 04:55:49.670469 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 04:55:49.684444 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 04:55:49.684522 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 04:55:49.706101 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 13 04:55:49.721452 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 04:55:49.721617 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 13 04:55:49.750274 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:31:6d Feb 13 04:55:49.750448 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 13 04:55:49.783488 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 04:55:49.830398 kernel: hub 1-14:1.0: USB hub found Feb 13 04:55:49.830621 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 04:55:49.846432 kernel: hub 1-14:1.0: 4 ports detected Feb 13 04:55:49.929518 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 04:55:50.094372 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Feb 13 04:55:50.094477 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 04:55:50.094582 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 04:55:50.110444 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 04:55:50.126469 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 04:55:50.142487 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 04:55:50.174449 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 04:55:50.174467 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 04:55:50.190443 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 04:55:50.206445 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 04:55:50.223443 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 04:55:50.223464 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 04:55:50.292726 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 04:55:50.292742 kernel: ata2.00: Features: NCQ-prio Feb 13 04:55:50.292750 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 04:55:50.324562 kernel: ata1.00: Features: NCQ-prio Feb 13 04:55:50.344476 kernel: ata2.00: configured for UDMA/133 Feb 13 04:55:50.344532 kernel: ata1.00: configured for UDMA/133 Feb 13 04:55:50.344545 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 04:55:50.394486 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 04:55:50.394535 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 04:55:50.413446 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 04:55:50.451498 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 04:55:50.451573 kernel: port_module: 9 callbacks suppressed Feb 13 04:55:50.451582 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 04:55:50.519307 kernel: usbcore: registered new interface driver usbhid Feb 13 04:55:50.519326 kernel: usbhid: USB HID core driver Feb 13 04:55:50.555489 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 04:55:50.555506 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 04:55:50.571498 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:55:50.587121 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 04:55:50.602653 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 04:55:50.602732 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 04:55:50.607501 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 04:55:50.607582 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 04:55:50.607590 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 04:55:50.623444 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 04:55:50.623518 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 04:55:50.639065 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 04:55:50.672283 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 04:55:50.706194 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 04:55:50.757234 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 04:55:50.757308 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 04:55:50.777096 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 04:55:50.793834 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 04:55:50.866750 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:55:50.866769 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 04:55:50.882495 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 04:55:50.935095 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 04:55:50.935109 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 04:55:50.951511 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 04:55:50.985335 kernel: GPT:9289727 != 937703087 Feb 13 04:55:50.985351 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 04:55:51.002957 kernel: GPT:9289727 != 937703087 Feb 13 04:55:51.018046 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 04:55:51.034659 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 04:55:51.067339 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:55:51.067350 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 04:55:51.103481 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 13 04:55:51.114018 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 04:55:51.164501 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 13 04:55:51.164582 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (538) Feb 13 04:55:51.148398 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 04:55:51.177425 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 04:55:51.211032 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 04:55:51.225704 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 04:55:51.243462 systemd[1]: Starting disk-uuid.service... Feb 13 04:55:51.285605 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:55:51.285653 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 04:55:51.285835 disk-uuid[691]: Primary Header is updated. Feb 13 04:55:51.285835 disk-uuid[691]: Secondary Entries is updated. Feb 13 04:55:51.285835 disk-uuid[691]: Secondary Header is updated. Feb 13 04:55:51.342648 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:55:51.342672 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 04:55:52.315143 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 04:55:52.333318 disk-uuid[692]: The operation has completed successfully. Feb 13 04:55:52.341555 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 04:55:52.372163 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 04:55:52.469152 kernel: audit: type=1130 audit(1707800152.380:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.469166 kernel: audit: type=1131 audit(1707800152.380:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.372220 systemd[1]: Finished disk-uuid.service. Feb 13 04:55:52.498537 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 04:55:52.381212 systemd[1]: Starting verity-setup.service... Feb 13 04:55:52.557148 systemd[1]: Found device dev-mapper-usr.device. Feb 13 04:55:52.567524 systemd[1]: Mounting sysusr-usr.mount... Feb 13 04:55:52.580665 systemd[1]: Finished verity-setup.service. Feb 13 04:55:52.656239 kernel: audit: type=1130 audit(1707800152.596:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.656254 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 04:55:52.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.669010 systemd[1]: Mounted sysusr-usr.mount. Feb 13 04:55:52.675743 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 04:55:52.768693 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 04:55:52.768708 kernel: BTRFS info (device sdb6): using free space tree Feb 13 04:55:52.768719 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 04:55:52.768726 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 04:55:52.676122 systemd[1]: Starting ignition-setup.service... Feb 13 04:55:52.697126 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 04:55:52.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.777883 systemd[1]: Finished ignition-setup.service. Feb 13 04:55:52.893724 kernel: audit: type=1130 audit(1707800152.793:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.893739 kernel: audit: type=1130 audit(1707800152.847:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.793786 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 04:55:52.923409 kernel: audit: type=1334 audit(1707800152.902:24): prog-id=9 op=LOAD Feb 13 04:55:52.902000 audit: BPF prog-id=9 op=LOAD Feb 13 04:55:52.848121 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 04:55:52.904287 systemd[1]: Starting systemd-networkd.service... Feb 13 04:55:52.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.977153 ignition[866]: Ignition 2.14.0 Feb 13 04:55:53.006524 kernel: audit: type=1130 audit(1707800152.946:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.937548 systemd-networkd[873]: lo: Link UP Feb 13 04:55:52.977157 ignition[866]: Stage: fetch-offline Feb 13 04:55:53.068567 kernel: audit: type=1130 audit(1707800153.021:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:53.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.937550 systemd-networkd[873]: lo: Gained carrier Feb 13 04:55:53.143849 kernel: audit: type=1130 audit(1707800153.076:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:53.143939 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 04:55:53.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.977183 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 04:55:53.166974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 13 04:55:52.937830 systemd-networkd[873]: Enumeration completed Feb 13 04:55:52.977196 ignition[866]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 04:55:52.937867 systemd[1]: Started systemd-networkd.service. Feb 13 04:55:53.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.979902 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 04:55:53.220545 iscsid[907]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 04:55:53.220545 iscsid[907]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 04:55:53.220545 iscsid[907]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 04:55:53.220545 iscsid[907]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 04:55:53.220545 iscsid[907]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 04:55:53.220545 iscsid[907]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 04:55:53.220545 iscsid[907]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 04:55:53.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:53.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:52.938556 systemd-networkd[873]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 04:55:53.397607 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 04:55:52.979964 ignition[866]: parsed url from cmdline: "" Feb 13 04:55:52.947680 systemd[1]: Reached target network.target. Feb 13 04:55:52.979966 ignition[866]: no config URL provided Feb 13 04:55:53.002036 systemd[1]: Starting iscsiuio.service... Feb 13 04:55:52.979968 ignition[866]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 04:55:53.005904 unknown[866]: fetched base config from "system" Feb 13 04:55:52.984293 ignition[866]: parsing config with SHA512: 08df8560cc3a0c90aa52e9962559714317cf7c5bd62203e22f31d6207d6734fe1ece5b263f34427e5804f23a985a8769ba346c3752fc75b6bf877d54852d6039 Feb 13 04:55:53.005908 unknown[866]: fetched user config from "system" Feb 13 04:55:53.006248 ignition[866]: fetch-offline: fetch-offline passed Feb 13 04:55:53.014776 systemd[1]: Started iscsiuio.service. Feb 13 04:55:53.006251 ignition[866]: POST message to Packet Timeline Feb 13 04:55:53.021719 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 04:55:53.006256 ignition[866]: POST Status error: resource requires networking Feb 13 04:55:53.076701 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 04:55:53.006285 ignition[866]: Ignition finished successfully Feb 13 04:55:53.077140 systemd[1]: Starting ignition-kargs.service... Feb 13 04:55:53.148033 ignition[896]: Ignition 2.14.0 Feb 13 04:55:53.145359 systemd-networkd[873]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 04:55:53.148036 ignition[896]: Stage: kargs Feb 13 04:55:53.159068 systemd[1]: Starting iscsid.service... Feb 13 04:55:53.148090 ignition[896]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 04:55:53.180717 systemd[1]: Started iscsid.service. Feb 13 04:55:53.148099 ignition[896]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 04:55:53.195914 systemd[1]: Starting dracut-initqueue.service... Feb 13 04:55:53.149423 ignition[896]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 04:55:53.210611 systemd[1]: Finished dracut-initqueue.service. Feb 13 04:55:53.151019 ignition[896]: kargs: kargs passed Feb 13 04:55:53.229586 systemd[1]: Reached target remote-fs-pre.target. Feb 13 04:55:53.151022 ignition[896]: POST message to Packet Timeline Feb 13 04:55:53.248475 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 04:55:53.151032 ignition[896]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 04:55:53.256631 systemd[1]: Reached target remote-fs.target. Feb 13 04:55:53.156631 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50639->[::1]:53: read: connection refused Feb 13 04:55:53.257086 systemd[1]: Starting dracut-pre-mount.service... Feb 13 04:55:53.357183 ignition[896]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 04:55:53.295859 systemd[1]: Finished dracut-pre-mount.service. Feb 13 04:55:53.357586 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44756->[::1]:53: read: connection refused Feb 13 04:55:53.386704 systemd-networkd[873]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 04:55:53.414950 systemd-networkd[873]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 04:55:53.444865 systemd-networkd[873]: enp1s0f1np1: Link UP Feb 13 04:55:53.445221 systemd-networkd[873]: enp1s0f1np1: Gained carrier Feb 13 04:55:53.454971 systemd-networkd[873]: enp1s0f0np0: Link UP Feb 13 04:55:53.455494 systemd-networkd[873]: eno2: Link UP Feb 13 04:55:53.455970 systemd-networkd[873]: eno1: Link UP Feb 13 04:55:53.758145 ignition[896]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 04:55:53.759236 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42305->[::1]:53: read: connection refused Feb 13 04:55:54.182831 systemd-networkd[873]: enp1s0f0np0: Gained carrier Feb 13 04:55:54.191713 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 13 04:55:54.216662 systemd-networkd[873]: enp1s0f0np0: DHCPv4 address 139.178.90.239/31, gateway 139.178.90.238 acquired from 145.40.83.140 Feb 13 04:55:54.559767 ignition[896]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 04:55:54.561136 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:46908->[::1]:53: read: connection refused Feb 13 04:55:55.378052 systemd-networkd[873]: enp1s0f1np1: Gained IPv6LL Feb 13 04:55:56.162803 ignition[896]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 04:55:56.164042 ignition[896]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:42805->[::1]:53: read: connection refused Feb 13 04:55:56.209960 systemd-networkd[873]: enp1s0f0np0: Gained IPv6LL Feb 13 04:55:59.367506 ignition[896]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 04:55:59.434512 ignition[896]: GET result: OK Feb 13 04:55:59.621405 ignition[896]: Ignition finished successfully Feb 13 04:55:59.625222 systemd[1]: Finished ignition-kargs.service. Feb 13 04:55:59.707633 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 04:55:59.707667 kernel: audit: type=1130 audit(1707800159.636:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:59.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:59.646290 ignition[927]: Ignition 2.14.0 Feb 13 04:55:59.638883 systemd[1]: Starting ignition-disks.service... Feb 13 04:55:59.646294 ignition[927]: Stage: disks Feb 13 04:55:59.646350 ignition[927]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 04:55:59.646362 ignition[927]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 04:55:59.647678 ignition[927]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 04:55:59.649303 ignition[927]: disks: disks passed Feb 13 04:55:59.649307 ignition[927]: POST message to Packet Timeline Feb 13 04:55:59.649317 ignition[927]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 04:55:59.674100 ignition[927]: GET result: OK Feb 13 04:55:59.861899 ignition[927]: Ignition finished successfully Feb 13 04:55:59.864872 systemd[1]: Finished ignition-disks.service. Feb 13 04:55:59.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:59.877953 systemd[1]: Reached target initrd-root-device.target. Feb 13 04:55:59.968672 kernel: audit: type=1130 audit(1707800159.877:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:55:59.946625 systemd[1]: Reached target local-fs-pre.target. Feb 13 04:55:59.954609 systemd[1]: Reached target local-fs.target. Feb 13 04:55:59.954646 systemd[1]: Reached target sysinit.target. Feb 13 04:55:59.976650 systemd[1]: Reached target basic.target. Feb 13 04:55:59.992550 systemd[1]: Starting systemd-fsck-root.service... Feb 13 04:56:00.011990 systemd-fsck[942]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 04:56:00.034862 systemd[1]: Finished systemd-fsck-root.service. Feb 13 04:56:00.120539 kernel: audit: type=1130 audit(1707800160.043:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.120556 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 04:56:00.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.044052 systemd[1]: Mounting sysroot.mount... Feb 13 04:56:00.128067 systemd[1]: Mounted sysroot.mount. Feb 13 04:56:00.141711 systemd[1]: Reached target initrd-root-fs.target. Feb 13 04:56:00.158288 systemd[1]: Mounting sysroot-usr.mount... Feb 13 04:56:00.166257 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 04:56:00.186465 systemd[1]: Starting flatcar-static-network.service... Feb 13 04:56:00.200526 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 04:56:00.200543 systemd[1]: Reached target ignition-diskful.target. Feb 13 04:56:00.219613 systemd[1]: Mounted sysroot-usr.mount. Feb 13 04:56:00.243110 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 04:56:00.374974 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (953) Feb 13 04:56:00.374994 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 04:56:00.375002 kernel: BTRFS info (device sdb6): using free space tree Feb 13 04:56:00.375009 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 04:56:00.375017 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 04:56:00.375084 coreos-metadata[949]: Feb 13 04:56:00.300 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 04:56:00.375084 coreos-metadata[949]: Feb 13 04:56:00.322 INFO Fetch successful Feb 13 04:56:00.375084 coreos-metadata[949]: Feb 13 04:56:00.340 INFO wrote hostname ci-3510.3.2-a-01dc72b3af to /sysroot/etc/hostname Feb 13 04:56:00.620978 kernel: audit: type=1130 audit(1707800160.383:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.620994 kernel: audit: type=1130 audit(1707800160.445:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.621004 kernel: audit: type=1130 audit(1707800160.508:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.621012 kernel: audit: type=1131 audit(1707800160.508:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.621091 coreos-metadata[950]: Feb 13 04:56:00.300 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 04:56:00.621091 coreos-metadata[950]: Feb 13 04:56:00.322 INFO Fetch successful Feb 13 04:56:00.255978 systemd[1]: Starting initrd-setup-root.service... Feb 13 04:56:00.297726 systemd[1]: Finished initrd-setup-root.service. Feb 13 04:56:00.679536 initrd-setup-root[960]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 04:56:00.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.384802 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 04:56:00.753676 kernel: audit: type=1130 audit(1707800160.686:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.753691 initrd-setup-root[968]: cut: /sysroot/etc/group: No such file or directory Feb 13 04:56:00.445768 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 04:56:00.773653 initrd-setup-root[976]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 04:56:00.783620 ignition[1023]: INFO : Ignition 2.14.0 Feb 13 04:56:00.783620 ignition[1023]: INFO : Stage: mount Feb 13 04:56:00.783620 ignition[1023]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 04:56:00.783620 ignition[1023]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 04:56:00.783620 ignition[1023]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 04:56:00.783620 ignition[1023]: INFO : mount: mount passed Feb 13 04:56:00.783620 ignition[1023]: INFO : POST message to Packet Timeline Feb 13 04:56:00.783620 ignition[1023]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 04:56:00.783620 ignition[1023]: INFO : GET result: OK Feb 13 04:56:00.445807 systemd[1]: Finished flatcar-static-network.service. Feb 13 04:56:00.882792 initrd-setup-root[984]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 04:56:00.508703 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 04:56:00.630114 systemd[1]: Starting ignition-mount.service... Feb 13 04:56:00.657086 systemd[1]: Starting sysroot-boot.service... Feb 13 04:56:00.915742 ignition[1023]: INFO : Ignition finished successfully Feb 13 04:56:00.989483 kernel: audit: type=1130 audit(1707800160.923:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:00.672064 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 04:56:00.672119 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 04:56:01.098521 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1039) Feb 13 04:56:01.098534 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 04:56:01.098542 kernel: BTRFS info (device sdb6): using free space tree Feb 13 04:56:01.098549 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 04:56:01.098556 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 04:56:00.677535 systemd[1]: Finished sysroot-boot.service. Feb 13 04:56:00.909207 systemd[1]: Finished ignition-mount.service. Feb 13 04:56:00.925486 systemd[1]: Starting ignition-files.service... Feb 13 04:56:01.158707 ignition[1058]: INFO : Ignition 2.14.0 Feb 13 04:56:01.158707 ignition[1058]: INFO : Stage: files Feb 13 04:56:01.158707 ignition[1058]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 04:56:01.158707 ignition[1058]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 04:56:01.158707 ignition[1058]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 04:56:01.158707 ignition[1058]: DEBUG : files: compiled without relabeling support, skipping Feb 13 04:56:01.158707 ignition[1058]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 04:56:01.158707 ignition[1058]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 04:56:01.158707 ignition[1058]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 04:56:01.158707 ignition[1058]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 04:56:01.158707 ignition[1058]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 04:56:01.158707 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 13 04:56:01.158707 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 13 04:56:00.998333 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 04:56:01.328612 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 13 04:56:01.131723 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 04:56:01.155805 unknown[1058]: wrote ssh authorized keys file for user: core Feb 13 04:56:01.361887 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 13 04:56:01.361887 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 13 04:56:01.395726 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 13 04:56:01.902745 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 13 04:56:01.996464 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 13 04:56:01.996464 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 13 04:56:02.039671 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 13 04:56:02.039671 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 13 04:56:02.401204 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 13 04:56:02.519098 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 13 04:56:02.519098 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 13 04:56:02.559758 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 13 04:56:02.559758 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 13 04:56:02.752469 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 13 04:56:09.022141 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 13 04:56:09.047776 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 13 04:56:09.047776 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 13 04:56:09.047776 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 13 04:56:09.286252 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 13 04:56:23.494747 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 13 04:56:23.519822 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 13 04:56:23.519822 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 13 04:56:23.519822 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 13 04:56:23.671508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 13 04:56:28.725103 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 13 04:56:28.777751 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1080) Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 04:56:28.777819 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3432590584" Feb 13 04:56:29.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.088020 ignition[1058]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3432590584": device or resource busy Feb 13 04:56:29.088020 ignition[1058]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3432590584", trying btrfs: device or resource busy Feb 13 04:56:29.088020 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3432590584" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3432590584" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3432590584" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3432590584" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(15): [started] processing unit "prepare-cni-plugins.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(15): op(16): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(15): op(16): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(15): [finished] processing unit "prepare-cni-plugins.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(17): [started] processing unit "prepare-critools.service" Feb 13 04:56:29.088020 ignition[1058]: INFO : files: op(17): op(18): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 04:56:29.738736 kernel: audit: type=1130 audit(1707800189.029:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.738800 kernel: audit: type=1130 audit(1707800189.169:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.738832 kernel: audit: type=1130 audit(1707800189.239:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.738860 kernel: audit: type=1131 audit(1707800189.239:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.738886 kernel: audit: type=1130 audit(1707800189.412:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.738914 kernel: audit: type=1131 audit(1707800189.412:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.738941 kernel: audit: type=1130 audit(1707800189.593:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.015675 systemd[1]: Finished ignition-files.service. Feb 13 04:56:29.815450 kernel: audit: type=1131 audit(1707800189.746:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(17): op(18): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(17): [finished] processing unit "prepare-critools.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1c): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1c): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1d): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1d): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1e): [started] setting preset to enabled for "prepare-critools.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1e): [finished] setting preset to enabled for "prepare-critools.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 04:56:29.815576 ignition[1058]: INFO : files: files passed Feb 13 04:56:29.815576 ignition[1058]: INFO : POST message to Packet Timeline Feb 13 04:56:29.815576 ignition[1058]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 04:56:29.815576 ignition[1058]: INFO : GET result: OK Feb 13 04:56:29.815576 ignition[1058]: INFO : Ignition finished successfully Feb 13 04:56:30.393544 kernel: audit: type=1131 audit(1707800190.067:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.393571 kernel: audit: type=1131 audit(1707800190.158:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.035337 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 04:56:30.410508 initrd-setup-root-after-ignition[1094]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 04:56:30.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.433114 iscsid[907]: iscsid shutting down. Feb 13 04:56:29.097710 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 04:56:30.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.098025 systemd[1]: Starting ignition-quench.service... Feb 13 04:56:30.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.142831 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 04:56:29.169944 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 04:56:30.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.170053 systemd[1]: Finished ignition-quench.service. Feb 13 04:56:30.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.239690 systemd[1]: Reached target ignition-complete.target. Feb 13 04:56:29.361050 systemd[1]: Starting initrd-parse-etc.service... Feb 13 04:56:30.555786 ignition[1110]: INFO : Ignition 2.14.0 Feb 13 04:56:30.555786 ignition[1110]: INFO : Stage: umount Feb 13 04:56:30.555786 ignition[1110]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 04:56:30.555786 ignition[1110]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 04:56:30.555786 ignition[1110]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 04:56:30.555786 ignition[1110]: INFO : umount: umount passed Feb 13 04:56:30.555786 ignition[1110]: INFO : POST message to Packet Timeline Feb 13 04:56:30.555786 ignition[1110]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 04:56:30.555786 ignition[1110]: INFO : GET result: OK Feb 13 04:56:30.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.406427 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 04:56:30.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.727829 ignition[1110]: INFO : Ignition finished successfully Feb 13 04:56:30.727000 audit: BPF prog-id=6 op=UNLOAD Feb 13 04:56:29.406497 systemd[1]: Finished initrd-parse-etc.service. Feb 13 04:56:30.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.412764 systemd[1]: Reached target initrd-fs.target. Feb 13 04:56:30.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.536658 systemd[1]: Reached target initrd.target. Feb 13 04:56:30.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.536717 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 04:56:30.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.537089 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 04:56:29.572719 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 04:56:30.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.594397 systemd[1]: Starting initrd-cleanup.service... Feb 13 04:56:30.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.660395 systemd[1]: Stopped target nss-lookup.target. Feb 13 04:56:30.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.675834 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 04:56:29.694826 systemd[1]: Stopped target timers.target. Feb 13 04:56:30.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.721896 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 04:56:29.722052 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 04:56:29.747326 systemd[1]: Stopped target initrd.target. Feb 13 04:56:30.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.822684 systemd[1]: Stopped target basic.target. Feb 13 04:56:30.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.840792 systemd[1]: Stopped target ignition-complete.target. Feb 13 04:56:30.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.866734 systemd[1]: Stopped target ignition-diskful.target. Feb 13 04:56:29.886891 systemd[1]: Stopped target initrd-root-device.target. Feb 13 04:56:31.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.912042 systemd[1]: Stopped target remote-fs.target. Feb 13 04:56:31.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:31.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:29.937033 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 04:56:29.958069 systemd[1]: Stopped target sysinit.target. Feb 13 04:56:29.980054 systemd[1]: Stopped target local-fs.target. Feb 13 04:56:30.003138 systemd[1]: Stopped target local-fs-pre.target. Feb 13 04:56:30.025033 systemd[1]: Stopped target swap.target. Feb 13 04:56:30.044925 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 04:56:30.045287 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 04:56:30.068359 systemd[1]: Stopped target cryptsetup.target. Feb 13 04:56:30.145709 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 04:56:30.145792 systemd[1]: Stopped dracut-initqueue.service. Feb 13 04:56:30.158856 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 04:56:30.158927 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 04:56:30.228824 systemd[1]: Stopped target paths.target. Feb 13 04:56:30.249011 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 04:56:30.252650 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 04:56:30.271037 systemd[1]: Stopped target slices.target. Feb 13 04:56:30.294135 systemd[1]: Stopped target sockets.target. Feb 13 04:56:30.318039 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 04:56:30.318418 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 04:56:30.335138 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 04:56:30.335491 systemd[1]: Stopped ignition-files.service. Feb 13 04:56:30.353132 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 04:56:31.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:30.353511 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 04:56:30.374223 systemd[1]: Stopping ignition-mount.service... Feb 13 04:56:30.385654 systemd[1]: Stopping iscsid.service... Feb 13 04:56:30.400599 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 04:56:30.400693 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 04:56:30.420920 systemd[1]: Stopping sysroot-boot.service... Feb 13 04:56:30.439670 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 04:56:30.440100 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 04:56:30.456075 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 04:56:30.456398 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 04:56:30.488850 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 04:56:30.490685 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 04:56:30.490937 systemd[1]: Stopped iscsid.service. Feb 13 04:56:30.504913 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 04:56:30.505149 systemd[1]: Stopped sysroot-boot.service. Feb 13 04:56:30.519963 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 04:56:30.520131 systemd[1]: Closed iscsid.socket. Feb 13 04:56:30.532881 systemd[1]: Stopping iscsiuio.service... Feb 13 04:56:30.548272 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 04:56:30.548544 systemd[1]: Stopped iscsiuio.service. Feb 13 04:56:30.563246 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 04:56:30.563548 systemd[1]: Finished initrd-cleanup.service. Feb 13 04:56:30.580588 systemd[1]: Stopped target network.target. Feb 13 04:56:30.594772 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 04:56:30.594885 systemd[1]: Closed iscsiuio.socket. Feb 13 04:56:30.614100 systemd[1]: Stopping systemd-networkd.service... Feb 13 04:56:30.625638 systemd-networkd[873]: enp1s0f0np0: DHCPv6 lease lost Feb 13 04:56:30.634657 systemd-networkd[873]: enp1s0f1np1: DHCPv6 lease lost Feb 13 04:56:30.640900 systemd[1]: Stopping systemd-resolved.service... Feb 13 04:56:31.277000 audit: BPF prog-id=9 op=UNLOAD Feb 13 04:56:30.660223 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 04:56:30.660479 systemd[1]: Stopped systemd-resolved.service. Feb 13 04:56:31.278453 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 13 04:56:30.679012 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 04:56:30.679326 systemd[1]: Stopped systemd-networkd.service. Feb 13 04:56:30.703757 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 04:56:30.703809 systemd[1]: Stopped ignition-mount.service. Feb 13 04:56:30.719817 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 04:56:30.719843 systemd[1]: Closed systemd-networkd.socket. Feb 13 04:56:30.735643 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 04:56:30.735693 systemd[1]: Stopped ignition-disks.service. Feb 13 04:56:30.752700 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 04:56:30.752768 systemd[1]: Stopped ignition-kargs.service. Feb 13 04:56:30.767881 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 04:56:30.768018 systemd[1]: Stopped ignition-setup.service. Feb 13 04:56:30.783770 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 04:56:30.783897 systemd[1]: Stopped initrd-setup-root.service. Feb 13 04:56:30.801530 systemd[1]: Stopping network-cleanup.service... Feb 13 04:56:30.818676 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 04:56:30.818846 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 04:56:30.835859 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 04:56:30.836007 systemd[1]: Stopped systemd-sysctl.service. Feb 13 04:56:30.851165 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 04:56:30.851305 systemd[1]: Stopped systemd-modules-load.service. Feb 13 04:56:30.866062 systemd[1]: Stopping systemd-udevd.service... Feb 13 04:56:30.884491 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 04:56:30.885755 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 04:56:30.885811 systemd[1]: Stopped systemd-udevd.service. Feb 13 04:56:30.897935 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 04:56:30.897963 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 04:56:30.911868 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 04:56:30.911970 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 04:56:30.928726 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 04:56:30.928868 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 04:56:30.943813 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 04:56:30.943940 systemd[1]: Stopped dracut-cmdline.service. Feb 13 04:56:30.958638 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 04:56:30.958662 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 04:56:30.974109 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 04:56:30.989569 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 04:56:30.989617 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 04:56:31.006007 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 04:56:31.006119 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 04:56:31.187809 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 04:56:31.188050 systemd[1]: Stopped network-cleanup.service. Feb 13 04:56:31.200987 systemd[1]: Reached target initrd-switch-root.target. Feb 13 04:56:31.220515 systemd[1]: Starting initrd-switch-root.service... Feb 13 04:56:31.231420 systemd[1]: Switching root. Feb 13 04:56:31.279792 systemd-journald[267]: Journal stopped Feb 13 04:56:35.168920 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 04:56:35.168933 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 04:56:35.168941 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 04:56:35.168947 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 04:56:35.168951 kernel: SELinux: policy capability open_perms=1 Feb 13 04:56:35.168956 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 04:56:35.168962 kernel: SELinux: policy capability always_check_network=0 Feb 13 04:56:35.168967 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 04:56:35.168972 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 04:56:35.168978 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 04:56:35.168983 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 04:56:35.168990 systemd[1]: Successfully loaded SELinux policy in 317.836ms. Feb 13 04:56:35.168997 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.760ms. Feb 13 04:56:35.169003 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 04:56:35.169011 systemd[1]: Detected architecture x86-64. Feb 13 04:56:35.169016 systemd[1]: Detected first boot. Feb 13 04:56:35.169022 systemd[1]: Hostname set to . Feb 13 04:56:35.169028 systemd[1]: Initializing machine ID from random generator. Feb 13 04:56:35.169034 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 04:56:35.169040 systemd[1]: Populated /etc with preset unit settings. Feb 13 04:56:35.169045 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 04:56:35.169053 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 04:56:35.169059 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 04:56:35.169066 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 04:56:35.169071 systemd[1]: Stopped initrd-switch-root.service. Feb 13 04:56:35.169077 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 04:56:35.169084 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 04:56:35.169091 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 04:56:35.169098 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 04:56:35.169104 systemd[1]: Created slice system-getty.slice. Feb 13 04:56:35.169109 systemd[1]: Created slice system-modprobe.slice. Feb 13 04:56:35.169115 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 04:56:35.169121 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 04:56:35.169127 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 04:56:35.169133 systemd[1]: Created slice user.slice. Feb 13 04:56:35.169139 systemd[1]: Started systemd-ask-password-console.path. Feb 13 04:56:35.169145 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 04:56:35.169151 systemd[1]: Set up automount boot.automount. Feb 13 04:56:35.169157 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 04:56:35.169163 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 04:56:35.169171 systemd[1]: Stopped target initrd-fs.target. Feb 13 04:56:35.169177 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 04:56:35.169183 systemd[1]: Reached target integritysetup.target. Feb 13 04:56:35.169189 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 04:56:35.169196 systemd[1]: Reached target remote-fs.target. Feb 13 04:56:35.169202 systemd[1]: Reached target slices.target. Feb 13 04:56:35.169208 systemd[1]: Reached target swap.target. Feb 13 04:56:35.169215 systemd[1]: Reached target torcx.target. Feb 13 04:56:35.169221 systemd[1]: Reached target veritysetup.target. Feb 13 04:56:35.169227 systemd[1]: Listening on systemd-coredump.socket. Feb 13 04:56:35.169233 systemd[1]: Listening on systemd-initctl.socket. Feb 13 04:56:35.169239 systemd[1]: Listening on systemd-networkd.socket. Feb 13 04:56:35.169246 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 04:56:35.169253 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 04:56:35.169259 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 04:56:35.169266 systemd[1]: Mounting dev-hugepages.mount... Feb 13 04:56:35.169272 systemd[1]: Mounting dev-mqueue.mount... Feb 13 04:56:35.169278 systemd[1]: Mounting media.mount... Feb 13 04:56:35.169285 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 04:56:35.169291 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 04:56:35.169298 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 04:56:35.169304 systemd[1]: Mounting tmp.mount... Feb 13 04:56:35.169310 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 04:56:35.169316 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 04:56:35.169323 systemd[1]: Starting kmod-static-nodes.service... Feb 13 04:56:35.169329 systemd[1]: Starting modprobe@configfs.service... Feb 13 04:56:35.169335 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 04:56:35.169342 systemd[1]: Starting modprobe@drm.service... Feb 13 04:56:35.169349 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 04:56:35.169355 systemd[1]: Starting modprobe@fuse.service... Feb 13 04:56:35.169361 kernel: fuse: init (API version 7.34) Feb 13 04:56:35.169367 systemd[1]: Starting modprobe@loop.service... Feb 13 04:56:35.169373 kernel: loop: module loaded Feb 13 04:56:35.169379 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 04:56:35.169386 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 04:56:35.169393 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 04:56:35.169399 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 04:56:35.169405 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 13 04:56:35.169411 kernel: audit: type=1131 audit(1707800194.810:114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.169417 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 04:56:35.169423 kernel: audit: type=1131 audit(1707800194.898:115): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.169429 systemd[1]: Stopped systemd-journald.service. Feb 13 04:56:35.169436 kernel: audit: type=1130 audit(1707800194.962:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.169446 kernel: audit: type=1131 audit(1707800194.962:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.169473 kernel: audit: type=1334 audit(1707800195.047:118): prog-id=21 op=LOAD Feb 13 04:56:35.169479 kernel: audit: type=1334 audit(1707800195.065:119): prog-id=22 op=LOAD Feb 13 04:56:35.169485 kernel: audit: type=1334 audit(1707800195.083:120): prog-id=23 op=LOAD Feb 13 04:56:35.169490 kernel: audit: type=1334 audit(1707800195.101:121): prog-id=19 op=UNLOAD Feb 13 04:56:35.169512 systemd[1]: Starting systemd-journald.service... Feb 13 04:56:35.169518 kernel: audit: type=1334 audit(1707800195.101:122): prog-id=20 op=UNLOAD Feb 13 04:56:35.169524 systemd[1]: Starting systemd-modules-load.service... Feb 13 04:56:35.169531 kernel: audit: type=1305 audit(1707800195.165:123): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 04:56:35.169539 systemd-journald[1263]: Journal started Feb 13 04:56:35.169563 systemd-journald[1263]: Runtime Journal (/run/log/journal/f82a61987d9b48ddb4481bb64047f2ff) is 8.0M, max 640.1M, 632.1M free. Feb 13 04:56:31.671000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 04:56:31.937000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 04:56:31.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 04:56:31.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 04:56:31.939000 audit: BPF prog-id=10 op=LOAD Feb 13 04:56:31.939000 audit: BPF prog-id=10 op=UNLOAD Feb 13 04:56:31.939000 audit: BPF prog-id=11 op=LOAD Feb 13 04:56:31.939000 audit: BPF prog-id=11 op=UNLOAD Feb 13 04:56:32.009000 audit[1151]: AVC avc: denied { associate } for pid=1151 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 04:56:32.009000 audit[1151]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001258dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1134 pid=1151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:32.009000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 04:56:32.034000 audit[1151]: AVC avc: denied { associate } for pid=1151 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 04:56:32.034000 audit[1151]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001259b5 a2=1ed a3=0 items=2 ppid=1134 pid=1151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:32.034000 audit: CWD cwd="/" Feb 13 04:56:32.034000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:32.034000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:32.034000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 04:56:33.550000 audit: BPF prog-id=12 op=LOAD Feb 13 04:56:33.550000 audit: BPF prog-id=3 op=UNLOAD Feb 13 04:56:33.550000 audit: BPF prog-id=13 op=LOAD Feb 13 04:56:33.550000 audit: BPF prog-id=14 op=LOAD Feb 13 04:56:33.550000 audit: BPF prog-id=4 op=UNLOAD Feb 13 04:56:33.550000 audit: BPF prog-id=5 op=UNLOAD Feb 13 04:56:33.550000 audit: BPF prog-id=15 op=LOAD Feb 13 04:56:33.550000 audit: BPF prog-id=12 op=UNLOAD Feb 13 04:56:33.550000 audit: BPF prog-id=16 op=LOAD Feb 13 04:56:33.550000 audit: BPF prog-id=17 op=LOAD Feb 13 04:56:33.550000 audit: BPF prog-id=13 op=UNLOAD Feb 13 04:56:33.550000 audit: BPF prog-id=14 op=UNLOAD Feb 13 04:56:33.551000 audit: BPF prog-id=18 op=LOAD Feb 13 04:56:33.551000 audit: BPF prog-id=15 op=UNLOAD Feb 13 04:56:33.551000 audit: BPF prog-id=19 op=LOAD Feb 13 04:56:33.551000 audit: BPF prog-id=20 op=LOAD Feb 13 04:56:33.551000 audit: BPF prog-id=16 op=UNLOAD Feb 13 04:56:33.551000 audit: BPF prog-id=17 op=UNLOAD Feb 13 04:56:33.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:33.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:33.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:33.631000 audit: BPF prog-id=18 op=UNLOAD Feb 13 04:56:34.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:34.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:34.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:34.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.047000 audit: BPF prog-id=21 op=LOAD Feb 13 04:56:35.065000 audit: BPF prog-id=22 op=LOAD Feb 13 04:56:35.083000 audit: BPF prog-id=23 op=LOAD Feb 13 04:56:35.101000 audit: BPF prog-id=19 op=UNLOAD Feb 13 04:56:35.101000 audit: BPF prog-id=20 op=UNLOAD Feb 13 04:56:35.165000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 04:56:32.007048 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 04:56:33.549593 systemd[1]: Queued start job for default target multi-user.target. Feb 13 04:56:32.007448 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 04:56:33.553036 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 04:56:32.007461 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 04:56:32.007480 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 04:56:32.007486 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 04:56:32.007504 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 04:56:32.007512 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 04:56:32.007625 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 04:56:32.007648 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 04:56:32.007656 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 04:56:32.008088 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 04:56:32.008108 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 04:56:32.008119 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 04:56:32.008128 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 04:56:32.008138 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 04:56:32.008146 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 04:56:33.198169 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:56:33.198306 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:56:33.198364 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:56:33.198461 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 04:56:33.198491 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 04:56:33.198525 /usr/lib/systemd/system-generators/torcx-generator[1151]: time="2024-02-13T04:56:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 04:56:35.165000 audit[1263]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd63d405a0 a2=4000 a3=7ffd63d4063c items=0 ppid=1 pid=1263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:35.165000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 04:56:35.247628 systemd[1]: Starting systemd-network-generator.service... Feb 13 04:56:35.274481 systemd[1]: Starting systemd-remount-fs.service... Feb 13 04:56:35.301498 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 04:56:35.344334 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 04:56:35.344357 systemd[1]: Stopped verity-setup.service. Feb 13 04:56:35.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.390483 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 04:56:35.409492 systemd[1]: Started systemd-journald.service. Feb 13 04:56:35.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.417976 systemd[1]: Mounted dev-hugepages.mount. Feb 13 04:56:35.425703 systemd[1]: Mounted dev-mqueue.mount. Feb 13 04:56:35.432701 systemd[1]: Mounted media.mount. Feb 13 04:56:35.439699 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 04:56:35.448699 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 04:56:35.457678 systemd[1]: Mounted tmp.mount. Feb 13 04:56:35.464743 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 04:56:35.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.473761 systemd[1]: Finished kmod-static-nodes.service. Feb 13 04:56:35.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.481775 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 04:56:35.481878 systemd[1]: Finished modprobe@configfs.service. Feb 13 04:56:35.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.490864 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 04:56:35.490990 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 04:56:35.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.499900 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 04:56:35.500049 systemd[1]: Finished modprobe@drm.service. Feb 13 04:56:35.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.509068 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 04:56:35.509292 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 04:56:35.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.518280 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 04:56:35.518604 systemd[1]: Finished modprobe@fuse.service. Feb 13 04:56:35.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.527262 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 04:56:35.527590 systemd[1]: Finished modprobe@loop.service. Feb 13 04:56:35.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.536295 systemd[1]: Finished systemd-modules-load.service. Feb 13 04:56:35.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.545232 systemd[1]: Finished systemd-network-generator.service. Feb 13 04:56:35.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.554244 systemd[1]: Finished systemd-remount-fs.service. Feb 13 04:56:35.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.563345 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 04:56:35.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.572883 systemd[1]: Reached target network-pre.target. Feb 13 04:56:35.584408 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 04:56:35.595151 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 04:56:35.602687 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 04:56:35.603596 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 04:56:35.611065 systemd[1]: Starting systemd-journal-flush.service... Feb 13 04:56:35.614543 systemd-journald[1263]: Time spent on flushing to /var/log/journal/f82a61987d9b48ddb4481bb64047f2ff is 15.878ms for 1620 entries. Feb 13 04:56:35.614543 systemd-journald[1263]: System Journal (/var/log/journal/f82a61987d9b48ddb4481bb64047f2ff) is 8.0M, max 195.6M, 187.6M free. Feb 13 04:56:35.654901 systemd-journald[1263]: Received client request to flush runtime journal. Feb 13 04:56:35.627580 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 04:56:35.628058 systemd[1]: Starting systemd-random-seed.service... Feb 13 04:56:35.643569 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 04:56:35.644089 systemd[1]: Starting systemd-sysctl.service... Feb 13 04:56:35.651232 systemd[1]: Starting systemd-sysusers.service... Feb 13 04:56:35.658063 systemd[1]: Starting systemd-udev-settle.service... Feb 13 04:56:35.665734 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 04:56:35.673618 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 04:56:35.681665 systemd[1]: Finished systemd-journal-flush.service. Feb 13 04:56:35.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.689697 systemd[1]: Finished systemd-random-seed.service. Feb 13 04:56:35.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.697642 systemd[1]: Finished systemd-sysctl.service. Feb 13 04:56:35.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.705636 systemd[1]: Finished systemd-sysusers.service. Feb 13 04:56:35.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.714579 systemd[1]: Reached target first-boot-complete.target. Feb 13 04:56:35.722768 udevadm[1279]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 13 04:56:35.903755 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 04:56:35.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.913000 audit: BPF prog-id=24 op=LOAD Feb 13 04:56:35.913000 audit: BPF prog-id=25 op=LOAD Feb 13 04:56:35.913000 audit: BPF prog-id=7 op=UNLOAD Feb 13 04:56:35.913000 audit: BPF prog-id=8 op=UNLOAD Feb 13 04:56:35.914719 systemd[1]: Starting systemd-udevd.service... Feb 13 04:56:35.926540 systemd-udevd[1280]: Using default interface naming scheme 'v252'. Feb 13 04:56:35.945116 systemd[1]: Started systemd-udevd.service. Feb 13 04:56:35.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:35.955690 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 04:56:35.954000 audit: BPF prog-id=26 op=LOAD Feb 13 04:56:35.956747 systemd[1]: Starting systemd-networkd.service... Feb 13 04:56:35.981000 audit: BPF prog-id=27 op=LOAD Feb 13 04:56:36.000296 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 04:56:36.000356 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 04:56:36.000377 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1284) Feb 13 04:56:35.981000 audit: BPF prog-id=28 op=LOAD Feb 13 04:56:35.998000 audit: BPF prog-id=29 op=LOAD Feb 13 04:56:36.000881 systemd[1]: Starting systemd-userdbd.service... Feb 13 04:56:36.025447 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 04:56:36.066449 kernel: IPMI message handler: version 39.2 Feb 13 04:56:36.066495 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 04:56:36.091381 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 04:56:36.105522 kernel: ACPI: button: Power Button [PWRF] Feb 13 04:56:36.043000 audit[1292]: AVC avc: denied { confidentiality } for pid=1292 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 04:56:36.145457 kernel: ipmi device interface Feb 13 04:56:36.043000 audit[1292]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55702eb8a680 a1=4d8bc a2=7f7aa0f3fbc5 a3=5 items=42 ppid=1280 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:36.043000 audit: CWD cwd="/" Feb 13 04:56:36.043000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=1 name=(null) inode=23934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=2 name=(null) inode=23934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=3 name=(null) inode=23935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=4 name=(null) inode=23934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=5 name=(null) inode=23936 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=6 name=(null) inode=23934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=7 name=(null) inode=23937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=8 name=(null) inode=23937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=9 name=(null) inode=23938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=10 name=(null) inode=23937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=11 name=(null) inode=23939 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=12 name=(null) inode=23937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=13 name=(null) inode=23940 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=14 name=(null) inode=23937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=15 name=(null) inode=23941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=16 name=(null) inode=23937 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=17 name=(null) inode=23942 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=18 name=(null) inode=23934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=19 name=(null) inode=23943 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=20 name=(null) inode=23943 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=21 name=(null) inode=23944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=22 name=(null) inode=23943 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=23 name=(null) inode=23945 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=24 name=(null) inode=23943 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=25 name=(null) inode=23946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=26 name=(null) inode=23943 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=27 name=(null) inode=23947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=28 name=(null) inode=23943 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=29 name=(null) inode=23948 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=30 name=(null) inode=23934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=31 name=(null) inode=23949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=32 name=(null) inode=23949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=33 name=(null) inode=23950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=34 name=(null) inode=23949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=35 name=(null) inode=23951 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=36 name=(null) inode=23949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=37 name=(null) inode=23952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=38 name=(null) inode=23949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=39 name=(null) inode=23953 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=40 name=(null) inode=23949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PATH item=41 name=(null) inode=23954 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:56:36.043000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 04:56:36.150966 systemd[1]: Started systemd-userdbd.service. Feb 13 04:56:36.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:36.188434 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 04:56:36.188564 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 04:56:36.209448 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 04:56:36.253581 kernel: ipmi_si: IPMI System Interface driver Feb 13 04:56:36.253608 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 04:56:36.253686 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 04:56:36.274673 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 04:56:36.313564 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 04:56:36.313656 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 04:56:36.360448 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 04:56:36.360484 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 04:56:36.360613 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 04:56:36.440876 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 04:56:36.441007 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 04:56:36.441022 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 04:56:36.521634 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 04:56:36.521723 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 04:56:36.521803 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 04:56:36.541481 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 04:56:36.595448 kernel: intel_rapl_common: Found RAPL domain package Feb 13 04:56:36.595500 kernel: intel_rapl_common: Found RAPL domain core Feb 13 04:56:36.600308 systemd-networkd[1317]: bond0: netdev ready Feb 13 04:56:36.602573 systemd-networkd[1317]: lo: Link UP Feb 13 04:56:36.602576 systemd-networkd[1317]: lo: Gained carrier Feb 13 04:56:36.603090 systemd-networkd[1317]: Enumeration completed Feb 13 04:56:36.603171 systemd[1]: Started systemd-networkd.service. Feb 13 04:56:36.603387 systemd-networkd[1317]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 04:56:36.612461 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 04:56:36.617736 systemd-networkd[1317]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a4:65.network. Feb 13 04:56:36.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:36.683482 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 04:56:36.701445 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 04:56:36.704664 systemd[1]: Finished systemd-udev-settle.service. Feb 13 04:56:36.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:36.714092 systemd[1]: Starting lvm2-activation-early.service... Feb 13 04:56:36.729129 lvm[1385]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 04:56:36.757863 systemd[1]: Finished lvm2-activation-early.service. Feb 13 04:56:36.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:36.766514 systemd[1]: Reached target cryptsetup.target. Feb 13 04:56:36.776010 systemd[1]: Starting lvm2-activation.service... Feb 13 04:56:36.778035 lvm[1386]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 04:56:36.804838 systemd[1]: Finished lvm2-activation.service. Feb 13 04:56:36.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:36.813509 systemd[1]: Reached target local-fs-pre.target. Feb 13 04:56:36.822477 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 04:56:36.822490 systemd[1]: Reached target local-fs.target. Feb 13 04:56:36.831472 systemd[1]: Reached target machines.target. Feb 13 04:56:36.841015 systemd[1]: Starting ldconfig.service... Feb 13 04:56:36.848918 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 04:56:36.848940 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 04:56:36.849426 systemd[1]: Starting systemd-boot-update.service... Feb 13 04:56:36.856925 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 04:56:36.868033 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 04:56:36.868177 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 04:56:36.868200 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 04:56:36.868723 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 04:56:36.868960 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1388 (bootctl) Feb 13 04:56:36.869686 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 04:56:36.889852 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 04:56:36.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:37.030276 systemd-tmpfiles[1392]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 04:56:37.181161 systemd-tmpfiles[1392]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 04:56:37.221499 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 04:56:37.221843 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 04:56:37.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:37.224808 systemd-tmpfiles[1392]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 04:56:37.258895 systemd-fsck[1396]: fsck.fat 4.2 (2021-01-31) Feb 13 04:56:37.258895 systemd-fsck[1396]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 13 04:56:37.259723 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 04:56:37.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:37.270380 systemd[1]: Mounting boot.mount... Feb 13 04:56:37.282406 systemd[1]: Mounted boot.mount. Feb 13 04:56:37.301861 systemd[1]: Finished systemd-boot-update.service. Feb 13 04:56:37.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:37.331552 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 04:56:37.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:37.340301 systemd[1]: Starting audit-rules.service... Feb 13 04:56:37.348141 systemd[1]: Starting clean-ca-certificates.service... Feb 13 04:56:37.357118 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 04:56:37.359000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 04:56:37.359000 audit[1417]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff742d6960 a2=420 a3=0 items=0 ppid=1400 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:37.359000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 04:56:37.361015 augenrules[1417]: No rules Feb 13 04:56:37.367363 systemd[1]: Starting systemd-resolved.service... Feb 13 04:56:37.376306 systemd[1]: Starting systemd-timesyncd.service... Feb 13 04:56:37.384951 systemd[1]: Starting systemd-update-utmp.service... Feb 13 04:56:37.392727 systemd[1]: Finished audit-rules.service. Feb 13 04:56:37.400586 systemd[1]: Finished clean-ca-certificates.service. Feb 13 04:56:37.409574 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 04:56:37.421645 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 04:56:37.422145 systemd[1]: Finished systemd-update-utmp.service. Feb 13 04:56:37.445239 ldconfig[1387]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 04:56:37.448288 systemd[1]: Started systemd-timesyncd.service. Feb 13 04:56:37.450270 systemd-resolved[1422]: Positive Trust Anchors: Feb 13 04:56:37.450277 systemd-resolved[1422]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 04:56:37.450296 systemd-resolved[1422]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 04:56:37.454269 systemd-resolved[1422]: Using system hostname 'ci-3510.3.2-a-01dc72b3af'. Feb 13 04:56:37.457643 systemd[1]: Finished ldconfig.service. Feb 13 04:56:37.464593 systemd[1]: Reached target time-set.target. Feb 13 04:56:37.473158 systemd[1]: Starting systemd-update-done.service... Feb 13 04:56:37.479665 systemd[1]: Finished systemd-update-done.service. Feb 13 04:56:37.761612 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 04:56:37.786449 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 04:56:37.787533 systemd-networkd[1317]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:7e:a4:64.network. Feb 13 04:56:37.870451 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 04:56:38.007451 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 04:56:38.079460 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 04:56:38.119568 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 04:56:38.119613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 04:56:38.119644 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 04:56:38.142489 systemd-networkd[1317]: bond0: Link UP Feb 13 04:56:38.142845 systemd[1]: Started systemd-resolved.service. Feb 13 04:56:38.159584 systemd[1]: Reached target network.target. Feb 13 04:56:38.165464 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 04:56:38.165506 kernel: bond0: active interface up! Feb 13 04:56:38.165522 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 13 04:56:38.196538 systemd[1]: Reached target nss-lookup.target. Feb 13 04:56:38.200480 systemd-networkd[1317]: enp1s0f1np1: Link UP Feb 13 04:56:38.200618 systemd-networkd[1317]: enp1s0f1np1: Gained carrier Feb 13 04:56:38.201538 systemd-networkd[1317]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:7e:a4:64.network. Feb 13 04:56:38.208533 systemd[1]: Reached target sysinit.target. Feb 13 04:56:38.216559 systemd[1]: Started motdgen.path. Feb 13 04:56:38.223555 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 04:56:38.233589 systemd[1]: Started logrotate.timer. Feb 13 04:56:38.240569 systemd[1]: Started mdadm.timer. Feb 13 04:56:38.256532 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 04:56:38.264486 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 04:56:38.272512 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 04:56:38.272529 systemd[1]: Reached target paths.target. Feb 13 04:56:38.279512 systemd[1]: Reached target timers.target. Feb 13 04:56:38.286644 systemd[1]: Listening on dbus.socket. Feb 13 04:56:38.294070 systemd[1]: Starting docker.socket... Feb 13 04:56:38.301899 systemd[1]: Listening on sshd.socket. Feb 13 04:56:38.315896 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 04:56:38.316112 systemd[1]: Listening on docker.socket. Feb 13 04:56:38.328442 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:56:38.343588 systemd[1]: Reached target sockets.target. Feb 13 04:56:38.352481 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:56:38.354583 systemd-networkd[1317]: enp1s0f0np0: Link UP Feb 13 04:56:38.354752 systemd-networkd[1317]: bond0: Gained carrier Feb 13 04:56:38.354837 systemd-networkd[1317]: enp1s0f0np0: Gained carrier Feb 13 04:56:38.354915 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.369560 systemd[1]: Reached target basic.target. Feb 13 04:56:38.375445 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 04:56:38.375484 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 04:56:38.399582 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 04:56:38.399597 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 04:56:38.399676 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.399910 systemd-networkd[1317]: enp1s0f1np1: Link DOWN Feb 13 04:56:38.399913 systemd-networkd[1317]: enp1s0f1np1: Lost carrier Feb 13 04:56:38.400350 systemd[1]: Starting containerd.service... Feb 13 04:56:38.407646 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.407832 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.408115 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 04:56:38.417009 systemd[1]: Starting coreos-metadata.service... Feb 13 04:56:38.424300 systemd[1]: Starting dbus.service... Feb 13 04:56:38.429999 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 04:56:38.434702 jq[1437]: false Feb 13 04:56:38.436699 coreos-metadata[1430]: Feb 13 04:56:38.436 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 04:56:38.438047 systemd[1]: Starting extend-filesystems.service... Feb 13 04:56:38.441527 dbus-daemon[1436]: [system] SELinux support is enabled Feb 13 04:56:38.445101 extend-filesystems[1439]: Found sda Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb1 Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb2 Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb3 Feb 13 04:56:38.453530 extend-filesystems[1439]: Found usr Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb4 Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb6 Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb7 Feb 13 04:56:38.453530 extend-filesystems[1439]: Found sdb9 Feb 13 04:56:38.453530 extend-filesystems[1439]: Checking size of /dev/sdb9 Feb 13 04:56:38.453530 extend-filesystems[1439]: Resized partition /dev/sdb9 Feb 13 04:56:38.675492 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 13 04:56:38.675514 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 04:56:38.675617 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 04:56:38.675630 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 04:56:38.675640 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 04:56:38.675650 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 04:56:38.445496 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 04:56:38.675725 coreos-metadata[1433]: Feb 13 04:56:38.445 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 04:56:38.675833 extend-filesystems[1451]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 04:56:38.446091 systemd[1]: Starting motdgen.service... Feb 13 04:56:38.469148 systemd[1]: Starting prepare-cni-plugins.service... Feb 13 04:56:38.488145 systemd[1]: Starting prepare-critools.service... Feb 13 04:56:38.507072 systemd[1]: Starting prepare-helm.service... Feb 13 04:56:38.521073 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 04:56:38.535071 systemd[1]: Starting sshd-keygen.service... Feb 13 04:56:38.543742 systemd[1]: Starting systemd-logind.service... Feb 13 04:56:38.561037 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 04:56:38.693047 update_engine[1469]: I0213 04:56:38.614657 1469 main.cc:92] Flatcar Update Engine starting Feb 13 04:56:38.693047 update_engine[1469]: I0213 04:56:38.618582 1469 update_check_scheduler.cc:74] Next update check in 10m51s Feb 13 04:56:38.561667 systemd[1]: Starting tcsd.service... Feb 13 04:56:38.693210 jq[1470]: true Feb 13 04:56:38.568899 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 04:56:38.569216 systemd[1]: Starting update-engine.service... Feb 13 04:56:38.570553 systemd-logind[1467]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 04:56:38.570562 systemd-logind[1467]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 04:56:38.570571 systemd-logind[1467]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 04:56:38.570721 systemd-logind[1467]: New seat seat0. Feb 13 04:56:38.588151 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 04:56:38.620026 systemd[1]: Started dbus.service. Feb 13 04:56:38.642139 systemd-networkd[1317]: enp1s0f1np1: Link UP Feb 13 04:56:38.642142 systemd-networkd[1317]: enp1s0f1np1: Gained carrier Feb 13 04:56:38.680066 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 04:56:38.680154 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 04:56:38.680300 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 04:56:38.680376 systemd[1]: Finished motdgen.service. Feb 13 04:56:38.688622 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.688665 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.688734 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.688851 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:38.700785 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 04:56:38.700869 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 04:56:38.705319 tar[1472]: ./ Feb 13 04:56:38.705319 tar[1472]: ./loopback Feb 13 04:56:38.711137 jq[1478]: true Feb 13 04:56:38.711279 tar[1473]: crictl Feb 13 04:56:38.711516 dbus-daemon[1436]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 04:56:38.712787 tar[1474]: linux-amd64/helm Feb 13 04:56:38.716432 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 04:56:38.716535 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 04:56:38.719106 systemd[1]: Started systemd-logind.service. Feb 13 04:56:38.721474 env[1479]: time="2024-02-13T04:56:38.721443400Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 04:56:38.724323 tar[1472]: ./bandwidth Feb 13 04:56:38.733509 env[1479]: time="2024-02-13T04:56:38.733485969Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 04:56:38.734559 systemd[1]: Started update-engine.service. Feb 13 04:56:38.735542 env[1479]: time="2024-02-13T04:56:38.735527989Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:56:38.736233 env[1479]: time="2024-02-13T04:56:38.736192391Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 04:56:38.736233 env[1479]: time="2024-02-13T04:56:38.736208241Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:56:38.737886 env[1479]: time="2024-02-13T04:56:38.737844172Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 04:56:38.737886 env[1479]: time="2024-02-13T04:56:38.737857893Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 04:56:38.737886 env[1479]: time="2024-02-13T04:56:38.737866497Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 04:56:38.737886 env[1479]: time="2024-02-13T04:56:38.737872511Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 04:56:38.737960 env[1479]: time="2024-02-13T04:56:38.737914229Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:56:38.740177 env[1479]: time="2024-02-13T04:56:38.740141136Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 04:56:38.740260 env[1479]: time="2024-02-13T04:56:38.740213846Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 04:56:38.740260 env[1479]: time="2024-02-13T04:56:38.740224799Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 04:56:38.740260 env[1479]: time="2024-02-13T04:56:38.740253009Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 04:56:38.740317 bash[1506]: Updated "/home/core/.ssh/authorized_keys" Feb 13 04:56:38.740367 env[1479]: time="2024-02-13T04:56:38.740261793Z" level=info msg="metadata content store policy set" policy=shared Feb 13 04:56:38.743642 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 04:56:38.747480 env[1479]: time="2024-02-13T04:56:38.747466021Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 04:56:38.747517 env[1479]: time="2024-02-13T04:56:38.747483251Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 04:56:38.747517 env[1479]: time="2024-02-13T04:56:38.747491357Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 04:56:38.747517 env[1479]: time="2024-02-13T04:56:38.747509139Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747517686Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747525289Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747532565Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747539754Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747547041Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747554863Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747561816Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747599 env[1479]: time="2024-02-13T04:56:38.747568051Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 04:56:38.747783 env[1479]: time="2024-02-13T04:56:38.747625423Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 04:56:38.747783 env[1479]: time="2024-02-13T04:56:38.747670939Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 04:56:38.747891 env[1479]: time="2024-02-13T04:56:38.747881808Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 04:56:38.747923 env[1479]: time="2024-02-13T04:56:38.747896688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.747923 env[1479]: time="2024-02-13T04:56:38.747903904Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 04:56:38.747970 env[1479]: time="2024-02-13T04:56:38.747931368Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.747970 env[1479]: time="2024-02-13T04:56:38.747939088Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.747970 env[1479]: time="2024-02-13T04:56:38.747945513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.747970 env[1479]: time="2024-02-13T04:56:38.747951669Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.747970 env[1479]: time="2024-02-13T04:56:38.747958009Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.747970 env[1479]: time="2024-02-13T04:56:38.747965274Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.747971674Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.747977648Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.747985033Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748044508Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748053515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748059825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748065711Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748073235Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748080134Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 04:56:38.748108 env[1479]: time="2024-02-13T04:56:38.748092627Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 04:56:38.748345 env[1479]: time="2024-02-13T04:56:38.748113700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 04:56:38.748373 env[1479]: time="2024-02-13T04:56:38.748225538Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 04:56:38.748373 env[1479]: time="2024-02-13T04:56:38.748261106Z" level=info msg="Connect containerd service" Feb 13 04:56:38.748373 env[1479]: time="2024-02-13T04:56:38.748278419Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.748615333Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.748992947Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749029812Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.748859992Z" level=info msg="Start subscribing containerd event" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749079541Z" level=info msg="containerd successfully booted in 0.028000s" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749087364Z" level=info msg="Start recovering state" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749269704Z" level=info msg="Start event monitor" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749286345Z" level=info msg="Start snapshots syncer" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749292806Z" level=info msg="Start cni network conf syncer for default" Feb 13 04:56:38.750136 env[1479]: time="2024-02-13T04:56:38.749303366Z" level=info msg="Start streaming server" Feb 13 04:56:38.753582 systemd[1]: Started containerd.service. Feb 13 04:56:38.760372 tar[1472]: ./ptp Feb 13 04:56:38.763699 systemd[1]: Started locksmithd.service. Feb 13 04:56:38.771616 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 04:56:38.771753 systemd[1]: Reached target system-config.target. Feb 13 04:56:38.779573 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 04:56:38.779690 systemd[1]: Reached target user-config.target. Feb 13 04:56:38.783225 tar[1472]: ./vlan Feb 13 04:56:38.805136 tar[1472]: ./host-device Feb 13 04:56:38.823345 locksmithd[1514]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 04:56:38.826436 tar[1472]: ./tuning Feb 13 04:56:38.845269 tar[1472]: ./vrf Feb 13 04:56:38.864934 tar[1472]: ./sbr Feb 13 04:56:38.884201 tar[1472]: ./tap Feb 13 04:56:38.906226 tar[1472]: ./dhcp Feb 13 04:56:38.962191 tar[1472]: ./static Feb 13 04:56:38.966783 tar[1474]: linux-amd64/LICENSE Feb 13 04:56:38.966843 tar[1474]: linux-amd64/README.md Feb 13 04:56:38.969479 systemd[1]: Finished prepare-helm.service. Feb 13 04:56:38.979186 tar[1472]: ./firewall Feb 13 04:56:38.980462 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 13 04:56:39.008576 extend-filesystems[1451]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 13 04:56:39.008576 extend-filesystems[1451]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 04:56:39.008576 extend-filesystems[1451]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 13 04:56:39.056523 extend-filesystems[1439]: Resized filesystem in /dev/sdb9 Feb 13 04:56:39.064533 tar[1472]: ./macvlan Feb 13 04:56:39.064533 tar[1472]: ./dummy Feb 13 04:56:39.009153 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 04:56:39.009289 systemd[1]: Finished extend-filesystems.service. Feb 13 04:56:39.031322 systemd[1]: Finished prepare-critools.service. Feb 13 04:56:39.076290 tar[1472]: ./bridge Feb 13 04:56:39.100068 tar[1472]: ./ipvlan Feb 13 04:56:39.122058 tar[1472]: ./portmap Feb 13 04:56:39.130175 sshd_keygen[1466]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 04:56:39.141922 systemd[1]: Finished sshd-keygen.service. Feb 13 04:56:39.142918 tar[1472]: ./host-local Feb 13 04:56:39.149399 systemd[1]: Starting issuegen.service... Feb 13 04:56:39.156820 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 04:56:39.156897 systemd[1]: Finished issuegen.service. Feb 13 04:56:39.164908 systemd[1]: Starting systemd-user-sessions.service... Feb 13 04:56:39.174143 systemd[1]: Finished systemd-user-sessions.service. Feb 13 04:56:39.183778 systemd[1]: Finished prepare-cni-plugins.service. Feb 13 04:56:39.192161 systemd[1]: Started getty@tty1.service. Feb 13 04:56:39.199106 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 04:56:39.207609 systemd[1]: Reached target getty.target. Feb 13 04:56:39.921574 systemd-networkd[1317]: bond0: Gained IPv6LL Feb 13 04:56:39.921791 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:40.433752 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:40.433903 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:41.835661 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 04:56:44.287002 login[1539]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 13 04:56:44.288185 login[1538]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 04:56:44.318179 systemd-logind[1467]: New session 2 of user core. Feb 13 04:56:44.320799 systemd[1]: Created slice user-500.slice. Feb 13 04:56:44.323796 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 04:56:44.347162 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 04:56:44.350921 systemd[1]: Starting user@500.service... Feb 13 04:56:44.358385 (systemd)[1543]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:44.446836 systemd[1543]: Queued start job for default target default.target. Feb 13 04:56:44.447069 systemd[1543]: Reached target paths.target. Feb 13 04:56:44.447080 systemd[1543]: Reached target sockets.target. Feb 13 04:56:44.447088 systemd[1543]: Reached target timers.target. Feb 13 04:56:44.447096 systemd[1543]: Reached target basic.target. Feb 13 04:56:44.447114 systemd[1543]: Reached target default.target. Feb 13 04:56:44.447127 systemd[1543]: Startup finished in 73ms. Feb 13 04:56:44.447178 systemd[1]: Started user@500.service. Feb 13 04:56:44.447732 systemd[1]: Started session-2.scope. Feb 13 04:56:44.594951 coreos-metadata[1430]: Feb 13 04:56:44.594 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 04:56:44.595726 coreos-metadata[1433]: Feb 13 04:56:44.594 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 04:56:45.292391 login[1539]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 04:56:45.295163 systemd-logind[1467]: New session 1 of user core. Feb 13 04:56:45.295673 systemd[1]: Started session-1.scope. Feb 13 04:56:45.595358 coreos-metadata[1430]: Feb 13 04:56:45.595 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 04:56:45.596109 coreos-metadata[1433]: Feb 13 04:56:45.595 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 04:56:46.191541 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 04:56:46.191695 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 04:56:46.666806 coreos-metadata[1430]: Feb 13 04:56:46.666 INFO Fetch successful Feb 13 04:56:46.667035 coreos-metadata[1433]: Feb 13 04:56:46.666 INFO Fetch successful Feb 13 04:56:46.689632 systemd[1]: Finished coreos-metadata.service. Feb 13 04:56:46.690345 unknown[1430]: wrote ssh authorized keys file for user: core Feb 13 04:56:46.690551 systemd[1]: Started packet-phone-home.service. Feb 13 04:56:46.696207 curl[1565]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 04:56:46.696387 curl[1565]: Dload Upload Total Spent Left Speed Feb 13 04:56:46.701189 update-ssh-keys[1566]: Updated "/home/core/.ssh/authorized_keys" Feb 13 04:56:46.701374 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 04:56:46.701623 systemd[1]: Reached target multi-user.target. Feb 13 04:56:46.702183 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 04:56:46.706149 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 04:56:46.706218 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 04:56:46.706372 systemd[1]: Startup finished in 1.847s (kernel) + 44.506s (initrd) + 15.370s (userspace) = 1min 1.724s. Feb 13 04:56:46.874995 curl[1565]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 04:56:46.877411 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 04:56:47.144130 systemd[1]: Created slice system-sshd.slice. Feb 13 04:56:47.144748 systemd[1]: Started sshd@0-139.178.90.239:22-139.178.68.195:54918.service. Feb 13 04:56:47.195628 sshd[1569]: Accepted publickey for core from 139.178.68.195 port 54918 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:47.198986 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:47.209050 systemd-logind[1467]: New session 3 of user core. Feb 13 04:56:47.211351 systemd[1]: Started session-3.scope. Feb 13 04:56:47.278943 systemd[1]: Started sshd@1-139.178.90.239:22-139.178.68.195:54920.service. Feb 13 04:56:47.316351 sshd[1574]: Accepted publickey for core from 139.178.68.195 port 54920 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:47.317089 sshd[1574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:47.319475 systemd-logind[1467]: New session 4 of user core. Feb 13 04:56:47.320013 systemd[1]: Started session-4.scope. Feb 13 04:56:47.370846 sshd[1574]: pam_unix(sshd:session): session closed for user core Feb 13 04:56:47.372302 systemd[1]: sshd@1-139.178.90.239:22-139.178.68.195:54920.service: Deactivated successfully. Feb 13 04:56:47.372604 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 04:56:47.372966 systemd-logind[1467]: Session 4 logged out. Waiting for processes to exit. Feb 13 04:56:47.373445 systemd[1]: Started sshd@2-139.178.90.239:22-139.178.68.195:54922.service. Feb 13 04:56:47.373889 systemd-logind[1467]: Removed session 4. Feb 13 04:56:47.411936 sshd[1580]: Accepted publickey for core from 139.178.68.195 port 54922 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:47.413055 sshd[1580]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:47.416985 systemd-logind[1467]: New session 5 of user core. Feb 13 04:56:47.417931 systemd[1]: Started session-5.scope. Feb 13 04:56:47.475221 sshd[1580]: pam_unix(sshd:session): session closed for user core Feb 13 04:56:47.481955 systemd[1]: sshd@2-139.178.90.239:22-139.178.68.195:54922.service: Deactivated successfully. Feb 13 04:56:47.483503 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 04:56:47.485212 systemd-logind[1467]: Session 5 logged out. Waiting for processes to exit. Feb 13 04:56:47.487806 systemd[1]: Started sshd@3-139.178.90.239:22-139.178.68.195:54928.service. Feb 13 04:56:47.490232 systemd-logind[1467]: Removed session 5. Feb 13 04:56:47.564177 sshd[1586]: Accepted publickey for core from 139.178.68.195 port 54928 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:47.567304 sshd[1586]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:47.577474 systemd-logind[1467]: New session 6 of user core. Feb 13 04:56:47.579819 systemd[1]: Started session-6.scope. Feb 13 04:56:47.659552 sshd[1586]: pam_unix(sshd:session): session closed for user core Feb 13 04:56:47.666165 systemd[1]: sshd@3-139.178.90.239:22-139.178.68.195:54928.service: Deactivated successfully. Feb 13 04:56:47.667725 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 04:56:47.669409 systemd-logind[1467]: Session 6 logged out. Waiting for processes to exit. Feb 13 04:56:47.672009 systemd[1]: Started sshd@4-139.178.90.239:22-139.178.68.195:54936.service. Feb 13 04:56:47.674491 systemd-logind[1467]: Removed session 6. Feb 13 04:56:47.712841 sshd[1592]: Accepted publickey for core from 139.178.68.195 port 54936 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:47.713764 sshd[1592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:47.716944 systemd-logind[1467]: New session 7 of user core. Feb 13 04:56:47.717595 systemd[1]: Started session-7.scope. Feb 13 04:56:47.799755 sudo[1595]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 04:56:47.800353 sudo[1595]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:56:47.822048 dbus-daemon[1436]: \xd0-\xf3"\xd5U: received setenforce notice (enforcing=-1716589008) Feb 13 04:56:47.826929 sudo[1595]: pam_unix(sudo:session): session closed for user root Feb 13 04:56:47.832078 sshd[1592]: pam_unix(sshd:session): session closed for user core Feb 13 04:56:47.839067 systemd[1]: sshd@4-139.178.90.239:22-139.178.68.195:54936.service: Deactivated successfully. Feb 13 04:56:47.840715 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 04:56:47.842455 systemd-logind[1467]: Session 7 logged out. Waiting for processes to exit. Feb 13 04:56:47.845073 systemd[1]: Started sshd@5-139.178.90.239:22-139.178.68.195:54940.service. Feb 13 04:56:47.847482 systemd-logind[1467]: Removed session 7. Feb 13 04:56:47.922476 sshd[1599]: Accepted publickey for core from 139.178.68.195 port 54940 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:47.925653 sshd[1599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:47.935614 systemd-logind[1467]: New session 8 of user core. Feb 13 04:56:47.937973 systemd[1]: Started session-8.scope. Feb 13 04:56:48.015726 sudo[1603]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 04:56:48.016313 sudo[1603]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:56:48.023466 sudo[1603]: pam_unix(sudo:session): session closed for user root Feb 13 04:56:48.035871 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 04:56:48.036485 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:56:48.060911 systemd[1]: Stopping audit-rules.service... Feb 13 04:56:48.062000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 04:56:48.064027 auditctl[1606]: No rules Feb 13 04:56:48.064828 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 04:56:48.065245 systemd[1]: Stopped audit-rules.service. Feb 13 04:56:48.069040 systemd[1]: Starting audit-rules.service... Feb 13 04:56:48.069473 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 13 04:56:48.069569 kernel: audit: type=1305 audit(1707800208.062:170): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 04:56:48.062000 audit[1606]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc50e94110 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:48.108053 augenrules[1623]: No rules Feb 13 04:56:48.108576 systemd[1]: Finished audit-rules.service. Feb 13 04:56:48.109276 sudo[1602]: pam_unix(sudo:session): session closed for user root Feb 13 04:56:48.110403 sshd[1599]: pam_unix(sshd:session): session closed for user core Feb 13 04:56:48.112755 systemd[1]: sshd@5-139.178.90.239:22-139.178.68.195:54940.service: Deactivated successfully. Feb 13 04:56:48.113227 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 04:56:48.113807 systemd-logind[1467]: Session 8 logged out. Waiting for processes to exit. Feb 13 04:56:48.114563 systemd[1]: Started sshd@6-139.178.90.239:22-139.178.68.195:54946.service. Feb 13 04:56:48.115248 systemd-logind[1467]: Removed session 8. Feb 13 04:56:48.116660 kernel: audit: type=1300 audit(1707800208.062:170): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc50e94110 a2=420 a3=0 items=0 ppid=1 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:48.116697 kernel: audit: type=1327 audit(1707800208.062:170): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 04:56:48.062000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 04:56:48.126192 kernel: audit: type=1131 audit(1707800208.063:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.148719 kernel: audit: type=1130 audit(1707800208.107:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.171157 kernel: audit: type=1106 audit(1707800208.107:173): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.107000 audit[1602]: USER_END pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.197153 kernel: audit: type=1104 audit(1707800208.107:174): pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.107000 audit[1602]: CRED_DISP pid=1602 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.203419 sshd[1629]: Accepted publickey for core from 139.178.68.195 port 54946 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 04:56:48.204762 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 04:56:48.207060 systemd-logind[1467]: New session 9 of user core. Feb 13 04:56:48.207476 systemd[1]: Started session-9.scope. Feb 13 04:56:48.220711 kernel: audit: type=1106 audit(1707800208.109:175): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.109000 audit[1599]: USER_END pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.252914 kernel: audit: type=1104 audit(1707800208.110:176): pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.110000 audit[1599]: CRED_DISP pid=1599 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.254515 sudo[1632]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 13 04:56:48.254622 sudo[1632]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 04:56:48.278926 kernel: audit: type=1131 audit(1707800208.112:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.239:22-139.178.68.195:54940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.239:22-139.178.68.195:54940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.239:22-139.178.68.195:54946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.202000 audit[1629]: USER_ACCT pid=1629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.204000 audit[1629]: CRED_ACQ pid=1629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.204000 audit[1629]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff51eea640 a2=3 a3=0 items=0 ppid=1 pid=1629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:48.204000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 04:56:48.208000 audit[1629]: USER_START pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.208000 audit[1631]: CRED_ACQ pid=1631 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:56:48.253000 audit[1632]: USER_ACCT pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.254000 audit[1632]: CRED_REFR pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:48.255000 audit[1632]: USER_START pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:56:52.303337 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 04:56:52.307546 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 04:56:52.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:52.307736 systemd[1]: Reached target network-online.target. Feb 13 04:56:52.308408 systemd[1]: Starting docker.service... Feb 13 04:56:52.329237 env[1654]: time="2024-02-13T04:56:52.329180297Z" level=info msg="Starting up" Feb 13 04:56:52.329970 env[1654]: time="2024-02-13T04:56:52.329955488Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 04:56:52.329970 env[1654]: time="2024-02-13T04:56:52.329967398Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 04:56:52.330058 env[1654]: time="2024-02-13T04:56:52.329980492Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 04:56:52.330058 env[1654]: time="2024-02-13T04:56:52.329987669Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 04:56:52.331541 env[1654]: time="2024-02-13T04:56:52.331526630Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 04:56:52.331541 env[1654]: time="2024-02-13T04:56:52.331538608Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 04:56:52.331614 env[1654]: time="2024-02-13T04:56:52.331551826Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 04:56:52.331614 env[1654]: time="2024-02-13T04:56:52.331558759Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 04:56:52.350253 env[1654]: time="2024-02-13T04:56:52.350197061Z" level=info msg="Loading containers: start." Feb 13 04:56:52.380000 audit[1702]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.380000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff8bb52ca0 a2=0 a3=7fff8bb52c8c items=0 ppid=1654 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.380000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 13 04:56:52.381000 audit[1704]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.381000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc4ecc8e60 a2=0 a3=7ffc4ecc8e4c items=0 ppid=1654 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.381000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 13 04:56:52.382000 audit[1706]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.382000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd57f80510 a2=0 a3=7ffd57f804fc items=0 ppid=1654 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.382000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 04:56:52.383000 audit[1708]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.383000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff5da64fc0 a2=0 a3=7fff5da64fac items=0 ppid=1654 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.383000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 04:56:52.385000 audit[1710]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.385000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7953dba0 a2=0 a3=7ffe7953db8c items=0 ppid=1654 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.385000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 13 04:56:52.413000 audit[1715]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.413000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe1857a360 a2=0 a3=7ffe1857a34c items=0 ppid=1654 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.413000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 13 04:56:52.438000 audit[1717]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.438000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed7f693b0 a2=0 a3=7ffed7f6939c items=0 ppid=1654 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 13 04:56:52.443000 audit[1719]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.443000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdbdc200c0 a2=0 a3=7ffdbdc200ac items=0 ppid=1654 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.443000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 13 04:56:52.448000 audit[1721]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.448000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe2181ca30 a2=0 a3=7ffe2181ca1c items=0 ppid=1654 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 04:56:52.463000 audit[1725]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.463000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdbfd40c80 a2=0 a3=7ffdbfd40c6c items=0 ppid=1654 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 04:56:52.464000 audit[1726]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.464000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffc6c2e530 a2=0 a3=7fffc6c2e51c items=0 ppid=1654 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.464000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 04:56:52.491541 kernel: Initializing XFRM netlink socket Feb 13 04:56:52.552587 env[1654]: time="2024-02-13T04:56:52.552570239Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 04:56:52.553288 systemd-timesyncd[1423]: Network configuration changed, trying to establish connection. Feb 13 04:56:52.562000 audit[1734]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.562000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcf90e0820 a2=0 a3=7ffcf90e080c items=0 ppid=1654 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 13 04:56:52.574000 audit[1737]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.574000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff965cae70 a2=0 a3=7fff965cae5c items=0 ppid=1654 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 13 04:56:52.576000 audit[1740]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.576000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffed3c869e0 a2=0 a3=7ffed3c869cc items=0 ppid=1654 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 13 04:56:52.576000 audit[1742]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.576000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcf7846ea0 a2=0 a3=7ffcf7846e8c items=0 ppid=1654 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 13 04:56:52.578000 audit[1744]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.578000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc3e911b60 a2=0 a3=7ffc3e911b4c items=0 ppid=1654 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 13 04:56:52.578000 audit[1746]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.578000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffea47e4510 a2=0 a3=7ffea47e44fc items=0 ppid=1654 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.578000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 13 04:56:52.580000 audit[1748]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.580000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe13bd1350 a2=0 a3=7ffe13bd133c items=0 ppid=1654 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.580000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 13 04:56:52.584000 audit[1751]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.584000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe00450670 a2=0 a3=7ffe0045065c items=0 ppid=1654 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.584000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 13 04:56:52.586000 audit[1753]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.586000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffeef1aea0 a2=0 a3=7fffeef1ae8c items=0 ppid=1654 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.586000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 04:56:52.587000 audit[1755]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.587000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff8eb98150 a2=0 a3=7fff8eb9813c items=0 ppid=1654 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.587000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 04:56:52.588000 audit[1757]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.588000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd247a77e0 a2=0 a3=7ffd247a77cc items=0 ppid=1654 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 13 04:56:52.589716 systemd-networkd[1317]: docker0: Link UP Feb 13 04:56:52.591000 audit[1761]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.591000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa8f4d070 a2=0 a3=7fffa8f4d05c items=0 ppid=1654 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 04:56:52.593000 audit[1762]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:56:52.593000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc21d56a90 a2=0 a3=7ffc21d56a7c items=0 ppid=1654 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:56:52.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 04:56:52.593760 env[1654]: time="2024-02-13T04:56:52.593719726Z" level=info msg="Loading containers: done." Feb 13 04:56:52.598617 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1798521918-merged.mount: Deactivated successfully. Feb 13 04:56:52.601363 env[1654]: time="2024-02-13T04:56:52.601320341Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 04:56:52.601424 env[1654]: time="2024-02-13T04:56:52.601407797Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 04:56:52.601465 env[1654]: time="2024-02-13T04:56:52.601456731Z" level=info msg="Daemon has completed initialization" Feb 13 04:56:52.626627 systemd[1]: Started docker.service. Feb 13 04:56:52.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:52.629745 env[1654]: time="2024-02-13T04:56:52.629718173Z" level=info msg="API listen on /run/docker.sock" Feb 13 04:56:52.646832 systemd[1]: Reloading. Feb 13 04:56:52.702387 /usr/lib/systemd/system-generators/torcx-generator[1812]: time="2024-02-13T04:56:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 04:56:52.702402 /usr/lib/systemd/system-generators/torcx-generator[1812]: time="2024-02-13T04:56:52Z" level=info msg="torcx already run" Feb 13 04:56:52.753810 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 04:56:52.753819 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 04:56:52.766265 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit: BPF prog-id=37 op=LOAD Feb 13 04:56:52.811000 audit: BPF prog-id=26 op=UNLOAD Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit: BPF prog-id=38 op=LOAD Feb 13 04:56:52.812000 audit: BPF prog-id=35 op=UNLOAD Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit: BPF prog-id=39 op=LOAD Feb 13 04:56:52.812000 audit: BPF prog-id=21 op=UNLOAD Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit: BPF prog-id=40 op=LOAD Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.812000 audit: BPF prog-id=41 op=LOAD Feb 13 04:56:52.812000 audit: BPF prog-id=22 op=UNLOAD Feb 13 04:56:52.812000 audit: BPF prog-id=23 op=UNLOAD Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.813000 audit: BPF prog-id=42 op=LOAD Feb 13 04:56:52.813000 audit: BPF prog-id=31 op=UNLOAD Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit: BPF prog-id=43 op=LOAD Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit: BPF prog-id=44 op=LOAD Feb 13 04:56:52.814000 audit: BPF prog-id=24 op=UNLOAD Feb 13 04:56:52.814000 audit: BPF prog-id=25 op=UNLOAD Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.814000 audit: BPF prog-id=45 op=LOAD Feb 13 04:56:52.814000 audit: BPF prog-id=30 op=UNLOAD Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit: BPF prog-id=46 op=LOAD Feb 13 04:56:52.815000 audit: BPF prog-id=32 op=UNLOAD Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit: BPF prog-id=47 op=LOAD Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.815000 audit: BPF prog-id=48 op=LOAD Feb 13 04:56:52.815000 audit: BPF prog-id=33 op=UNLOAD Feb 13 04:56:52.815000 audit: BPF prog-id=34 op=UNLOAD Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit: BPF prog-id=49 op=LOAD Feb 13 04:56:52.816000 audit: BPF prog-id=27 op=UNLOAD Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit: BPF prog-id=50 op=LOAD Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:56:52.817000 audit: BPF prog-id=51 op=LOAD Feb 13 04:56:52.817000 audit: BPF prog-id=28 op=UNLOAD Feb 13 04:56:52.817000 audit: BPF prog-id=29 op=UNLOAD Feb 13 04:56:52.821679 systemd[1]: Started kubelet.service. Feb 13 04:56:52.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:56:52.843795 kubelet[1871]: E0213 04:56:52.843695 1871 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 13 04:56:52.844877 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 04:56:52.844945 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 04:56:52.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 04:56:53.013145 systemd-timesyncd[1423]: Contacted time server [2603:c020:0:8369::feeb:dab]:123 (2.flatcar.pool.ntp.org). Feb 13 04:56:53.013285 systemd-timesyncd[1423]: Initial clock synchronization to Tue 2024-02-13 04:56:53.131851 UTC. Feb 13 04:56:53.793234 env[1479]: time="2024-02-13T04:56:53.793136680Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 13 04:56:54.530539 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount53196035.mount: Deactivated successfully. Feb 13 04:56:55.999956 env[1479]: time="2024-02-13T04:56:55.999895868Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:56.000473 env[1479]: time="2024-02-13T04:56:56.000441754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:56.001531 env[1479]: time="2024-02-13T04:56:56.001516093Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:56.002733 env[1479]: time="2024-02-13T04:56:56.002718356Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:56.003076 env[1479]: time="2024-02-13T04:56:56.003061149Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 13 04:56:56.008585 env[1479]: time="2024-02-13T04:56:56.008511175Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 13 04:56:57.864542 env[1479]: time="2024-02-13T04:56:57.864512447Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:57.865184 env[1479]: time="2024-02-13T04:56:57.865171116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:57.866314 env[1479]: time="2024-02-13T04:56:57.866271094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:57.867584 env[1479]: time="2024-02-13T04:56:57.867542495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:57.868036 env[1479]: time="2024-02-13T04:56:57.867978138Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 13 04:56:57.878254 env[1479]: time="2024-02-13T04:56:57.878184886Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 13 04:56:59.094064 env[1479]: time="2024-02-13T04:56:59.094015483Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:59.094640 env[1479]: time="2024-02-13T04:56:59.094592152Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:59.095549 env[1479]: time="2024-02-13T04:56:59.095494236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:59.096510 env[1479]: time="2024-02-13T04:56:59.096496765Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:56:59.097016 env[1479]: time="2024-02-13T04:56:59.097000637Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 13 04:56:59.102703 env[1479]: time="2024-02-13T04:56:59.102687012Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 13 04:57:00.055383 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount62857350.mount: Deactivated successfully. Feb 13 04:57:00.499999 env[1479]: time="2024-02-13T04:57:00.499926906Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:00.500542 env[1479]: time="2024-02-13T04:57:00.500529933Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:00.501301 env[1479]: time="2024-02-13T04:57:00.501288946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:00.501980 env[1479]: time="2024-02-13T04:57:00.501931754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:00.502280 env[1479]: time="2024-02-13T04:57:00.502233514Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 13 04:57:00.507697 env[1479]: time="2024-02-13T04:57:00.507616564Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 13 04:57:01.027495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3791438032.mount: Deactivated successfully. Feb 13 04:57:01.028847 env[1479]: time="2024-02-13T04:57:01.028799141Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:01.029394 env[1479]: time="2024-02-13T04:57:01.029372281Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:01.030160 env[1479]: time="2024-02-13T04:57:01.030133654Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:01.030860 env[1479]: time="2024-02-13T04:57:01.030847316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:01.031211 env[1479]: time="2024-02-13T04:57:01.031196116Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 13 04:57:01.036958 env[1479]: time="2024-02-13T04:57:01.036942842Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 13 04:57:01.700983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1528312864.mount: Deactivated successfully. Feb 13 04:57:02.945651 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 13 04:57:02.945886 systemd[1]: Stopped kubelet.service. Feb 13 04:57:02.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:02.947032 systemd[1]: Started kubelet.service. Feb 13 04:57:02.951564 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 13 04:57:02.951602 kernel: audit: type=1130 audit(1707800222.944:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:02.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:02.974500 kernel: audit: type=1131 audit(1707800222.944:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:02.977821 kubelet[1958]: E0213 04:57:02.977776 1958 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 13 04:57:02.979958 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 04:57:02.980047 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 04:57:02.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:03.068515 kernel: audit: type=1130 audit(1707800222.945:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:03.068552 kernel: audit: type=1131 audit(1707800222.978:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 04:57:02.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 04:57:04.582924 env[1479]: time="2024-02-13T04:57:04.582873365Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:04.583474 env[1479]: time="2024-02-13T04:57:04.583429886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:04.584305 env[1479]: time="2024-02-13T04:57:04.584261899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:04.585429 env[1479]: time="2024-02-13T04:57:04.585394507Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:04.585694 env[1479]: time="2024-02-13T04:57:04.585642318Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 13 04:57:04.591258 env[1479]: time="2024-02-13T04:57:04.591203022Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 13 04:57:05.187369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3620512949.mount: Deactivated successfully. Feb 13 04:57:05.720389 env[1479]: time="2024-02-13T04:57:05.720339129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:05.720995 env[1479]: time="2024-02-13T04:57:05.720984257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:05.721691 env[1479]: time="2024-02-13T04:57:05.721647688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:05.722307 env[1479]: time="2024-02-13T04:57:05.722260905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:05.722669 env[1479]: time="2024-02-13T04:57:05.722620016Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 13 04:57:07.457839 systemd[1]: Stopped kubelet.service. Feb 13 04:57:07.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:07.469641 systemd[1]: Reloading. Feb 13 04:57:07.496163 /usr/lib/systemd/system-generators/torcx-generator[2131]: time="2024-02-13T04:57:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 04:57:07.496188 /usr/lib/systemd/system-generators/torcx-generator[2131]: time="2024-02-13T04:57:07Z" level=info msg="torcx already run" Feb 13 04:57:07.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:07.518510 kernel: audit: type=1130 audit(1707800227.456:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:07.518566 kernel: audit: type=1131 audit(1707800227.456:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:07.595777 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 04:57:07.595784 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 04:57:07.606545 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.774818 kernel: audit: type=1400 audit(1707800227.652:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.774869 kernel: audit: type=1400 audit(1707800227.652:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.774885 kernel: audit: type=1400 audit(1707800227.652:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900633 kernel: audit: type=1400 audit(1707800227.652:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit: BPF prog-id=52 op=LOAD Feb 13 04:57:07.773000 audit: BPF prog-id=37 op=UNLOAD Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit: BPF prog-id=53 op=LOAD Feb 13 04:57:07.900000 audit: BPF prog-id=38 op=UNLOAD Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit: BPF prog-id=54 op=LOAD Feb 13 04:57:07.900000 audit: BPF prog-id=39 op=UNLOAD Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit: BPF prog-id=55 op=LOAD Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit: BPF prog-id=56 op=LOAD Feb 13 04:57:07.901000 audit: BPF prog-id=40 op=UNLOAD Feb 13 04:57:07.901000 audit: BPF prog-id=41 op=UNLOAD Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.901000 audit: BPF prog-id=57 op=LOAD Feb 13 04:57:07.901000 audit: BPF prog-id=42 op=UNLOAD Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit: BPF prog-id=58 op=LOAD Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit: BPF prog-id=59 op=LOAD Feb 13 04:57:07.902000 audit: BPF prog-id=43 op=UNLOAD Feb 13 04:57:07.902000 audit: BPF prog-id=44 op=UNLOAD Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.902000 audit: BPF prog-id=60 op=LOAD Feb 13 04:57:07.903000 audit: BPF prog-id=45 op=UNLOAD Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit: BPF prog-id=61 op=LOAD Feb 13 04:57:07.903000 audit: BPF prog-id=46 op=UNLOAD Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit: BPF prog-id=62 op=LOAD Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.903000 audit: BPF prog-id=63 op=LOAD Feb 13 04:57:07.904000 audit: BPF prog-id=47 op=UNLOAD Feb 13 04:57:07.904000 audit: BPF prog-id=48 op=UNLOAD Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.904000 audit: BPF prog-id=64 op=LOAD Feb 13 04:57:07.904000 audit: BPF prog-id=49 op=UNLOAD Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit: BPF prog-id=65 op=LOAD Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:07.905000 audit: BPF prog-id=66 op=LOAD Feb 13 04:57:07.905000 audit: BPF prog-id=50 op=UNLOAD Feb 13 04:57:07.905000 audit: BPF prog-id=51 op=UNLOAD Feb 13 04:57:07.912569 systemd[1]: Started kubelet.service. Feb 13 04:57:07.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:07.935015 kubelet[2190]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 04:57:07.935015 kubelet[2190]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 13 04:57:07.935015 kubelet[2190]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 04:57:07.935015 kubelet[2190]: I0213 04:57:07.934997 2190 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 04:57:08.290190 kubelet[2190]: I0213 04:57:08.290151 2190 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 13 04:57:08.290190 kubelet[2190]: I0213 04:57:08.290163 2190 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 04:57:08.290290 kubelet[2190]: I0213 04:57:08.290277 2190 server.go:837] "Client rotation is on, will bootstrap in background" Feb 13 04:57:08.292801 kubelet[2190]: I0213 04:57:08.292771 2190 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 04:57:08.293330 kubelet[2190]: E0213 04:57:08.293301 2190 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.90.239:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.311213 kubelet[2190]: I0213 04:57:08.311182 2190 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 04:57:08.311312 kubelet[2190]: I0213 04:57:08.311306 2190 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 04:57:08.311346 kubelet[2190]: I0213 04:57:08.311342 2190 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 04:57:08.311420 kubelet[2190]: I0213 04:57:08.311352 2190 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 04:57:08.311420 kubelet[2190]: I0213 04:57:08.311358 2190 container_manager_linux.go:302] "Creating device plugin manager" Feb 13 04:57:08.311420 kubelet[2190]: I0213 04:57:08.311413 2190 state_mem.go:36] "Initialized new in-memory state store" Feb 13 04:57:08.312979 kubelet[2190]: I0213 04:57:08.312971 2190 kubelet.go:405] "Attempting to sync node with API server" Feb 13 04:57:08.313012 kubelet[2190]: I0213 04:57:08.312982 2190 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 04:57:08.313012 kubelet[2190]: I0213 04:57:08.313000 2190 kubelet.go:309] "Adding apiserver pod source" Feb 13 04:57:08.313012 kubelet[2190]: I0213 04:57:08.313008 2190 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 04:57:08.313294 kubelet[2190]: I0213 04:57:08.313286 2190 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 04:57:08.313316 kubelet[2190]: W0213 04:57:08.313293 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.90.239:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-01dc72b3af&limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.313316 kubelet[2190]: W0213 04:57:08.313294 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.90.239:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.313353 kubelet[2190]: E0213 04:57:08.313334 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.90.239:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.313353 kubelet[2190]: E0213 04:57:08.313334 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.90.239:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-01dc72b3af&limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.313420 kubelet[2190]: W0213 04:57:08.313415 2190 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 13 04:57:08.313667 kubelet[2190]: I0213 04:57:08.313661 2190 server.go:1168] "Started kubelet" Feb 13 04:57:08.313711 kubelet[2190]: I0213 04:57:08.313706 2190 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 04:57:08.313803 kubelet[2190]: I0213 04:57:08.313788 2190 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 13 04:57:08.313910 kubelet[2190]: E0213 04:57:08.313900 2190 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 04:57:08.313943 kubelet[2190]: E0213 04:57:08.313917 2190 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 04:57:08.313967 kubelet[2190]: E0213 04:57:08.313915 2190 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-01dc72b3af.17b3534263f75ca8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-01dc72b3af", UID:"ci-3510.3.2-a-01dc72b3af", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-01dc72b3af"}, FirstTimestamp:time.Date(2024, time.February, 13, 4, 57, 8, 313652392, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 4, 57, 8, 313652392, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://139.178.90.239:6443/api/v1/namespaces/default/events": dial tcp 139.178.90.239:6443: connect: connection refused'(may retry after sleeping) Feb 13 04:57:08.314447 kubelet[2190]: I0213 04:57:08.314435 2190 server.go:461] "Adding debug handlers to kubelet server" Feb 13 04:57:08.314000 audit[2190]: AVC avc: denied { mac_admin } for pid=2190 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:08.314556 kubelet[2190]: I0213 04:57:08.314490 2190 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 04:57:08.314556 kubelet[2190]: I0213 04:57:08.314519 2190 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 04:57:08.314615 kubelet[2190]: I0213 04:57:08.314564 2190 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 04:57:08.314775 kubelet[2190]: I0213 04:57:08.314754 2190 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 13 04:57:08.315227 kubelet[2190]: I0213 04:57:08.314864 2190 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 13 04:57:08.315271 kubelet[2190]: W0213 04:57:08.315217 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.90.239:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.315305 kubelet[2190]: E0213 04:57:08.315277 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.90.239:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.315341 kubelet[2190]: E0213 04:57:08.315331 2190 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.239:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-01dc72b3af?timeout=10s\": dial tcp 139.178.90.239:6443: connect: connection refused" interval="200ms" Feb 13 04:57:08.341911 kernel: kauditd_printk_skb: 169 callbacks suppressed Feb 13 04:57:08.341989 kernel: audit: type=1400 audit(1707800228.314:566): avc: denied { mac_admin } for pid=2190 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:08.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:08.440221 kernel: audit: type=1401 audit(1707800228.314:566): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:08.440251 kernel: audit: type=1300 audit(1707800228.314:566): arch=c000003e syscall=188 success=no exit=-22 a0=c000966120 a1=c000964150 a2=c0009660f0 a3=25 items=0 ppid=1 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.314000 audit[2190]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000966120 a1=c000964150 a2=c0009660f0 a3=25 items=0 ppid=1 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.461750 kubelet[2190]: I0213 04:57:08.461711 2190 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:08.461921 kubelet[2190]: E0213 04:57:08.461882 2190 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.239:6443/api/v1/nodes\": dial tcp 139.178.90.239:6443: connect: connection refused" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:08.462026 kubelet[2190]: I0213 04:57:08.462001 2190 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 04:57:08.462026 kubelet[2190]: I0213 04:57:08.462008 2190 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 04:57:08.462026 kubelet[2190]: I0213 04:57:08.462015 2190 state_mem.go:36] "Initialized new in-memory state store" Feb 13 04:57:08.462753 kubelet[2190]: I0213 04:57:08.462717 2190 policy_none.go:49] "None policy: Start" Feb 13 04:57:08.462960 kubelet[2190]: I0213 04:57:08.462924 2190 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 04:57:08.462960 kubelet[2190]: I0213 04:57:08.462935 2190 state_mem.go:35] "Initializing new in-memory state store" Feb 13 04:57:08.465519 systemd[1]: Created slice kubepods.slice. Feb 13 04:57:08.467572 systemd[1]: Created slice kubepods-burstable.slice. Feb 13 04:57:08.468993 systemd[1]: Created slice kubepods-besteffort.slice. Feb 13 04:57:08.515654 kubelet[2190]: E0213 04:57:08.515618 2190 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.239:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-01dc72b3af?timeout=10s\": dial tcp 139.178.90.239:6443: connect: connection refused" interval="400ms" Feb 13 04:57:08.535363 kernel: audit: type=1327 audit(1707800228.314:566): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:08.314000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:08.627813 kernel: audit: type=1400 audit(1707800228.314:567): avc: denied { mac_admin } for pid=2190 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:08.314000 audit[2190]: AVC avc: denied { mac_admin } for pid=2190 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:08.628921 kubelet[2190]: I0213 04:57:08.628912 2190 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 04:57:08.629374 kubelet[2190]: I0213 04:57:08.629366 2190 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 04:57:08.629416 kubelet[2190]: I0213 04:57:08.629382 2190 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 13 04:57:08.629416 kubelet[2190]: I0213 04:57:08.629397 2190 kubelet.go:2257] "Starting kubelet main sync loop" Feb 13 04:57:08.629475 kubelet[2190]: E0213 04:57:08.629440 2190 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 13 04:57:08.629640 kubelet[2190]: W0213 04:57:08.629618 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.90.239:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.629669 kubelet[2190]: E0213 04:57:08.629646 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.90.239:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:08.662750 kubelet[2190]: I0213 04:57:08.662710 2190 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:08.662905 kubelet[2190]: E0213 04:57:08.662867 2190 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.239:6443/api/v1/nodes\": dial tcp 139.178.90.239:6443: connect: connection refused" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:08.691411 kernel: audit: type=1401 audit(1707800228.314:567): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:08.314000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:08.723908 kernel: audit: type=1300 audit(1707800228.314:567): arch=c000003e syscall=188 success=no exit=-22 a0=c000336500 a1=c000964168 a2=c0009661b0 a3=25 items=0 ppid=1 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.314000 audit[2190]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000336500 a1=c000964168 a2=c0009661b0 a3=25 items=0 ppid=1 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.730062 kubelet[2190]: E0213 04:57:08.730014 2190 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 13 04:57:08.818478 kernel: audit: type=1327 audit(1707800228.314:567): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:08.314000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:08.909991 kernel: audit: type=1325 audit(1707800228.315:568): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.315000 audit[2215]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.916504 kubelet[2190]: E0213 04:57:08.916467 2190 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.239:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-01dc72b3af?timeout=10s\": dial tcp 139.178.90.239:6443: connect: connection refused" interval="800ms" Feb 13 04:57:08.930637 kubelet[2190]: E0213 04:57:08.930593 2190 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 13 04:57:08.967211 kernel: audit: type=1300 audit(1707800228.315:568): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef8c9ca90 a2=0 a3=7ffef8c9ca7c items=0 ppid=2190 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.315000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffef8c9ca90 a2=0 a3=7ffef8c9ca7c items=0 ppid=2190 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.970000 kubelet[2190]: I0213 04:57:08.969954 2190 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 04:57:08.970000 kubelet[2190]: I0213 04:57:08.969983 2190 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 04:57:08.970187 kubelet[2190]: I0213 04:57:08.970080 2190 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 04:57:08.970289 kubelet[2190]: E0213 04:57:08.970282 2190 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-01dc72b3af\" not found" Feb 13 04:57:08.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 04:57:08.316000 audit[2216]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.316000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5fa243d0 a2=0 a3=7ffd5fa243bc items=0 ppid=2190 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 04:57:08.317000 audit[2218]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.317000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3cf97850 a2=0 a3=7ffe3cf9783c items=0 ppid=2190 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 04:57:08.318000 audit[2220]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.318000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb5a83380 a2=0 a3=7fffb5a8336c items=0 ppid=2190 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 04:57:08.627000 audit[2224]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.627000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffddc2c5980 a2=0 a3=7ffddc2c596c items=0 ppid=2190 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 13 04:57:08.627000 audit[2225]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:08.627000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd746b0730 a2=0 a3=7ffd746b071c items=0 ppid=2190 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.627000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 04:57:08.628000 audit[2226]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.628000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc78a82580 a2=0 a3=7ffc78a8256c items=0 ppid=2190 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 04:57:08.628000 audit[2227]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:08.628000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff1d9c7d40 a2=0 a3=7fff1d9c7d2c items=0 ppid=2190 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 04:57:08.628000 audit[2228]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.628000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0694ed40 a2=0 a3=7ffe0694ed2c items=0 ppid=2190 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 04:57:08.628000 audit[2229]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:08.628000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd99c815a0 a2=0 a3=7ffd99c8158c items=0 ppid=2190 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 04:57:08.629000 audit[2230]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:08.629000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8595ac70 a2=0 a3=7fff8595ac5c items=0 ppid=2190 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 04:57:08.629000 audit[2231]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:08.629000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe130425f0 a2=0 a3=7ffe130425dc items=0 ppid=2190 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 04:57:08.968000 audit[2190]: AVC avc: denied { mac_admin } for pid=2190 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:08.968000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:08.968000 audit[2190]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010b0570 a1=c000965848 a2=c0010b0540 a3=25 items=0 ppid=1 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:08.968000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:09.064395 kubelet[2190]: I0213 04:57:09.064386 2190 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.064554 kubelet[2190]: E0213 04:57:09.064519 2190 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.239:6443/api/v1/nodes\": dial tcp 139.178.90.239:6443: connect: connection refused" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.312357 kubelet[2190]: W0213 04:57:09.312250 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.90.239:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.312357 kubelet[2190]: E0213 04:57:09.312337 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.90.239:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.331555 kubelet[2190]: I0213 04:57:09.331466 2190 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:09.335235 kubelet[2190]: I0213 04:57:09.335160 2190 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:09.340935 kubelet[2190]: I0213 04:57:09.340852 2190 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:09.345616 systemd[1]: Created slice kubepods-burstable-poddc1cb34c627bcda3d1609de4af27d1f2.slice. Feb 13 04:57:09.383668 systemd[1]: Created slice kubepods-burstable-poded264fa4adbdbce6de1dd0d6137d2cbb.slice. Feb 13 04:57:09.386417 systemd[1]: Created slice kubepods-burstable-pod0e1d70e2fe3f0da00095a1d2a91b078e.slice. Feb 13 04:57:09.420941 kubelet[2190]: I0213 04:57:09.420829 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.420941 kubelet[2190]: I0213 04:57:09.420926 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421319 kubelet[2190]: I0213 04:57:09.420987 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ed264fa4adbdbce6de1dd0d6137d2cbb-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-01dc72b3af\" (UID: \"ed264fa4adbdbce6de1dd0d6137d2cbb\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421319 kubelet[2190]: I0213 04:57:09.421048 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc1cb34c627bcda3d1609de4af27d1f2-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" (UID: \"dc1cb34c627bcda3d1609de4af27d1f2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421319 kubelet[2190]: I0213 04:57:09.421107 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc1cb34c627bcda3d1609de4af27d1f2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" (UID: \"dc1cb34c627bcda3d1609de4af27d1f2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421319 kubelet[2190]: I0213 04:57:09.421198 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc1cb34c627bcda3d1609de4af27d1f2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" (UID: \"dc1cb34c627bcda3d1609de4af27d1f2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421678 kubelet[2190]: I0213 04:57:09.421337 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421678 kubelet[2190]: I0213 04:57:09.421436 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.421678 kubelet[2190]: I0213 04:57:09.421578 2190 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.465251 kubelet[2190]: W0213 04:57:09.465074 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.90.239:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.465251 kubelet[2190]: E0213 04:57:09.465217 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.90.239:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.679492 kubelet[2190]: W0213 04:57:09.679202 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.90.239:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-01dc72b3af&limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.679492 kubelet[2190]: E0213 04:57:09.679336 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.90.239:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-01dc72b3af&limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.682851 env[1479]: time="2024-02-13T04:57:09.682729431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-01dc72b3af,Uid:dc1cb34c627bcda3d1609de4af27d1f2,Namespace:kube-system,Attempt:0,}" Feb 13 04:57:09.687131 env[1479]: time="2024-02-13T04:57:09.686995425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-01dc72b3af,Uid:ed264fa4adbdbce6de1dd0d6137d2cbb,Namespace:kube-system,Attempt:0,}" Feb 13 04:57:09.690707 env[1479]: time="2024-02-13T04:57:09.690586536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-01dc72b3af,Uid:0e1d70e2fe3f0da00095a1d2a91b078e,Namespace:kube-system,Attempt:0,}" Feb 13 04:57:09.717833 kubelet[2190]: E0213 04:57:09.717745 2190 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.90.239:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-01dc72b3af?timeout=10s\": dial tcp 139.178.90.239:6443: connect: connection refused" interval="1.6s" Feb 13 04:57:09.807493 kubelet[2190]: W0213 04:57:09.807333 2190 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.90.239:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.807493 kubelet[2190]: E0213 04:57:09.807496 2190 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.90.239:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:09.868857 kubelet[2190]: I0213 04:57:09.868763 2190 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:09.869464 kubelet[2190]: E0213 04:57:09.869378 2190 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.90.239:6443/api/v1/nodes\": dial tcp 139.178.90.239:6443: connect: connection refused" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:10.187879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3313092876.mount: Deactivated successfully. Feb 13 04:57:10.198283 env[1479]: time="2024-02-13T04:57:10.198174350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.202081 env[1479]: time="2024-02-13T04:57:10.201980987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.207035 env[1479]: time="2024-02-13T04:57:10.206919020Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.218250 env[1479]: time="2024-02-13T04:57:10.218173645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.225747 env[1479]: time="2024-02-13T04:57:10.225645742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.231724 env[1479]: time="2024-02-13T04:57:10.231649175Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.234230 env[1479]: time="2024-02-13T04:57:10.234167675Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.236326 env[1479]: time="2024-02-13T04:57:10.236238000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.238141 env[1479]: time="2024-02-13T04:57:10.238070161Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.240262 env[1479]: time="2024-02-13T04:57:10.240194567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.242524 env[1479]: time="2024-02-13T04:57:10.242404103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.244904 env[1479]: time="2024-02-13T04:57:10.244823584Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:10.245631 env[1479]: time="2024-02-13T04:57:10.245597290Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:10.245631 env[1479]: time="2024-02-13T04:57:10.245620287Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:10.245631 env[1479]: time="2024-02-13T04:57:10.245627017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:10.245713 env[1479]: time="2024-02-13T04:57:10.245694677Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d801d0b62dad81ff5b755ea6df96e2d7f5c26d81e4d946c39b2e92e1aac7f47e pid=2241 runtime=io.containerd.runc.v2 Feb 13 04:57:10.246923 env[1479]: time="2024-02-13T04:57:10.246897852Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:10.246923 env[1479]: time="2024-02-13T04:57:10.246916595Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:10.246988 env[1479]: time="2024-02-13T04:57:10.246923647Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:10.247018 env[1479]: time="2024-02-13T04:57:10.246982628Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4657995deb11637fe9f8a7fa4de7c538cb2d5e1e37284d657517fe3e8a8ad86a pid=2259 runtime=io.containerd.runc.v2 Feb 13 04:57:10.247409 env[1479]: time="2024-02-13T04:57:10.247373143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:10.247450 env[1479]: time="2024-02-13T04:57:10.247404194Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:10.247450 env[1479]: time="2024-02-13T04:57:10.247415867Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:10.247521 env[1479]: time="2024-02-13T04:57:10.247501939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08bc74b76f6f37a547fec5bb5d04e24f362f321792124a050a1045f180db6d44 pid=2269 runtime=io.containerd.runc.v2 Feb 13 04:57:10.252001 systemd[1]: Started cri-containerd-d801d0b62dad81ff5b755ea6df96e2d7f5c26d81e4d946c39b2e92e1aac7f47e.scope. Feb 13 04:57:10.254028 systemd[1]: Started cri-containerd-08bc74b76f6f37a547fec5bb5d04e24f362f321792124a050a1045f180db6d44.scope. Feb 13 04:57:10.254779 systemd[1]: Started cri-containerd-4657995deb11637fe9f8a7fa4de7c538cb2d5e1e37284d657517fe3e8a8ad86a.scope. Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit: BPF prog-id=67 op=LOAD Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2241 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303164306236326461643831666635623735356561366466393665 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=2241 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303164306236326461643831666635623735356561366466393665 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit: BPF prog-id=68 op=LOAD Feb 13 04:57:10.258000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001959d8 a2=78 a3=c00009ef50 items=0 ppid=2241 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303164306236326461643831666635623735356561366466393665 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit: BPF prog-id=69 op=LOAD Feb 13 04:57:10.258000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000195770 a2=78 a3=c00009ef98 items=0 ppid=2241 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303164306236326461643831666635623735356561366466393665 Feb 13 04:57:10.258000 audit: BPF prog-id=69 op=UNLOAD Feb 13 04:57:10.258000 audit: BPF prog-id=68 op=UNLOAD Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit: BPF prog-id=70 op=LOAD Feb 13 04:57:10.258000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000195c30 a2=78 a3=c00009f3a8 items=0 ppid=2241 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438303164306236326461643831666635623735356561366466393665 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit: BPF prog-id=71 op=LOAD Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626337346237366636663337613534376665633562623564303465 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626337346237366636663337613534376665633562623564303465 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit: BPF prog-id=72 op=LOAD Feb 13 04:57:10.259000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000255150 items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626337346237366636663337613534376665633562623564303465 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit: BPF prog-id=73 op=LOAD Feb 13 04:57:10.259000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000255198 items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626337346237366636663337613534376665633562623564303465 Feb 13 04:57:10.259000 audit: BPF prog-id=73 op=UNLOAD Feb 13 04:57:10.259000 audit: BPF prog-id=72 op=UNLOAD Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit: BPF prog-id=74 op=LOAD Feb 13 04:57:10.259000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0002555a8 items=0 ppid=2269 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.259000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626337346237366636663337613534376665633562623564303465 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit: BPF prog-id=75 op=LOAD Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436353739393564656231313633376665396638613766613464653763 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436353739393564656231313633376665396638613766613464653763 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit: BPF prog-id=76 op=LOAD Feb 13 04:57:10.260000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a1e10 items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436353739393564656231313633376665396638613766613464653763 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit: BPF prog-id=77 op=LOAD Feb 13 04:57:10.260000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a1e58 items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436353739393564656231313633376665396638613766613464653763 Feb 13 04:57:10.260000 audit: BPF prog-id=77 op=UNLOAD Feb 13 04:57:10.260000 audit: BPF prog-id=76 op=UNLOAD Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.260000 audit: BPF prog-id=78 op=LOAD Feb 13 04:57:10.260000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000402268 items=0 ppid=2259 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436353739393564656231313633376665396638613766613464653763 Feb 13 04:57:10.275625 env[1479]: time="2024-02-13T04:57:10.275586233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-01dc72b3af,Uid:dc1cb34c627bcda3d1609de4af27d1f2,Namespace:kube-system,Attempt:0,} returns sandbox id \"d801d0b62dad81ff5b755ea6df96e2d7f5c26d81e4d946c39b2e92e1aac7f47e\"" Feb 13 04:57:10.276199 env[1479]: time="2024-02-13T04:57:10.276181092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-01dc72b3af,Uid:0e1d70e2fe3f0da00095a1d2a91b078e,Namespace:kube-system,Attempt:0,} returns sandbox id \"08bc74b76f6f37a547fec5bb5d04e24f362f321792124a050a1045f180db6d44\"" Feb 13 04:57:10.276896 env[1479]: time="2024-02-13T04:57:10.276878215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-01dc72b3af,Uid:ed264fa4adbdbce6de1dd0d6137d2cbb,Namespace:kube-system,Attempt:0,} returns sandbox id \"4657995deb11637fe9f8a7fa4de7c538cb2d5e1e37284d657517fe3e8a8ad86a\"" Feb 13 04:57:10.277611 env[1479]: time="2024-02-13T04:57:10.277598688Z" level=info msg="CreateContainer within sandbox \"d801d0b62dad81ff5b755ea6df96e2d7f5c26d81e4d946c39b2e92e1aac7f47e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 13 04:57:10.277715 env[1479]: time="2024-02-13T04:57:10.277704116Z" level=info msg="CreateContainer within sandbox \"4657995deb11637fe9f8a7fa4de7c538cb2d5e1e37284d657517fe3e8a8ad86a\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 13 04:57:10.277736 env[1479]: time="2024-02-13T04:57:10.277721606Z" level=info msg="CreateContainer within sandbox \"08bc74b76f6f37a547fec5bb5d04e24f362f321792124a050a1045f180db6d44\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 13 04:57:10.284823 env[1479]: time="2024-02-13T04:57:10.284769779Z" level=info msg="CreateContainer within sandbox \"4657995deb11637fe9f8a7fa4de7c538cb2d5e1e37284d657517fe3e8a8ad86a\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9f2c036c203bb3d60bc0616bb0a7cd9d1a1fa71242ad33dbf78b3b1287b9e7fc\"" Feb 13 04:57:10.285109 env[1479]: time="2024-02-13T04:57:10.285097081Z" level=info msg="StartContainer for \"9f2c036c203bb3d60bc0616bb0a7cd9d1a1fa71242ad33dbf78b3b1287b9e7fc\"" Feb 13 04:57:10.285252 env[1479]: time="2024-02-13T04:57:10.285213644Z" level=info msg="CreateContainer within sandbox \"d801d0b62dad81ff5b755ea6df96e2d7f5c26d81e4d946c39b2e92e1aac7f47e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"1c8258097729af107f07ab44fdc840bfc55b12fc00598c21e93c0c76693e7a3e\"" Feb 13 04:57:10.285371 env[1479]: time="2024-02-13T04:57:10.285360583Z" level=info msg="StartContainer for \"1c8258097729af107f07ab44fdc840bfc55b12fc00598c21e93c0c76693e7a3e\"" Feb 13 04:57:10.286119 env[1479]: time="2024-02-13T04:57:10.286103622Z" level=info msg="CreateContainer within sandbox \"08bc74b76f6f37a547fec5bb5d04e24f362f321792124a050a1045f180db6d44\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1aef11e375bababbebd73e35dc13c526da84631f67175355204b427e1eaa7e4b\"" Feb 13 04:57:10.286259 env[1479]: time="2024-02-13T04:57:10.286248633Z" level=info msg="StartContainer for \"1aef11e375bababbebd73e35dc13c526da84631f67175355204b427e1eaa7e4b\"" Feb 13 04:57:10.293681 systemd[1]: Started cri-containerd-1aef11e375bababbebd73e35dc13c526da84631f67175355204b427e1eaa7e4b.scope. Feb 13 04:57:10.294363 systemd[1]: Started cri-containerd-1c8258097729af107f07ab44fdc840bfc55b12fc00598c21e93c0c76693e7a3e.scope. Feb 13 04:57:10.294899 systemd[1]: Started cri-containerd-9f2c036c203bb3d60bc0616bb0a7cd9d1a1fa71242ad33dbf78b3b1287b9e7fc.scope. Feb 13 04:57:10.296704 kubelet[2190]: E0213 04:57:10.296688 2190 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.90.239:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.90.239:6443: connect: connection refused Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit: BPF prog-id=79 op=LOAD Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2241 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383235383039373732396166313037663037616234346664633834 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2241 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383235383039373732396166313037663037616234346664633834 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit: BPF prog-id=80 op=LOAD Feb 13 04:57:10.299000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020b3d0 items=0 ppid=2241 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383235383039373732396166313037663037616234346664633834 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit: BPF prog-id=81 op=LOAD Feb 13 04:57:10.299000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020b418 items=0 ppid=2241 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383235383039373732396166313037663037616234346664633834 Feb 13 04:57:10.299000 audit: BPF prog-id=81 op=UNLOAD Feb 13 04:57:10.299000 audit: BPF prog-id=80 op=UNLOAD Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { perfmon } for pid=2374 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[2374]: AVC avc: denied { bpf } for pid=2374 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit: BPF prog-id=82 op=LOAD Feb 13 04:57:10.299000 audit[2374]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020b828 items=0 ppid=2241 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163383235383039373732396166313037663037616234346664633834 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit: BPF prog-id=83 op=LOAD Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2259 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326330333663323033626233643630626330363136626230613763 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2259 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326330333663323033626233643630626330363136626230613763 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit: BPF prog-id=84 op=LOAD Feb 13 04:57:10.300000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002a5f20 items=0 ppid=2259 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326330333663323033626233643630626330363136626230613763 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit: BPF prog-id=85 op=LOAD Feb 13 04:57:10.300000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002a5f68 items=0 ppid=2259 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326330333663323033626233643630626330363136626230613763 Feb 13 04:57:10.300000 audit: BPF prog-id=85 op=UNLOAD Feb 13 04:57:10.300000 audit: BPF prog-id=84 op=UNLOAD Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit: BPF prog-id=86 op=LOAD Feb 13 04:57:10.300000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038e378 items=0 ppid=2259 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966326330333663323033626233643630626330363136626230613763 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.300000 audit: BPF prog-id=87 op=LOAD Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2269 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161656631316533373562616261626265626437336533356463313363 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2269 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161656631316533373562616261626265626437336533356463313363 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit: BPF prog-id=88 op=LOAD Feb 13 04:57:10.301000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000317690 items=0 ppid=2269 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161656631316533373562616261626265626437336533356463313363 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit: BPF prog-id=89 op=LOAD Feb 13 04:57:10.301000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003176d8 items=0 ppid=2269 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161656631316533373562616261626265626437336533356463313363 Feb 13 04:57:10.301000 audit: BPF prog-id=89 op=UNLOAD Feb 13 04:57:10.301000 audit: BPF prog-id=88 op=UNLOAD Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { perfmon } for pid=2380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit[2380]: AVC avc: denied { bpf } for pid=2380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:10.301000 audit: BPF prog-id=90 op=LOAD Feb 13 04:57:10.301000 audit[2380]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000317ae8 items=0 ppid=2269 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:10.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161656631316533373562616261626265626437336533356463313363 Feb 13 04:57:10.318381 env[1479]: time="2024-02-13T04:57:10.318342839Z" level=info msg="StartContainer for \"1c8258097729af107f07ab44fdc840bfc55b12fc00598c21e93c0c76693e7a3e\" returns successfully" Feb 13 04:57:10.318627 env[1479]: time="2024-02-13T04:57:10.318611054Z" level=info msg="StartContainer for \"9f2c036c203bb3d60bc0616bb0a7cd9d1a1fa71242ad33dbf78b3b1287b9e7fc\" returns successfully" Feb 13 04:57:10.319120 env[1479]: time="2024-02-13T04:57:10.319108538Z" level=info msg="StartContainer for \"1aef11e375bababbebd73e35dc13c526da84631f67175355204b427e1eaa7e4b\" returns successfully" Feb 13 04:57:10.894000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:10.894000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:10.894000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000022000 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:10.894000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000086a80 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:10.894000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:10.894000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:11.196000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:11.196000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:11.196000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c000e40540 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:57:11.196000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c001c9e1c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:57:11.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:57:11.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:57:11.196000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:11.196000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003532150 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:57:11.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:57:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=46 a1=c0046c6030 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:57:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:57:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0028822a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:57:11.206000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:11.206000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c0044d5050 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:57:11.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:57:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:57:11.350322 kubelet[2190]: E0213 04:57:11.350226 2190 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-01dc72b3af\" not found" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:11.474193 kubelet[2190]: I0213 04:57:11.474032 2190 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:11.481355 kubelet[2190]: I0213 04:57:11.481275 2190 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:11.499594 kubelet[2190]: E0213 04:57:11.499518 2190 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-01dc72b3af\" not found" Feb 13 04:57:11.600744 kubelet[2190]: E0213 04:57:11.600635 2190 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-01dc72b3af\" not found" Feb 13 04:57:12.315819 kubelet[2190]: I0213 04:57:12.315756 2190 apiserver.go:52] "Watching apiserver" Feb 13 04:57:12.415961 kubelet[2190]: I0213 04:57:12.415895 2190 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 13 04:57:12.445775 kubelet[2190]: I0213 04:57:12.445718 2190 reconciler.go:41] "Reconciler: start to sync state" Feb 13 04:57:14.594922 systemd[1]: Reloading. Feb 13 04:57:14.655064 /usr/lib/systemd/system-generators/torcx-generator[2529]: time="2024-02-13T04:57:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 04:57:14.655080 /usr/lib/systemd/system-generators/torcx-generator[2529]: time="2024-02-13T04:57:14Z" level=info msg="torcx already run" Feb 13 04:57:14.711556 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 04:57:14.711565 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 04:57:14.724854 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 04:57:14.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.804452 kernel: kauditd_printk_skb: 404 callbacks suppressed Feb 13 04:57:14.804509 kernel: audit: type=1400 audit(1707800234.777:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.931340 kernel: audit: type=1400 audit(1707800234.777:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.931489 kernel: audit: type=1400 audit(1707800234.778:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.058776 kernel: audit: type=1400 audit(1707800234.778:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.058843 kernel: audit: type=1400 audit(1707800234.778:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.109972 kubelet[2190]: W0213 04:57:15.109957 2190 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.187183 kernel: audit: type=1400 audit(1707800234.778:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.187258 kernel: audit: type=1400 audit(1707800234.778:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.314176 kernel: audit: type=1400 audit(1707800234.778:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.314216 kernel: audit: type=1400 audit(1707800234.778:705): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439714 kernel: audit: type=1400 audit(1707800234.867:706): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.867000 audit: BPF prog-id=91 op=LOAD Feb 13 04:57:14.867000 audit: BPF prog-id=67 op=UNLOAD Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit: BPF prog-id=92 op=LOAD Feb 13 04:57:14.993000 audit: BPF prog-id=52 op=UNLOAD Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:14.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit: BPF prog-id=93 op=LOAD Feb 13 04:57:15.121000 audit: BPF prog-id=53 op=UNLOAD Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.249000 audit: BPF prog-id=94 op=LOAD Feb 13 04:57:15.249000 audit: BPF prog-id=79 op=UNLOAD Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit: BPF prog-id=95 op=LOAD Feb 13 04:57:15.375000 audit: BPF prog-id=54 op=UNLOAD Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit: BPF prog-id=96 op=LOAD Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.438000 audit: BPF prog-id=97 op=LOAD Feb 13 04:57:15.438000 audit: BPF prog-id=55 op=UNLOAD Feb 13 04:57:15.438000 audit: BPF prog-id=56 op=UNLOAD Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.439000 audit: BPF prog-id=98 op=LOAD Feb 13 04:57:15.439000 audit: BPF prog-id=87 op=UNLOAD Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit: BPF prog-id=99 op=LOAD Feb 13 04:57:15.440000 audit: BPF prog-id=57 op=UNLOAD Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit: BPF prog-id=100 op=LOAD Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.440000 audit: BPF prog-id=101 op=LOAD Feb 13 04:57:15.440000 audit: BPF prog-id=58 op=UNLOAD Feb 13 04:57:15.440000 audit: BPF prog-id=59 op=UNLOAD Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit: BPF prog-id=102 op=LOAD Feb 13 04:57:15.441000 audit: BPF prog-id=83 op=UNLOAD Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.441000 audit: BPF prog-id=103 op=LOAD Feb 13 04:57:15.441000 audit: BPF prog-id=60 op=UNLOAD Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit: BPF prog-id=104 op=LOAD Feb 13 04:57:15.442000 audit: BPF prog-id=61 op=UNLOAD Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit: BPF prog-id=105 op=LOAD Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.442000 audit: BPF prog-id=106 op=LOAD Feb 13 04:57:15.442000 audit: BPF prog-id=62 op=UNLOAD Feb 13 04:57:15.442000 audit: BPF prog-id=63 op=UNLOAD Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit: BPF prog-id=107 op=LOAD Feb 13 04:57:15.443000 audit: BPF prog-id=71 op=UNLOAD Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.443000 audit: BPF prog-id=108 op=LOAD Feb 13 04:57:15.443000 audit: BPF prog-id=75 op=UNLOAD Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit: BPF prog-id=109 op=LOAD Feb 13 04:57:15.444000 audit: BPF prog-id=64 op=UNLOAD Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit: BPF prog-id=110 op=LOAD Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.444000 audit: BPF prog-id=111 op=LOAD Feb 13 04:57:15.444000 audit: BPF prog-id=65 op=UNLOAD Feb 13 04:57:15.444000 audit: BPF prog-id=66 op=UNLOAD Feb 13 04:57:15.451314 kubelet[2190]: I0213 04:57:15.451298 2190 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 04:57:15.451321 systemd[1]: Stopping kubelet.service... Feb 13 04:57:15.471791 systemd[1]: kubelet.service: Deactivated successfully. Feb 13 04:57:15.471898 systemd[1]: Stopped kubelet.service. Feb 13 04:57:15.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:15.472794 systemd[1]: Started kubelet.service. Feb 13 04:57:15.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:15.496384 kubelet[2589]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 04:57:15.496384 kubelet[2589]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 13 04:57:15.496384 kubelet[2589]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 04:57:15.496603 kubelet[2589]: I0213 04:57:15.496407 2589 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 04:57:15.498911 kubelet[2589]: I0213 04:57:15.498900 2589 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 13 04:57:15.498911 kubelet[2589]: I0213 04:57:15.498911 2589 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 04:57:15.499029 kubelet[2589]: I0213 04:57:15.499022 2589 server.go:837] "Client rotation is on, will bootstrap in background" Feb 13 04:57:15.499979 kubelet[2589]: I0213 04:57:15.499972 2589 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 13 04:57:15.500530 kubelet[2589]: I0213 04:57:15.500519 2589 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 04:57:15.518737 kubelet[2589]: I0213 04:57:15.518709 2589 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 04:57:15.518822 kubelet[2589]: I0213 04:57:15.518813 2589 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 04:57:15.518900 kubelet[2589]: I0213 04:57:15.518862 2589 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 04:57:15.518900 kubelet[2589]: I0213 04:57:15.518873 2589 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 04:57:15.518900 kubelet[2589]: I0213 04:57:15.518880 2589 container_manager_linux.go:302] "Creating device plugin manager" Feb 13 04:57:15.518900 kubelet[2589]: I0213 04:57:15.518895 2589 state_mem.go:36] "Initialized new in-memory state store" Feb 13 04:57:15.520360 kubelet[2589]: I0213 04:57:15.520352 2589 kubelet.go:405] "Attempting to sync node with API server" Feb 13 04:57:15.520404 kubelet[2589]: I0213 04:57:15.520364 2589 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 04:57:15.520404 kubelet[2589]: I0213 04:57:15.520374 2589 kubelet.go:309] "Adding apiserver pod source" Feb 13 04:57:15.520404 kubelet[2589]: I0213 04:57:15.520382 2589 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 04:57:15.520864 kubelet[2589]: I0213 04:57:15.520851 2589 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 04:57:15.521790 kubelet[2589]: I0213 04:57:15.521779 2589 server.go:1168] "Started kubelet" Feb 13 04:57:15.521863 kubelet[2589]: I0213 04:57:15.521853 2589 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 04:57:15.521899 kubelet[2589]: I0213 04:57:15.521877 2589 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 13 04:57:15.522075 kubelet[2589]: E0213 04:57:15.522066 2589 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 04:57:15.522111 kubelet[2589]: E0213 04:57:15.522081 2589 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 04:57:15.522370 kubelet[2589]: I0213 04:57:15.522365 2589 server.go:461] "Adding debug handlers to kubelet server" Feb 13 04:57:15.521000 audit[2589]: AVC avc: denied { mac_admin } for pid=2589 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.521000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:15.521000 audit[2589]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001308ed0 a1=c0012f4690 a2=c001308ea0 a3=25 items=0 ppid=1 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:15.521000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:15.521000 audit[2589]: AVC avc: denied { mac_admin } for pid=2589 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.521000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:15.521000 audit[2589]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004a2320 a1=c0012f46a8 a2=c001308f60 a3=25 items=0 ppid=1 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:15.521000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:15.522812 kubelet[2589]: I0213 04:57:15.522572 2589 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 04:57:15.522812 kubelet[2589]: I0213 04:57:15.522590 2589 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 04:57:15.522812 kubelet[2589]: I0213 04:57:15.522602 2589 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 04:57:15.522812 kubelet[2589]: I0213 04:57:15.522623 2589 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 13 04:57:15.522812 kubelet[2589]: I0213 04:57:15.522644 2589 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 13 04:57:15.522812 kubelet[2589]: E0213 04:57:15.522672 2589 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-01dc72b3af\" not found" Feb 13 04:57:15.527461 kubelet[2589]: I0213 04:57:15.527442 2589 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 04:57:15.527969 kubelet[2589]: I0213 04:57:15.527961 2589 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 04:57:15.528012 kubelet[2589]: I0213 04:57:15.527975 2589 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 13 04:57:15.528012 kubelet[2589]: I0213 04:57:15.527988 2589 kubelet.go:2257] "Starting kubelet main sync loop" Feb 13 04:57:15.528089 kubelet[2589]: E0213 04:57:15.528041 2589 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 13 04:57:15.543572 kubelet[2589]: I0213 04:57:15.543554 2589 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 04:57:15.543572 kubelet[2589]: I0213 04:57:15.543567 2589 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 04:57:15.543572 kubelet[2589]: I0213 04:57:15.543576 2589 state_mem.go:36] "Initialized new in-memory state store" Feb 13 04:57:15.543691 kubelet[2589]: I0213 04:57:15.543659 2589 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 13 04:57:15.543691 kubelet[2589]: I0213 04:57:15.543667 2589 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 13 04:57:15.543691 kubelet[2589]: I0213 04:57:15.543671 2589 policy_none.go:49] "None policy: Start" Feb 13 04:57:15.543969 kubelet[2589]: I0213 04:57:15.543962 2589 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 04:57:15.544000 kubelet[2589]: I0213 04:57:15.543972 2589 state_mem.go:35] "Initializing new in-memory state store" Feb 13 04:57:15.544037 kubelet[2589]: I0213 04:57:15.544032 2589 state_mem.go:75] "Updated machine memory state" Feb 13 04:57:15.544000 audit[2589]: AVC avc: denied { mac_admin } for pid=2589 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:15.544000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 04:57:15.544000 audit[2589]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000906840 a1=c00119eae0 a2=c000906810 a3=25 items=0 ppid=1 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:15.544000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 04:57:15.546224 kubelet[2589]: I0213 04:57:15.546048 2589 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 04:57:15.546224 kubelet[2589]: I0213 04:57:15.546079 2589 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 04:57:15.546224 kubelet[2589]: I0213 04:57:15.546196 2589 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 04:57:15.624678 kubelet[2589]: I0213 04:57:15.624636 2589 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.628685 kubelet[2589]: I0213 04:57:15.628648 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:15.628728 kubelet[2589]: I0213 04:57:15.628690 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:15.628728 kubelet[2589]: I0213 04:57:15.628713 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:15.644834 kubelet[2589]: W0213 04:57:15.644824 2589 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 04:57:15.644834 kubelet[2589]: W0213 04:57:15.644830 2589 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 04:57:15.645676 kubelet[2589]: W0213 04:57:15.645670 2589 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 04:57:15.645701 kubelet[2589]: E0213 04:57:15.645694 2589 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.646023 kubelet[2589]: I0213 04:57:15.646016 2589 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.646057 kubelet[2589]: I0213 04:57:15.646052 2589 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824340 kubelet[2589]: I0213 04:57:15.824294 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dc1cb34c627bcda3d1609de4af27d1f2-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" (UID: \"dc1cb34c627bcda3d1609de4af27d1f2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824340 kubelet[2589]: I0213 04:57:15.824319 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824340 kubelet[2589]: I0213 04:57:15.824341 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824539 kubelet[2589]: I0213 04:57:15.824355 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dc1cb34c627bcda3d1609de4af27d1f2-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" (UID: \"dc1cb34c627bcda3d1609de4af27d1f2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824539 kubelet[2589]: I0213 04:57:15.824366 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824539 kubelet[2589]: I0213 04:57:15.824396 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824539 kubelet[2589]: I0213 04:57:15.824484 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0e1d70e2fe3f0da00095a1d2a91b078e-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-01dc72b3af\" (UID: \"0e1d70e2fe3f0da00095a1d2a91b078e\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824539 kubelet[2589]: I0213 04:57:15.824534 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ed264fa4adbdbce6de1dd0d6137d2cbb-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-01dc72b3af\" (UID: \"ed264fa4adbdbce6de1dd0d6137d2cbb\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:15.824638 kubelet[2589]: I0213 04:57:15.824556 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dc1cb34c627bcda3d1609de4af27d1f2-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" (UID: \"dc1cb34c627bcda3d1609de4af27d1f2\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:16.520889 kubelet[2589]: I0213 04:57:16.520772 2589 apiserver.go:52] "Watching apiserver" Feb 13 04:57:16.544162 kubelet[2589]: W0213 04:57:16.544147 2589 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 04:57:16.544283 kubelet[2589]: E0213 04:57:16.544183 2589 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-01dc72b3af\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" Feb 13 04:57:16.550310 kubelet[2589]: I0213 04:57:16.550298 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-01dc72b3af" podStartSLOduration=1.5502731079999998 podCreationTimestamp="2024-02-13 04:57:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 04:57:16.550206093 +0000 UTC m=+1.075814322" watchObservedRunningTime="2024-02-13 04:57:16.550273108 +0000 UTC m=+1.075881330" Feb 13 04:57:16.554648 kubelet[2589]: I0213 04:57:16.554637 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-01dc72b3af" podStartSLOduration=1.5546231320000001 podCreationTimestamp="2024-02-13 04:57:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 04:57:16.554565837 +0000 UTC m=+1.080174063" watchObservedRunningTime="2024-02-13 04:57:16.554623132 +0000 UTC m=+1.080231359" Feb 13 04:57:16.559415 kubelet[2589]: I0213 04:57:16.559405 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-01dc72b3af" podStartSLOduration=1.559387556 podCreationTimestamp="2024-02-13 04:57:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 04:57:16.559355302 +0000 UTC m=+1.084963528" watchObservedRunningTime="2024-02-13 04:57:16.559387556 +0000 UTC m=+1.084995778" Feb 13 04:57:16.623546 kubelet[2589]: I0213 04:57:16.623480 2589 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 13 04:57:16.630438 kubelet[2589]: I0213 04:57:16.630367 2589 reconciler.go:41] "Reconciler: start to sync state" Feb 13 04:57:20.524713 sudo[1632]: pam_unix(sudo:session): session closed for user root Feb 13 04:57:20.524000 audit[1632]: USER_END pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:57:20.525536 sshd[1629]: pam_unix(sshd:session): session closed for user core Feb 13 04:57:20.527031 systemd[1]: sshd@6-139.178.90.239:22-139.178.68.195:54946.service: Deactivated successfully. Feb 13 04:57:20.527495 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 04:57:20.527582 systemd[1]: session-9.scope: Consumed 3.161s CPU time. Feb 13 04:57:20.527947 systemd-logind[1467]: Session 9 logged out. Waiting for processes to exit. Feb 13 04:57:20.528542 systemd-logind[1467]: Removed session 9. Feb 13 04:57:20.551036 kernel: kauditd_printk_skb: 248 callbacks suppressed Feb 13 04:57:20.551088 kernel: audit: type=1106 audit(1707800240.524:946): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:57:20.524000 audit[1632]: CRED_DISP pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:57:20.725530 kernel: audit: type=1104 audit(1707800240.524:947): pid=1632 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 04:57:20.725562 kernel: audit: type=1106 audit(1707800240.525:948): pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:57:20.525000 audit[1629]: USER_END pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:57:20.820789 kernel: audit: type=1104 audit(1707800240.525:949): pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:57:20.525000 audit[1629]: CRED_DISP pid=1629 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 04:57:20.910079 kernel: audit: type=1131 audit(1707800240.526:950): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.239:22-139.178.68.195:54946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:20.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.239:22-139.178.68.195:54946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:23.986034 update_engine[1469]: I0213 04:57:23.985918 1469 update_attempter.cc:509] Updating boot flags... Feb 13 04:57:24.360000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:24.360000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000087720 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.576819 kernel: audit: type=1400 audit(1707800244.360:951): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:24.576879 kernel: audit: type=1300 audit(1707800244.360:951): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000087720 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.576895 kernel: audit: type=1327 audit(1707800244.360:951): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:24.360000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:24.670610 kernel: audit: type=1400 audit(1707800244.363:952): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:24.363000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:24.761644 kernel: audit: type=1300 audit(1707800244.363:952): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c6fb00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.363000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c6fb00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:24.366000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:24.366000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000087860 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:24.369000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:57:24.369000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c6fc40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:24.387000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sdb9" ino=524848 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 13 04:57:24.387000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000283100 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:57:24.387000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:57:27.799055 kubelet[2589]: I0213 04:57:27.798951 2589 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 13 04:57:27.799923 env[1479]: time="2024-02-13T04:57:27.799768728Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 13 04:57:27.800537 kubelet[2589]: I0213 04:57:27.800180 2589 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 13 04:57:28.460718 kubelet[2589]: I0213 04:57:28.460642 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:28.475070 systemd[1]: Created slice kubepods-besteffort-pod12744cb6_c8be_4565_906c_7864a742b051.slice. Feb 13 04:57:28.580148 kubelet[2589]: I0213 04:57:28.580048 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xlz5m\" (UniqueName: \"kubernetes.io/projected/12744cb6-c8be-4565-906c-7864a742b051-kube-api-access-xlz5m\") pod \"kube-proxy-wgwbd\" (UID: \"12744cb6-c8be-4565-906c-7864a742b051\") " pod="kube-system/kube-proxy-wgwbd" Feb 13 04:57:28.580148 kubelet[2589]: I0213 04:57:28.580157 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/12744cb6-c8be-4565-906c-7864a742b051-lib-modules\") pod \"kube-proxy-wgwbd\" (UID: \"12744cb6-c8be-4565-906c-7864a742b051\") " pod="kube-system/kube-proxy-wgwbd" Feb 13 04:57:28.580614 kubelet[2589]: I0213 04:57:28.580257 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/12744cb6-c8be-4565-906c-7864a742b051-kube-proxy\") pod \"kube-proxy-wgwbd\" (UID: \"12744cb6-c8be-4565-906c-7864a742b051\") " pod="kube-system/kube-proxy-wgwbd" Feb 13 04:57:28.580614 kubelet[2589]: I0213 04:57:28.580321 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/12744cb6-c8be-4565-906c-7864a742b051-xtables-lock\") pod \"kube-proxy-wgwbd\" (UID: \"12744cb6-c8be-4565-906c-7864a742b051\") " pod="kube-system/kube-proxy-wgwbd" Feb 13 04:57:28.753732 kubelet[2589]: I0213 04:57:28.753544 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:28.767287 systemd[1]: Created slice kubepods-besteffort-pod5cdf252e_883a_4e65_b690_5bf7714716c0.slice. Feb 13 04:57:28.798285 env[1479]: time="2024-02-13T04:57:28.798152408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wgwbd,Uid:12744cb6-c8be-4565-906c-7864a742b051,Namespace:kube-system,Attempt:0,}" Feb 13 04:57:28.822819 env[1479]: time="2024-02-13T04:57:28.822619564Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:28.822819 env[1479]: time="2024-02-13T04:57:28.822719612Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:28.822819 env[1479]: time="2024-02-13T04:57:28.822757911Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:28.823966 env[1479]: time="2024-02-13T04:57:28.823191808Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/460135eb67ce9f8bb478d7e6d63189ff368fec01f2cbd836b2528e5a7bed62ea pid=2771 runtime=io.containerd.runc.v2 Feb 13 04:57:28.853247 systemd[1]: Started cri-containerd-460135eb67ce9f8bb478d7e6d63189ff368fec01f2cbd836b2528e5a7bed62ea.scope. Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.882263 kubelet[2589]: I0213 04:57:28.882238 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4lwkp\" (UniqueName: \"kubernetes.io/projected/5cdf252e-883a-4e65-b690-5bf7714716c0-kube-api-access-4lwkp\") pod \"tigera-operator-7ff8dc855-c8s5z\" (UID: \"5cdf252e-883a-4e65-b690-5bf7714716c0\") " pod="tigera-operator/tigera-operator-7ff8dc855-c8s5z" Feb 13 04:57:28.882594 kubelet[2589]: I0213 04:57:28.882286 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5cdf252e-883a-4e65-b690-5bf7714716c0-var-lib-calico\") pod \"tigera-operator-7ff8dc855-c8s5z\" (UID: \"5cdf252e-883a-4e65-b690-5bf7714716c0\") " pod="tigera-operator/tigera-operator-7ff8dc855-c8s5z" Feb 13 04:57:28.894386 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 13 04:57:28.894453 kernel: audit: type=1400 audit(1707800248.865:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.021360 kernel: audit: type=1400 audit(1707800248.865:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.021403 kernel: audit: type=1400 audit(1707800248.865:958): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.071874 env[1479]: time="2024-02-13T04:57:29.071809437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-c8s5z,Uid:5cdf252e-883a-4e65-b690-5bf7714716c0,Namespace:tigera-operator,Attempt:0,}" Feb 13 04:57:29.081907 env[1479]: time="2024-02-13T04:57:29.081857433Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:29.081907 env[1479]: time="2024-02-13T04:57:29.081899255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:29.081907 env[1479]: time="2024-02-13T04:57:29.081905806Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:29.082067 env[1479]: time="2024-02-13T04:57:29.081991493Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/08cd155dfdbf4ac8f86b907ea8eaa5ca85b538a701f05b8a8f67a47782a3fe8c pid=2806 runtime=io.containerd.runc.v2 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.088138 systemd[1]: Started cri-containerd-08cd155dfdbf4ac8f86b907ea8eaa5ca85b538a701f05b8a8f67a47782a3fe8c.scope. Feb 13 04:57:29.151048 kernel: audit: type=1400 audit(1707800248.865:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.151082 kernel: audit: type=1400 audit(1707800248.865:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.278677 kernel: audit: type=1400 audit(1707800248.865:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.278716 kernel: audit: type=1400 audit(1707800248.865:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.342585 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 13 04:57:29.342642 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 13 04:57:29.342676 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit: BPF prog-id=112 op=LOAD Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2771 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:28.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436303133356562363763653966386262343738643765366436333138 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2771 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:28.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436303133356562363763653966386262343738643765366436333138 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:28.957000 audit: BPF prog-id=113 op=LOAD Feb 13 04:57:28.957000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d3ce0 items=0 ppid=2771 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:28.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436303133356562363763653966386262343738643765366436333138 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.084000 audit: BPF prog-id=114 op=LOAD Feb 13 04:57:29.084000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d3d28 items=0 ppid=2771 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436303133356562363763653966386262343738643765366436333138 Feb 13 04:57:29.213000 audit: BPF prog-id=114 op=UNLOAD Feb 13 04:57:29.213000 audit: BPF prog-id=113 op=UNLOAD Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.213000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.277000 audit: BPF prog-id=115 op=LOAD Feb 13 04:57:29.277000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.277000 audit[2816]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2806 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636431353564666462663461633866383662393037656138656161 Feb 13 04:57:29.213000 audit: BPF prog-id=116 op=LOAD Feb 13 04:57:29.213000 audit[2781]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003be138 items=0 ppid=2771 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436303133356562363763653966386262343738643765366436333138 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit: BPF prog-id=117 op=LOAD Feb 13 04:57:29.422000 audit[2816]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001fea10 items=0 ppid=2806 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636431353564666462663461633866383662393037656138656161 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit: BPF prog-id=118 op=LOAD Feb 13 04:57:29.422000 audit[2816]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001fea58 items=0 ppid=2806 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636431353564666462663461633866383662393037656138656161 Feb 13 04:57:29.422000 audit: BPF prog-id=118 op=UNLOAD Feb 13 04:57:29.422000 audit: BPF prog-id=117 op=UNLOAD Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { perfmon } for pid=2816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit[2816]: AVC avc: denied { bpf } for pid=2816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.422000 audit: BPF prog-id=119 op=LOAD Feb 13 04:57:29.422000 audit[2816]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001fee68 items=0 ppid=2806 pid=2816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.422000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038636431353564666462663461633866383662393037656138656161 Feb 13 04:57:29.428092 env[1479]: time="2024-02-13T04:57:29.428067659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wgwbd,Uid:12744cb6-c8be-4565-906c-7864a742b051,Namespace:kube-system,Attempt:0,} returns sandbox id \"460135eb67ce9f8bb478d7e6d63189ff368fec01f2cbd836b2528e5a7bed62ea\"" Feb 13 04:57:29.429203 env[1479]: time="2024-02-13T04:57:29.429189617Z" level=info msg="CreateContainer within sandbox \"460135eb67ce9f8bb478d7e6d63189ff368fec01f2cbd836b2528e5a7bed62ea\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 13 04:57:29.434480 env[1479]: time="2024-02-13T04:57:29.434436153Z" level=info msg="CreateContainer within sandbox \"460135eb67ce9f8bb478d7e6d63189ff368fec01f2cbd836b2528e5a7bed62ea\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5957677b1eab06c85da9f3ec12615168e9aa19e4af37a0f58f690a496cfe3c8a\"" Feb 13 04:57:29.434725 env[1479]: time="2024-02-13T04:57:29.434712670Z" level=info msg="StartContainer for \"5957677b1eab06c85da9f3ec12615168e9aa19e4af37a0f58f690a496cfe3c8a\"" Feb 13 04:57:29.440636 env[1479]: time="2024-02-13T04:57:29.440608153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-c8s5z,Uid:5cdf252e-883a-4e65-b690-5bf7714716c0,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"08cd155dfdbf4ac8f86b907ea8eaa5ca85b538a701f05b8a8f67a47782a3fe8c\"" Feb 13 04:57:29.441422 env[1479]: time="2024-02-13T04:57:29.441407338Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 13 04:57:29.442790 systemd[1]: Started cri-containerd-5957677b1eab06c85da9f3ec12615168e9aa19e4af37a0f58f690a496cfe3c8a.scope. Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f5604955ee8 items=0 ppid=2771 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353736373762316561623036633835646139663365633132363135 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit: BPF prog-id=120 op=LOAD Feb 13 04:57:29.449000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0003c61c8 items=0 ppid=2771 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353736373762316561623036633835646139663365633132363135 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit: BPF prog-id=121 op=LOAD Feb 13 04:57:29.449000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003c6218 items=0 ppid=2771 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353736373762316561623036633835646139663365633132363135 Feb 13 04:57:29.449000 audit: BPF prog-id=121 op=UNLOAD Feb 13 04:57:29.449000 audit: BPF prog-id=120 op=UNLOAD Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { perfmon } for pid=2847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit[2847]: AVC avc: denied { bpf } for pid=2847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:29.449000 audit: BPF prog-id=122 op=LOAD Feb 13 04:57:29.449000 audit[2847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003c62a8 items=0 ppid=2771 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353736373762316561623036633835646139663365633132363135 Feb 13 04:57:29.456416 env[1479]: time="2024-02-13T04:57:29.456385059Z" level=info msg="StartContainer for \"5957677b1eab06c85da9f3ec12615168e9aa19e4af37a0f58f690a496cfe3c8a\" returns successfully" Feb 13 04:57:29.515000 audit[2911]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.515000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0478df80 a2=0 a3=7ffe0478df6c items=0 ppid=2861 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 04:57:29.515000 audit[2912]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.515000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc86afa280 a2=0 a3=7ffc86afa26c items=0 ppid=2861 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 04:57:29.517000 audit[2915]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.517000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc46bbbd30 a2=0 a3=7ffc46bbbd1c items=0 ppid=2861 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 04:57:29.518000 audit[2916]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.518000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd564bfbb0 a2=0 a3=7ffd564bfb9c items=0 ppid=2861 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 04:57:29.520000 audit[2917]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.520000 audit[2917]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdff26cb0 a2=0 a3=7fffdff26c9c items=0 ppid=2861 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.520000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 04:57:29.520000 audit[2918]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.520000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff65ce2d10 a2=0 a3=7fff65ce2cfc items=0 ppid=2861 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 04:57:29.587099 kubelet[2589]: I0213 04:57:29.586928 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wgwbd" podStartSLOduration=1.58685052 podCreationTimestamp="2024-02-13 04:57:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 04:57:29.585270864 +0000 UTC m=+14.110879151" watchObservedRunningTime="2024-02-13 04:57:29.58685052 +0000 UTC m=+14.112458807" Feb 13 04:57:29.633000 audit[2919]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.633000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff151a00f0 a2=0 a3=7fff151a00dc items=0 ppid=2861 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 04:57:29.640000 audit[2921]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.640000 audit[2921]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff00aaab80 a2=0 a3=7fff00aaab6c items=0 ppid=2861 pid=2921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 13 04:57:29.650000 audit[2924]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.650000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd1295d3c0 a2=0 a3=7ffd1295d3ac items=0 ppid=2861 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 13 04:57:29.653000 audit[2925]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.653000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc692af940 a2=0 a3=7ffc692af92c items=0 ppid=2861 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 04:57:29.659000 audit[2927]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.659000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb79c6740 a2=0 a3=7ffcb79c672c items=0 ppid=2861 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 04:57:29.661000 audit[2928]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.661000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcbdcbb60 a2=0 a3=7ffdcbdcbb4c items=0 ppid=2861 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 04:57:29.668000 audit[2930]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.668000 audit[2930]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff687e0020 a2=0 a3=7fff687e000c items=0 ppid=2861 pid=2930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 04:57:29.677000 audit[2933]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.677000 audit[2933]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff2e6e68d0 a2=0 a3=7fff2e6e68bc items=0 ppid=2861 pid=2933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.677000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 13 04:57:29.680000 audit[2934]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.680000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8a694810 a2=0 a3=7fff8a6947fc items=0 ppid=2861 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.680000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 04:57:29.686000 audit[2936]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.686000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe717787d0 a2=0 a3=7ffe717787bc items=0 ppid=2861 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 04:57:29.689000 audit[2937]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.689000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8c36ee30 a2=0 a3=7ffe8c36ee1c items=0 ppid=2861 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 04:57:29.695000 audit[2939]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.695000 audit[2939]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3a4919b0 a2=0 a3=7fff3a49199c items=0 ppid=2861 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 04:57:29.705000 audit[2942]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.705000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2631e9a0 a2=0 a3=7ffd2631e98c items=0 ppid=2861 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.705000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 04:57:29.714000 audit[2945]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.714000 audit[2945]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0e541a30 a2=0 a3=7ffc0e541a1c items=0 ppid=2861 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 04:57:29.717000 audit[2946]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.717000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2b689270 a2=0 a3=7ffd2b68925c items=0 ppid=2861 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 04:57:29.723000 audit[2948]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.723000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffce0a909e0 a2=0 a3=7ffce0a909cc items=0 ppid=2861 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.723000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 04:57:29.731000 audit[2951]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.731000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb9a3df40 a2=0 a3=7fffb9a3df2c items=0 ppid=2861 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 04:57:29.746000 audit[2956]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.746000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0f180720 a2=0 a3=7fff0f18070c items=0 ppid=2861 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 04:57:29.752000 audit[2958]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 04:57:29.752000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffca5ff4160 a2=0 a3=7ffca5ff414c items=0 ppid=2861 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 04:57:29.779000 audit[2960]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:29.779000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe174ec9d0 a2=0 a3=7ffe174ec9bc items=0 ppid=2861 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:29.795000 audit[2960]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:29.795000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe174ec9d0 a2=0 a3=7ffe174ec9bc items=0 ppid=2861 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:29.798000 audit[2966]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.798000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeb52a1860 a2=0 a3=7ffeb52a184c items=0 ppid=2861 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.798000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 04:57:29.804000 audit[2968]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.804000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff8b536180 a2=0 a3=7fff8b53616c items=0 ppid=2861 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 13 04:57:29.814000 audit[2971]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.814000 audit[2971]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd05b3d4f0 a2=0 a3=7ffd05b3d4dc items=0 ppid=2861 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 13 04:57:29.817000 audit[2972]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.817000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda84ab580 a2=0 a3=7ffda84ab56c items=0 ppid=2861 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 04:57:29.823000 audit[2974]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.823000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffa284010 a2=0 a3=7ffffa283ffc items=0 ppid=2861 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 04:57:29.825000 audit[2975]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.825000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe918d25c0 a2=0 a3=7ffe918d25ac items=0 ppid=2861 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 04:57:29.831000 audit[2977]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.831000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde0001470 a2=0 a3=7ffde000145c items=0 ppid=2861 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 13 04:57:29.840000 audit[2980]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2980 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.840000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd424af790 a2=0 a3=7ffd424af77c items=0 ppid=2861 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 04:57:29.843000 audit[2981]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.843000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc23b4f70 a2=0 a3=7ffcc23b4f5c items=0 ppid=2861 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 04:57:29.849000 audit[2983]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.849000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda2fcd580 a2=0 a3=7ffda2fcd56c items=0 ppid=2861 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 04:57:29.852000 audit[2984]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.852000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0f755940 a2=0 a3=7ffd0f75592c items=0 ppid=2861 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 04:57:29.858000 audit[2986]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.858000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecd289a60 a2=0 a3=7ffecd289a4c items=0 ppid=2861 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 04:57:29.868000 audit[2989]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.868000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd16b6fd0 a2=0 a3=7ffdd16b6fbc items=0 ppid=2861 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 04:57:29.878000 audit[2992]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2992 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.878000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc084f80b0 a2=0 a3=7ffc084f809c items=0 ppid=2861 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.878000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 13 04:57:29.880000 audit[2993]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.880000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff560b4f00 a2=0 a3=7fff560b4eec items=0 ppid=2861 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 04:57:29.886000 audit[2995]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2995 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.886000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcb1d0fe20 a2=0 a3=7ffcb1d0fe0c items=0 ppid=2861 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.886000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 04:57:29.894000 audit[2998]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.894000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff3950c990 a2=0 a3=7fff3950c97c items=0 ppid=2861 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 04:57:29.897000 audit[2999]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2999 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.897000 audit[2999]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4fe8fc50 a2=0 a3=7fff4fe8fc3c items=0 ppid=2861 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 04:57:29.903000 audit[3001]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=3001 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.903000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe4b2290d0 a2=0 a3=7ffe4b2290bc items=0 ppid=2861 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 04:57:29.911000 audit[3004]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.911000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed5815240 a2=0 a3=7ffed581522c items=0 ppid=2861 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.911000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 04:57:29.914000 audit[3005]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.914000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff27a5add0 a2=0 a3=7fff27a5adbc items=0 ppid=2861 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.914000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 04:57:29.920000 audit[3007]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=3007 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 04:57:29.920000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe389c43b0 a2=0 a3=7ffe389c439c items=0 ppid=2861 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 04:57:29.927000 audit[3009]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 04:57:29.927000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffea8e036f0 a2=0 a3=7ffea8e036dc items=0 ppid=2861 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.927000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:29.928000 audit[3009]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3009 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 04:57:29.928000 audit[3009]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffea8e036f0 a2=0 a3=7ffea8e036dc items=0 ppid=2861 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:29.928000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:30.575399 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2750633750.mount: Deactivated successfully. Feb 13 04:57:31.324866 env[1479]: time="2024-02-13T04:57:31.324811298Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:31.325547 env[1479]: time="2024-02-13T04:57:31.325533143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:31.326288 env[1479]: time="2024-02-13T04:57:31.326269280Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:31.327074 env[1479]: time="2024-02-13T04:57:31.327061138Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:31.327587 env[1479]: time="2024-02-13T04:57:31.327572621Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 13 04:57:31.328842 env[1479]: time="2024-02-13T04:57:31.328812520Z" level=info msg="CreateContainer within sandbox \"08cd155dfdbf4ac8f86b907ea8eaa5ca85b538a701f05b8a8f67a47782a3fe8c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 13 04:57:31.333341 env[1479]: time="2024-02-13T04:57:31.333317809Z" level=info msg="CreateContainer within sandbox \"08cd155dfdbf4ac8f86b907ea8eaa5ca85b538a701f05b8a8f67a47782a3fe8c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"834f3d8360bbbe9cd0fa5b9e1d8a12124347f3e2cc0404c2bd383c9325837ab8\"" Feb 13 04:57:31.333635 env[1479]: time="2024-02-13T04:57:31.333594771Z" level=info msg="StartContainer for \"834f3d8360bbbe9cd0fa5b9e1d8a12124347f3e2cc0404c2bd383c9325837ab8\"" Feb 13 04:57:31.342693 systemd[1]: Started cri-containerd-834f3d8360bbbe9cd0fa5b9e1d8a12124347f3e2cc0404c2bd383c9325837ab8.scope. Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.345000 audit: BPF prog-id=123 op=LOAD Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2806 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:31.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346633643833363062626265396364306661356239653164386131 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2806 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:31.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346633643833363062626265396364306661356239653164386131 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit: BPF prog-id=124 op=LOAD Feb 13 04:57:31.346000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000212600 items=0 ppid=2806 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:31.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346633643833363062626265396364306661356239653164386131 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit: BPF prog-id=125 op=LOAD Feb 13 04:57:31.346000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212648 items=0 ppid=2806 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:31.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346633643833363062626265396364306661356239653164386131 Feb 13 04:57:31.346000 audit: BPF prog-id=125 op=UNLOAD Feb 13 04:57:31.346000 audit: BPF prog-id=124 op=UNLOAD Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:31.346000 audit: BPF prog-id=126 op=LOAD Feb 13 04:57:31.346000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000212a58 items=0 ppid=2806 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:31.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833346633643833363062626265396364306661356239653164386131 Feb 13 04:57:31.352584 env[1479]: time="2024-02-13T04:57:31.352533765Z" level=info msg="StartContainer for \"834f3d8360bbbe9cd0fa5b9e1d8a12124347f3e2cc0404c2bd383c9325837ab8\" returns successfully" Feb 13 04:57:31.594615 kubelet[2589]: I0213 04:57:31.594409 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-c8s5z" podStartSLOduration=1.707680324 podCreationTimestamp="2024-02-13 04:57:28 +0000 UTC" firstStartedPulling="2024-02-13 04:57:29.441185346 +0000 UTC m=+13.966793578" lastFinishedPulling="2024-02-13 04:57:31.327823675 +0000 UTC m=+15.853431901" observedRunningTime="2024-02-13 04:57:31.593897567 +0000 UTC m=+16.119505863" watchObservedRunningTime="2024-02-13 04:57:31.594318647 +0000 UTC m=+16.119926922" Feb 13 04:57:33.054000 audit[3062]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:33.054000 audit[3062]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffceb63f9c0 a2=0 a3=7ffceb63f9ac items=0 ppid=2861 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:33.054000 audit[3062]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:33.054000 audit[3062]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffceb63f9c0 a2=0 a3=31030 items=0 ppid=2861 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:33.078000 audit[3064]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:33.078000 audit[3064]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffd0bc6b050 a2=0 a3=7ffd0bc6b03c items=0 ppid=2861 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:33.088000 audit[3064]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3064 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:33.088000 audit[3064]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffd0bc6b050 a2=0 a3=31030 items=0 ppid=2861 pid=3064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:33.195767 kubelet[2589]: I0213 04:57:33.195683 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:33.207778 systemd[1]: Created slice kubepods-besteffort-podfb6e3966_8949_4554_b005_b08aee8be5d8.slice. Feb 13 04:57:33.230256 kubelet[2589]: I0213 04:57:33.230236 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:33.233425 systemd[1]: Created slice kubepods-besteffort-pod371c3739_fce6_44eb_a195_1efe897c474b.slice. Feb 13 04:57:33.309322 kubelet[2589]: I0213 04:57:33.309217 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gp68c\" (UniqueName: \"kubernetes.io/projected/fb6e3966-8949-4554-b005-b08aee8be5d8-kube-api-access-gp68c\") pod \"calico-typha-558dcfb74c-bhz6d\" (UID: \"fb6e3966-8949-4554-b005-b08aee8be5d8\") " pod="calico-system/calico-typha-558dcfb74c-bhz6d" Feb 13 04:57:33.309322 kubelet[2589]: I0213 04:57:33.309258 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fb6e3966-8949-4554-b005-b08aee8be5d8-tigera-ca-bundle\") pod \"calico-typha-558dcfb74c-bhz6d\" (UID: \"fb6e3966-8949-4554-b005-b08aee8be5d8\") " pod="calico-system/calico-typha-558dcfb74c-bhz6d" Feb 13 04:57:33.309322 kubelet[2589]: I0213 04:57:33.309280 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fb6e3966-8949-4554-b005-b08aee8be5d8-typha-certs\") pod \"calico-typha-558dcfb74c-bhz6d\" (UID: \"fb6e3966-8949-4554-b005-b08aee8be5d8\") " pod="calico-system/calico-typha-558dcfb74c-bhz6d" Feb 13 04:57:33.363711 kubelet[2589]: I0213 04:57:33.363590 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:57:33.364368 kubelet[2589]: E0213 04:57:33.364319 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:33.410374 kubelet[2589]: I0213 04:57:33.410344 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z7t4s\" (UniqueName: \"kubernetes.io/projected/371c3739-fce6-44eb-a195-1efe897c474b-kube-api-access-z7t4s\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410533 kubelet[2589]: I0213 04:57:33.410389 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/371c3739-fce6-44eb-a195-1efe897c474b-tigera-ca-bundle\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410533 kubelet[2589]: I0213 04:57:33.410438 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-flexvol-driver-host\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410710 kubelet[2589]: I0213 04:57:33.410533 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/371c3739-fce6-44eb-a195-1efe897c474b-node-certs\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410710 kubelet[2589]: I0213 04:57:33.410583 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-xtables-lock\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410710 kubelet[2589]: I0213 04:57:33.410618 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-cni-log-dir\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410710 kubelet[2589]: I0213 04:57:33.410660 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-var-run-calico\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410710 kubelet[2589]: I0213 04:57:33.410707 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-var-lib-calico\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410955 kubelet[2589]: I0213 04:57:33.410755 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-lib-modules\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410955 kubelet[2589]: I0213 04:57:33.410795 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-policysync\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410955 kubelet[2589]: I0213 04:57:33.410866 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-cni-net-dir\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.410955 kubelet[2589]: I0213 04:57:33.410928 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/371c3739-fce6-44eb-a195-1efe897c474b-cni-bin-dir\") pod \"calico-node-rjvch\" (UID: \"371c3739-fce6-44eb-a195-1efe897c474b\") " pod="calico-system/calico-node-rjvch" Feb 13 04:57:33.511564 kubelet[2589]: I0213 04:57:33.511533 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/91f90690-897e-4df1-979a-b43047e67f6d-socket-dir\") pod \"csi-node-driver-2c97r\" (UID: \"91f90690-897e-4df1-979a-b43047e67f6d\") " pod="calico-system/csi-node-driver-2c97r" Feb 13 04:57:33.511734 kubelet[2589]: I0213 04:57:33.511683 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/91f90690-897e-4df1-979a-b43047e67f6d-kubelet-dir\") pod \"csi-node-driver-2c97r\" (UID: \"91f90690-897e-4df1-979a-b43047e67f6d\") " pod="calico-system/csi-node-driver-2c97r" Feb 13 04:57:33.511905 kubelet[2589]: I0213 04:57:33.511883 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/91f90690-897e-4df1-979a-b43047e67f6d-varrun\") pod \"csi-node-driver-2c97r\" (UID: \"91f90690-897e-4df1-979a-b43047e67f6d\") " pod="calico-system/csi-node-driver-2c97r" Feb 13 04:57:33.511991 env[1479]: time="2024-02-13T04:57:33.511942687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-558dcfb74c-bhz6d,Uid:fb6e3966-8949-4554-b005-b08aee8be5d8,Namespace:calico-system,Attempt:0,}" Feb 13 04:57:33.512333 kubelet[2589]: E0213 04:57:33.512150 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.512333 kubelet[2589]: W0213 04:57:33.512168 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.512333 kubelet[2589]: E0213 04:57:33.512203 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.512529 kubelet[2589]: E0213 04:57:33.512480 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.512529 kubelet[2589]: W0213 04:57:33.512497 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.512529 kubelet[2589]: E0213 04:57:33.512527 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.512695 kubelet[2589]: I0213 04:57:33.512566 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mgtpm\" (UniqueName: \"kubernetes.io/projected/91f90690-897e-4df1-979a-b43047e67f6d-kube-api-access-mgtpm\") pod \"csi-node-driver-2c97r\" (UID: \"91f90690-897e-4df1-979a-b43047e67f6d\") " pod="calico-system/csi-node-driver-2c97r" Feb 13 04:57:33.512820 kubelet[2589]: E0213 04:57:33.512778 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.512820 kubelet[2589]: W0213 04:57:33.512790 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.512820 kubelet[2589]: E0213 04:57:33.512810 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.512988 kubelet[2589]: E0213 04:57:33.512970 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.512988 kubelet[2589]: W0213 04:57:33.512980 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.513072 kubelet[2589]: E0213 04:57:33.512997 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.513207 kubelet[2589]: E0213 04:57:33.513174 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.513207 kubelet[2589]: W0213 04:57:33.513185 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.513207 kubelet[2589]: E0213 04:57:33.513201 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.513375 kubelet[2589]: E0213 04:57:33.513365 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.513375 kubelet[2589]: W0213 04:57:33.513374 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.513493 kubelet[2589]: E0213 04:57:33.513394 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.513590 kubelet[2589]: E0213 04:57:33.513578 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.513635 kubelet[2589]: W0213 04:57:33.513591 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.513635 kubelet[2589]: E0213 04:57:33.513613 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.513863 kubelet[2589]: E0213 04:57:33.513850 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.513863 kubelet[2589]: W0213 04:57:33.513863 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.513971 kubelet[2589]: E0213 04:57:33.513885 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.514079 kubelet[2589]: E0213 04:57:33.514067 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.514124 kubelet[2589]: W0213 04:57:33.514079 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.514124 kubelet[2589]: E0213 04:57:33.514097 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.514288 kubelet[2589]: E0213 04:57:33.514276 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.514333 kubelet[2589]: W0213 04:57:33.514289 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.514333 kubelet[2589]: E0213 04:57:33.514312 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.514548 kubelet[2589]: E0213 04:57:33.514533 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.514628 kubelet[2589]: W0213 04:57:33.514549 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.514628 kubelet[2589]: E0213 04:57:33.514571 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.514790 kubelet[2589]: E0213 04:57:33.514777 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.514790 kubelet[2589]: W0213 04:57:33.514789 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.514932 kubelet[2589]: E0213 04:57:33.514811 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.515038 kubelet[2589]: E0213 04:57:33.515025 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.515082 kubelet[2589]: W0213 04:57:33.515039 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.515082 kubelet[2589]: E0213 04:57:33.515065 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.515281 kubelet[2589]: E0213 04:57:33.515268 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.515281 kubelet[2589]: W0213 04:57:33.515278 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.515387 kubelet[2589]: E0213 04:57:33.515296 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.515500 kubelet[2589]: E0213 04:57:33.515486 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.515544 kubelet[2589]: W0213 04:57:33.515499 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.515544 kubelet[2589]: E0213 04:57:33.515524 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.515732 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.531734 kubelet[2589]: W0213 04:57:33.515742 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.515759 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.515947 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.531734 kubelet[2589]: W0213 04:57:33.515956 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.515975 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.516151 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.531734 kubelet[2589]: W0213 04:57:33.516160 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.516203 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.531734 kubelet[2589]: E0213 04:57:33.516320 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532359 kubelet[2589]: W0213 04:57:33.516330 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532359 kubelet[2589]: E0213 04:57:33.516359 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.532359 kubelet[2589]: E0213 04:57:33.516487 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532359 kubelet[2589]: W0213 04:57:33.516496 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532359 kubelet[2589]: E0213 04:57:33.516531 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.532359 kubelet[2589]: E0213 04:57:33.516644 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532359 kubelet[2589]: W0213 04:57:33.516653 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532359 kubelet[2589]: E0213 04:57:33.516683 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.532359 kubelet[2589]: E0213 04:57:33.516795 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532359 kubelet[2589]: W0213 04:57:33.516804 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.516836 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.516954 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532748 kubelet[2589]: W0213 04:57:33.516963 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.516992 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.517096 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532748 kubelet[2589]: W0213 04:57:33.517104 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.517120 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.517249 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.532748 kubelet[2589]: W0213 04:57:33.517259 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.532748 kubelet[2589]: E0213 04:57:33.517273 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.517461 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533104 kubelet[2589]: W0213 04:57:33.517474 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.517498 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.517689 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533104 kubelet[2589]: W0213 04:57:33.517700 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.517716 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.517933 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533104 kubelet[2589]: W0213 04:57:33.517943 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.517960 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533104 kubelet[2589]: E0213 04:57:33.518133 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533475 kubelet[2589]: W0213 04:57:33.518143 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533475 kubelet[2589]: E0213 04:57:33.518164 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533475 kubelet[2589]: I0213 04:57:33.518194 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/91f90690-897e-4df1-979a-b43047e67f6d-registration-dir\") pod \"csi-node-driver-2c97r\" (UID: \"91f90690-897e-4df1-979a-b43047e67f6d\") " pod="calico-system/csi-node-driver-2c97r" Feb 13 04:57:33.533475 kubelet[2589]: E0213 04:57:33.518415 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533475 kubelet[2589]: W0213 04:57:33.518427 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533475 kubelet[2589]: E0213 04:57:33.518467 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533475 kubelet[2589]: E0213 04:57:33.518625 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533475 kubelet[2589]: W0213 04:57:33.518634 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533475 kubelet[2589]: E0213 04:57:33.518660 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.518784 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533815 kubelet[2589]: W0213 04:57:33.518793 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.518820 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.518966 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533815 kubelet[2589]: W0213 04:57:33.518975 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.518996 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.519120 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.533815 kubelet[2589]: W0213 04:57:33.519128 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.519144 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.533815 kubelet[2589]: E0213 04:57:33.519280 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.534193 kubelet[2589]: W0213 04:57:33.519289 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.534193 kubelet[2589]: E0213 04:57:33.519304 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.534193 kubelet[2589]: E0213 04:57:33.519473 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.534193 kubelet[2589]: W0213 04:57:33.519481 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.534193 kubelet[2589]: E0213 04:57:33.519496 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.534193 kubelet[2589]: E0213 04:57:33.519642 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.534193 kubelet[2589]: W0213 04:57:33.519651 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.534193 kubelet[2589]: E0213 04:57:33.519663 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.534193 kubelet[2589]: E0213 04:57:33.519800 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.534193 kubelet[2589]: W0213 04:57:33.519809 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.534637 kubelet[2589]: E0213 04:57:33.519821 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.534637 kubelet[2589]: E0213 04:57:33.519976 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.534637 kubelet[2589]: W0213 04:57:33.519984 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.534637 kubelet[2589]: E0213 04:57:33.519996 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.535127 kubelet[2589]: E0213 04:57:33.535084 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.535127 kubelet[2589]: W0213 04:57:33.535101 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.535264 kubelet[2589]: E0213 04:57:33.535146 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.540569 env[1479]: time="2024-02-13T04:57:33.540496872Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:33.540569 env[1479]: time="2024-02-13T04:57:33.540545670Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:33.540569 env[1479]: time="2024-02-13T04:57:33.540562999Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:33.540855 env[1479]: time="2024-02-13T04:57:33.540739078Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a14e1e5845a4c9a82cce5caedf86c803f261716e3482149a0e460ef0b32e35f pid=3116 runtime=io.containerd.runc.v2 Feb 13 04:57:33.552063 systemd[1]: Started cri-containerd-2a14e1e5845a4c9a82cce5caedf86c803f261716e3482149a0e460ef0b32e35f.scope. Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.563000 audit: BPF prog-id=127 op=LOAD Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3116 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313465316535383435613463396138326363653563616564663836 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3116 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313465316535383435613463396138326363653563616564663836 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit: BPF prog-id=128 op=LOAD Feb 13 04:57:33.564000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323a50 items=0 ppid=3116 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313465316535383435613463396138326363653563616564663836 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit: BPF prog-id=129 op=LOAD Feb 13 04:57:33.564000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323a98 items=0 ppid=3116 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313465316535383435613463396138326363653563616564663836 Feb 13 04:57:33.564000 audit: BPF prog-id=129 op=UNLOAD Feb 13 04:57:33.564000 audit: BPF prog-id=128 op=UNLOAD Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { perfmon } for pid=3125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit[3125]: AVC avc: denied { bpf } for pid=3125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.564000 audit: BPF prog-id=130 op=LOAD Feb 13 04:57:33.564000 audit[3125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323ea8 items=0 ppid=3116 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261313465316535383435613463396138326363653563616564663836 Feb 13 04:57:33.594304 env[1479]: time="2024-02-13T04:57:33.594269761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-558dcfb74c-bhz6d,Uid:fb6e3966-8949-4554-b005-b08aee8be5d8,Namespace:calico-system,Attempt:0,} returns sandbox id \"2a14e1e5845a4c9a82cce5caedf86c803f261716e3482149a0e460ef0b32e35f\"" Feb 13 04:57:33.595149 env[1479]: time="2024-02-13T04:57:33.595133482Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 13 04:57:33.621997 kubelet[2589]: E0213 04:57:33.621973 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.621997 kubelet[2589]: W0213 04:57:33.621991 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.622173 kubelet[2589]: E0213 04:57:33.622013 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.622225 kubelet[2589]: E0213 04:57:33.622214 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.622266 kubelet[2589]: W0213 04:57:33.622224 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.622266 kubelet[2589]: E0213 04:57:33.622243 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.622397 kubelet[2589]: E0213 04:57:33.622389 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.622397 kubelet[2589]: W0213 04:57:33.622396 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.622486 kubelet[2589]: E0213 04:57:33.622410 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.622551 kubelet[2589]: E0213 04:57:33.622543 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.622551 kubelet[2589]: W0213 04:57:33.622550 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.622633 kubelet[2589]: E0213 04:57:33.622566 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.622726 kubelet[2589]: E0213 04:57:33.622718 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.622726 kubelet[2589]: W0213 04:57:33.622725 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.622808 kubelet[2589]: E0213 04:57:33.622739 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.622926 kubelet[2589]: E0213 04:57:33.622919 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.622926 kubelet[2589]: W0213 04:57:33.622926 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623009 kubelet[2589]: E0213 04:57:33.622940 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623062 kubelet[2589]: E0213 04:57:33.623055 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623062 kubelet[2589]: W0213 04:57:33.623062 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623138 kubelet[2589]: E0213 04:57:33.623075 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623187 kubelet[2589]: E0213 04:57:33.623180 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623187 kubelet[2589]: W0213 04:57:33.623187 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623262 kubelet[2589]: E0213 04:57:33.623200 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623321 kubelet[2589]: E0213 04:57:33.623314 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623321 kubelet[2589]: W0213 04:57:33.623320 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623399 kubelet[2589]: E0213 04:57:33.623338 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623465 kubelet[2589]: E0213 04:57:33.623457 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623465 kubelet[2589]: W0213 04:57:33.623464 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623535 kubelet[2589]: E0213 04:57:33.623485 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623577 kubelet[2589]: E0213 04:57:33.623569 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623577 kubelet[2589]: W0213 04:57:33.623575 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623650 kubelet[2589]: E0213 04:57:33.623594 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623690 kubelet[2589]: E0213 04:57:33.623674 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623690 kubelet[2589]: W0213 04:57:33.623681 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623756 kubelet[2589]: E0213 04:57:33.623700 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623794 kubelet[2589]: E0213 04:57:33.623772 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623794 kubelet[2589]: W0213 04:57:33.623779 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623869 kubelet[2589]: E0213 04:57:33.623794 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.623913 kubelet[2589]: E0213 04:57:33.623874 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.623913 kubelet[2589]: W0213 04:57:33.623881 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.623913 kubelet[2589]: E0213 04:57:33.623895 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624008 kubelet[2589]: E0213 04:57:33.624000 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624054 kubelet[2589]: W0213 04:57:33.624007 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624054 kubelet[2589]: E0213 04:57:33.624021 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624159 kubelet[2589]: E0213 04:57:33.624152 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624159 kubelet[2589]: W0213 04:57:33.624158 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624236 kubelet[2589]: E0213 04:57:33.624171 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624289 kubelet[2589]: E0213 04:57:33.624282 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624289 kubelet[2589]: W0213 04:57:33.624288 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624371 kubelet[2589]: E0213 04:57:33.624301 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624408 kubelet[2589]: E0213 04:57:33.624404 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624455 kubelet[2589]: W0213 04:57:33.624411 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624455 kubelet[2589]: E0213 04:57:33.624424 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624546 kubelet[2589]: E0213 04:57:33.624539 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624580 kubelet[2589]: W0213 04:57:33.624546 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624580 kubelet[2589]: E0213 04:57:33.624557 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624644 kubelet[2589]: E0213 04:57:33.624638 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624644 kubelet[2589]: W0213 04:57:33.624643 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624697 kubelet[2589]: E0213 04:57:33.624652 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624761 kubelet[2589]: E0213 04:57:33.624755 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624761 kubelet[2589]: W0213 04:57:33.624761 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624817 kubelet[2589]: E0213 04:57:33.624770 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624876 kubelet[2589]: E0213 04:57:33.624869 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624904 kubelet[2589]: W0213 04:57:33.624876 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.624904 kubelet[2589]: E0213 04:57:33.624886 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.624990 kubelet[2589]: E0213 04:57:33.624983 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.624990 kubelet[2589]: W0213 04:57:33.624989 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.625043 kubelet[2589]: E0213 04:57:33.624998 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.625100 kubelet[2589]: E0213 04:57:33.625095 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.625124 kubelet[2589]: W0213 04:57:33.625100 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.625124 kubelet[2589]: E0213 04:57:33.625109 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.625230 kubelet[2589]: E0213 04:57:33.625222 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.625230 kubelet[2589]: W0213 04:57:33.625227 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.625317 kubelet[2589]: E0213 04:57:33.625234 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.629964 kubelet[2589]: E0213 04:57:33.629922 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:33.629964 kubelet[2589]: W0213 04:57:33.629933 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:33.629964 kubelet[2589]: E0213 04:57:33.629945 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:33.836135 env[1479]: time="2024-02-13T04:57:33.835918041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rjvch,Uid:371c3739-fce6-44eb-a195-1efe897c474b,Namespace:calico-system,Attempt:0,}" Feb 13 04:57:33.857146 env[1479]: time="2024-02-13T04:57:33.856966392Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:57:33.857146 env[1479]: time="2024-02-13T04:57:33.857068552Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:57:33.857146 env[1479]: time="2024-02-13T04:57:33.857103371Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:57:33.857541 env[1479]: time="2024-02-13T04:57:33.857374745Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406 pid=3184 runtime=io.containerd.runc.v2 Feb 13 04:57:33.880001 systemd[1]: Started cri-containerd-6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406.scope. Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936376 kernel: kauditd_printk_skb: 428 callbacks suppressed Feb 13 04:57:33.936472 kernel: audit: type=1400 audit(1707800253.902:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059851 kernel: audit: type=1400 audit(1707800253.902:1089): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059905 kernel: audit: type=1400 audit(1707800253.902:1090): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.121609 kernel: audit: type=1400 audit(1707800253.902:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183708 kernel: audit: type=1400 audit(1707800253.902:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.307899 kernel: audit: type=1400 audit(1707800253.902:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.307961 kernel: audit: type=1400 audit(1707800253.902:1094): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.432136 kernel: audit: type=1400 audit(1707800253.902:1095): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.432170 kernel: audit: type=1400 audit(1707800253.902:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.935000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.498373 env[1479]: time="2024-02-13T04:57:34.498347274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rjvch,Uid:371c3739-fce6-44eb-a195-1efe897c474b,Namespace:calico-system,Attempt:0,} returns sandbox id \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\"" Feb 13 04:57:34.555666 kernel: audit: type=1400 audit(1707800253.935:1097): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.935000 audit: BPF prog-id=131 op=LOAD Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3184 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638383761383161356537313530636165326362333738336632363533 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3184 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638383761383161356537313530636165326362333738336632363533 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:33.936000 audit: BPF prog-id=132 op=LOAD Feb 13 04:57:33.936000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032bb90 items=0 ppid=3184 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:33.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638383761383161356537313530636165326362333738336632363533 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.103000 audit[3211]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:34.103000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffea993cc90 a2=0 a3=7ffea993cc7c items=0 ppid=2861 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:34.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:34.059000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.059000 audit: BPF prog-id=133 op=LOAD Feb 13 04:57:34.059000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032bbd8 items=0 ppid=3184 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:34.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638383761383161356537313530636165326362333738336632363533 Feb 13 04:57:34.183000 audit: BPF prog-id=133 op=UNLOAD Feb 13 04:57:34.183000 audit: BPF prog-id=132 op=UNLOAD Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { perfmon } for pid=3193 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit[3193]: AVC avc: denied { bpf } for pid=3193 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:34.183000 audit: BPF prog-id=134 op=LOAD Feb 13 04:57:34.183000 audit[3193]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00032bfe8 items=0 ppid=3184 pid=3193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:34.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638383761383161356537313530636165326362333738336632363533 Feb 13 04:57:34.103000 audit[3211]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:34.103000 audit[3211]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffea993cc90 a2=0 a3=31030 items=0 ppid=2861 pid=3211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:34.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:35.207985 systemd[1]: Started sshd@7-139.178.90.239:22-180.101.88.197:13512.service. Feb 13 04:57:35.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.239:22-180.101.88.197:13512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:35.529017 kubelet[2589]: E0213 04:57:35.528941 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:36.267788 sshd[3221]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:36.267000 audit[3221]: USER_AUTH pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:37.529066 kubelet[2589]: E0213 04:57:37.528965 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:37.890983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2817371875.mount: Deactivated successfully. Feb 13 04:57:38.220709 sshd[3221]: Failed password for root from 180.101.88.197 port 13512 ssh2 Feb 13 04:57:39.467000 audit[3221]: USER_AUTH pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:39.495463 kernel: kauditd_printk_skb: 55 callbacks suppressed Feb 13 04:57:39.495528 kernel: audit: type=1100 audit(1707800259.467:1110): pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:39.528775 kubelet[2589]: E0213 04:57:39.528683 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:41.528689 kubelet[2589]: E0213 04:57:41.528672 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:41.833554 sshd[3221]: Failed password for root from 180.101.88.197 port 13512 ssh2 Feb 13 04:57:42.639075 env[1479]: time="2024-02-13T04:57:42.639052542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:42.639701 env[1479]: time="2024-02-13T04:57:42.639683730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:42.640920 env[1479]: time="2024-02-13T04:57:42.640906781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:42.642166 env[1479]: time="2024-02-13T04:57:42.642152598Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:57:42.642517 env[1479]: time="2024-02-13T04:57:42.642500958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 13 04:57:42.642794 env[1479]: time="2024-02-13T04:57:42.642782152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 13 04:57:42.646064 env[1479]: time="2024-02-13T04:57:42.646045961Z" level=info msg="CreateContainer within sandbox \"2a14e1e5845a4c9a82cce5caedf86c803f261716e3482149a0e460ef0b32e35f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 13 04:57:42.650999 env[1479]: time="2024-02-13T04:57:42.650949058Z" level=info msg="CreateContainer within sandbox \"2a14e1e5845a4c9a82cce5caedf86c803f261716e3482149a0e460ef0b32e35f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"714f1bfa55d4fa7fb379dee98b14ff2fc5ff3d2165364af0718a7225fd3c59ab\"" Feb 13 04:57:42.651254 env[1479]: time="2024-02-13T04:57:42.651214295Z" level=info msg="StartContainer for \"714f1bfa55d4fa7fb379dee98b14ff2fc5ff3d2165364af0718a7225fd3c59ab\"" Feb 13 04:57:42.659050 systemd[1]: Started cri-containerd-714f1bfa55d4fa7fb379dee98b14ff2fc5ff3d2165364af0718a7225fd3c59ab.scope. Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.788892 kernel: audit: type=1400 audit(1707800262.664:1111): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.788931 kernel: audit: type=1400 audit(1707800262.664:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.788946 kernel: audit: type=1400 audit(1707800262.664:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.850989 kernel: audit: type=1400 audit(1707800262.664:1114): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.913526 kernel: audit: type=1400 audit(1707800262.664:1115): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.038749 kernel: audit: type=1400 audit(1707800262.664:1116): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.038780 kernel: audit: type=1400 audit(1707800262.664:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.101379 kernel: audit: type=1400 audit(1707800262.664:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.226292 kernel: audit: type=1400 audit(1707800262.664:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.667000 audit[3221]: USER_AUTH pid=3221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:42.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit: BPF prog-id=135 op=LOAD Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=3116 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:42.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731346631626661353564346661376662333739646565393862313466 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=3116 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:42.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731346631626661353564346661376662333739646565393862313466 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.787000 audit: BPF prog-id=136 op=LOAD Feb 13 04:57:42.787000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c00016fdc0 items=0 ppid=3116 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:42.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731346631626661353564346661376662333739646565393862313466 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:42.912000 audit: BPF prog-id=137 op=LOAD Feb 13 04:57:42.912000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c00016fe08 items=0 ppid=3116 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:42.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731346631626661353564346661376662333739646565393862313466 Feb 13 04:57:43.037000 audit: BPF prog-id=137 op=UNLOAD Feb 13 04:57:43.037000 audit: BPF prog-id=136 op=UNLOAD Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { perfmon } for pid=3232 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit[3232]: AVC avc: denied { bpf } for pid=3232 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:57:43.037000 audit: BPF prog-id=138 op=LOAD Feb 13 04:57:43.037000 audit[3232]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c0003cc218 items=0 ppid=3116 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:43.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731346631626661353564346661376662333739646565393862313466 Feb 13 04:57:43.242484 env[1479]: time="2024-02-13T04:57:43.242460946Z" level=info msg="StartContainer for \"714f1bfa55d4fa7fb379dee98b14ff2fc5ff3d2165364af0718a7225fd3c59ab\" returns successfully" Feb 13 04:57:43.529239 kubelet[2589]: E0213 04:57:43.529056 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:43.630124 kubelet[2589]: I0213 04:57:43.630054 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-558dcfb74c-bhz6d" podStartSLOduration=1.582168551 podCreationTimestamp="2024-02-13 04:57:33 +0000 UTC" firstStartedPulling="2024-02-13 04:57:33.594964672 +0000 UTC m=+18.120572901" lastFinishedPulling="2024-02-13 04:57:42.642686432 +0000 UTC m=+27.168294657" observedRunningTime="2024-02-13 04:57:43.629182326 +0000 UTC m=+28.154790615" watchObservedRunningTime="2024-02-13 04:57:43.629890307 +0000 UTC m=+28.155498593" Feb 13 04:57:43.657000 audit[3275]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:43.657000 audit[3275]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc184fcf10 a2=0 a3=7ffc184fcefc items=0 ppid=2861 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:43.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:43.657000 audit[3275]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3275 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:57:43.657000 audit[3275]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc184fcf10 a2=0 a3=7ffc184fcefc items=0 ppid=2861 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:57:43.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:57:43.682422 kubelet[2589]: E0213 04:57:43.682410 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.682422 kubelet[2589]: W0213 04:57:43.682420 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.682519 kubelet[2589]: E0213 04:57:43.682453 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.682566 kubelet[2589]: E0213 04:57:43.682558 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.682566 kubelet[2589]: W0213 04:57:43.682566 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.682635 kubelet[2589]: E0213 04:57:43.682577 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.682673 kubelet[2589]: E0213 04:57:43.682665 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.682709 kubelet[2589]: W0213 04:57:43.682672 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.682709 kubelet[2589]: E0213 04:57:43.682683 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.682791 kubelet[2589]: E0213 04:57:43.682784 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.682791 kubelet[2589]: W0213 04:57:43.682790 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.682856 kubelet[2589]: E0213 04:57:43.682800 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.682894 kubelet[2589]: E0213 04:57:43.682884 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.682894 kubelet[2589]: W0213 04:57:43.682890 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.682955 kubelet[2589]: E0213 04:57:43.682900 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.682992 kubelet[2589]: E0213 04:57:43.682982 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.682992 kubelet[2589]: W0213 04:57:43.682989 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683066 kubelet[2589]: E0213 04:57:43.682999 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.683132 kubelet[2589]: E0213 04:57:43.683125 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.683132 kubelet[2589]: W0213 04:57:43.683131 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683200 kubelet[2589]: E0213 04:57:43.683140 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.683232 kubelet[2589]: E0213 04:57:43.683229 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.683268 kubelet[2589]: W0213 04:57:43.683235 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683268 kubelet[2589]: E0213 04:57:43.683244 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.683331 kubelet[2589]: E0213 04:57:43.683327 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.683371 kubelet[2589]: W0213 04:57:43.683333 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683371 kubelet[2589]: E0213 04:57:43.683343 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.683438 kubelet[2589]: E0213 04:57:43.683431 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.683438 kubelet[2589]: W0213 04:57:43.683437 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683512 kubelet[2589]: E0213 04:57:43.683450 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.683552 kubelet[2589]: E0213 04:57:43.683531 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.683552 kubelet[2589]: W0213 04:57:43.683538 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683552 kubelet[2589]: E0213 04:57:43.683547 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.683829 kubelet[2589]: E0213 04:57:43.683665 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.683829 kubelet[2589]: W0213 04:57:43.683671 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.683829 kubelet[2589]: E0213 04:57:43.683682 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.696764 kubelet[2589]: E0213 04:57:43.696715 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.696764 kubelet[2589]: W0213 04:57:43.696749 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.697109 kubelet[2589]: E0213 04:57:43.696798 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.697366 kubelet[2589]: E0213 04:57:43.697332 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.697366 kubelet[2589]: W0213 04:57:43.697357 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.697655 kubelet[2589]: E0213 04:57:43.697399 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.697999 kubelet[2589]: E0213 04:57:43.697958 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.697999 kubelet[2589]: W0213 04:57:43.697989 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.698291 kubelet[2589]: E0213 04:57:43.698035 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.698620 kubelet[2589]: E0213 04:57:43.698546 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.698620 kubelet[2589]: W0213 04:57:43.698580 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.698620 kubelet[2589]: E0213 04:57:43.698630 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.699193 kubelet[2589]: E0213 04:57:43.699123 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.699193 kubelet[2589]: W0213 04:57:43.699155 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.699545 kubelet[2589]: E0213 04:57:43.699253 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.699678 kubelet[2589]: E0213 04:57:43.699562 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.699678 kubelet[2589]: W0213 04:57:43.699585 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.699678 kubelet[2589]: E0213 04:57:43.699668 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.700060 kubelet[2589]: E0213 04:57:43.700037 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.700196 kubelet[2589]: W0213 04:57:43.700066 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.700196 kubelet[2589]: E0213 04:57:43.700153 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.700621 kubelet[2589]: E0213 04:57:43.700535 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.700621 kubelet[2589]: W0213 04:57:43.700559 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.700621 kubelet[2589]: E0213 04:57:43.700600 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.701227 kubelet[2589]: E0213 04:57:43.701188 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.701227 kubelet[2589]: W0213 04:57:43.701222 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.701568 kubelet[2589]: E0213 04:57:43.701278 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.701811 kubelet[2589]: E0213 04:57:43.701776 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.701811 kubelet[2589]: W0213 04:57:43.701803 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.702131 kubelet[2589]: E0213 04:57:43.701937 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.702283 kubelet[2589]: E0213 04:57:43.702268 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.702480 kubelet[2589]: W0213 04:57:43.702296 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.702480 kubelet[2589]: E0213 04:57:43.702398 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.702816 kubelet[2589]: E0213 04:57:43.702784 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.702816 kubelet[2589]: W0213 04:57:43.702812 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.703206 kubelet[2589]: E0213 04:57:43.702928 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.703373 kubelet[2589]: E0213 04:57:43.703290 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.703373 kubelet[2589]: W0213 04:57:43.703321 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.703720 kubelet[2589]: E0213 04:57:43.703377 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.703964 kubelet[2589]: E0213 04:57:43.703932 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.704141 kubelet[2589]: W0213 04:57:43.703964 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.704141 kubelet[2589]: E0213 04:57:43.704070 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.704477 kubelet[2589]: E0213 04:57:43.704426 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.704650 kubelet[2589]: W0213 04:57:43.704478 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.704650 kubelet[2589]: E0213 04:57:43.704528 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.705085 kubelet[2589]: E0213 04:57:43.705032 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.705085 kubelet[2589]: W0213 04:57:43.705065 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.705357 kubelet[2589]: E0213 04:57:43.705114 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.705731 kubelet[2589]: E0213 04:57:43.705661 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.705731 kubelet[2589]: W0213 04:57:43.705698 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.705731 kubelet[2589]: E0213 04:57:43.705737 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.706594 kubelet[2589]: E0213 04:57:43.706510 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:43.706594 kubelet[2589]: W0213 04:57:43.706537 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:43.706594 kubelet[2589]: E0213 04:57:43.706571 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:43.778805 sshd[3221]: Failed password for root from 180.101.88.197 port 13512 ssh2 Feb 13 04:57:44.348428 sshd[3221]: Received disconnect from 180.101.88.197 port 13512:11: [preauth] Feb 13 04:57:44.348428 sshd[3221]: Disconnected from authenticating user root 180.101.88.197 port 13512 [preauth] Feb 13 04:57:44.348948 sshd[3221]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:44.350863 systemd[1]: sshd@7-139.178.90.239:22-180.101.88.197:13512.service: Deactivated successfully. Feb 13 04:57:44.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.239:22-180.101.88.197:13512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:44.533236 systemd[1]: Started sshd@8-139.178.90.239:22-180.101.88.197:12187.service. Feb 13 04:57:44.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.239:22-180.101.88.197:12187 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:44.560209 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 13 04:57:44.560304 kernel: audit: type=1130 audit(1707800264.532:1133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.239:22-180.101.88.197:12187 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:44.692826 kubelet[2589]: E0213 04:57:44.692739 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.692826 kubelet[2589]: W0213 04:57:44.692752 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.692826 kubelet[2589]: E0213 04:57:44.692766 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693069 kubelet[2589]: E0213 04:57:44.692937 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693069 kubelet[2589]: W0213 04:57:44.692945 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693069 kubelet[2589]: E0213 04:57:44.692955 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693165 kubelet[2589]: E0213 04:57:44.693071 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693165 kubelet[2589]: W0213 04:57:44.693079 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693165 kubelet[2589]: E0213 04:57:44.693087 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693283 kubelet[2589]: E0213 04:57:44.693231 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693283 kubelet[2589]: W0213 04:57:44.693239 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693283 kubelet[2589]: E0213 04:57:44.693248 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693352 kubelet[2589]: E0213 04:57:44.693327 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693352 kubelet[2589]: W0213 04:57:44.693332 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693352 kubelet[2589]: E0213 04:57:44.693339 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693425 kubelet[2589]: E0213 04:57:44.693419 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693456 kubelet[2589]: W0213 04:57:44.693426 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693456 kubelet[2589]: E0213 04:57:44.693433 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693611 kubelet[2589]: E0213 04:57:44.693574 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693611 kubelet[2589]: W0213 04:57:44.693579 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693611 kubelet[2589]: E0213 04:57:44.693585 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693693 kubelet[2589]: E0213 04:57:44.693689 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693693 kubelet[2589]: W0213 04:57:44.693693 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693740 kubelet[2589]: E0213 04:57:44.693701 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693811 kubelet[2589]: E0213 04:57:44.693771 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693811 kubelet[2589]: W0213 04:57:44.693776 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693811 kubelet[2589]: E0213 04:57:44.693782 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693888 kubelet[2589]: E0213 04:57:44.693852 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693888 kubelet[2589]: W0213 04:57:44.693856 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693888 kubelet[2589]: E0213 04:57:44.693863 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.693951 kubelet[2589]: E0213 04:57:44.693929 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.693951 kubelet[2589]: W0213 04:57:44.693934 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.693951 kubelet[2589]: E0213 04:57:44.693939 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.694011 kubelet[2589]: E0213 04:57:44.694004 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.694011 kubelet[2589]: W0213 04:57:44.694009 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.694052 kubelet[2589]: E0213 04:57:44.694014 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.704977 kubelet[2589]: E0213 04:57:44.704901 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.704977 kubelet[2589]: W0213 04:57:44.704935 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.704977 kubelet[2589]: E0213 04:57:44.704973 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.705595 kubelet[2589]: E0213 04:57:44.705524 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.705595 kubelet[2589]: W0213 04:57:44.705549 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.705595 kubelet[2589]: E0213 04:57:44.705590 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.706176 kubelet[2589]: E0213 04:57:44.706101 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.706176 kubelet[2589]: W0213 04:57:44.706132 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.706176 kubelet[2589]: E0213 04:57:44.706178 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.706751 kubelet[2589]: E0213 04:57:44.706677 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.706751 kubelet[2589]: W0213 04:57:44.706707 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.706751 kubelet[2589]: E0213 04:57:44.706752 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.707302 kubelet[2589]: E0213 04:57:44.707244 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.707302 kubelet[2589]: W0213 04:57:44.707276 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.707562 kubelet[2589]: E0213 04:57:44.707405 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.707831 kubelet[2589]: E0213 04:57:44.707758 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.707831 kubelet[2589]: W0213 04:57:44.707799 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.708140 kubelet[2589]: E0213 04:57:44.707931 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.708301 kubelet[2589]: E0213 04:57:44.708270 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.708427 kubelet[2589]: W0213 04:57:44.708304 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.708427 kubelet[2589]: E0213 04:57:44.708415 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.708907 kubelet[2589]: E0213 04:57:44.708876 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.709018 kubelet[2589]: W0213 04:57:44.708911 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.709018 kubelet[2589]: E0213 04:57:44.708975 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.709565 kubelet[2589]: E0213 04:57:44.709532 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.709697 kubelet[2589]: W0213 04:57:44.709580 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.709697 kubelet[2589]: E0213 04:57:44.709648 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.710259 kubelet[2589]: E0213 04:57:44.710184 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.710259 kubelet[2589]: W0213 04:57:44.710219 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.710601 kubelet[2589]: E0213 04:57:44.710319 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.710812 kubelet[2589]: E0213 04:57:44.710738 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.710812 kubelet[2589]: W0213 04:57:44.710773 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.711107 kubelet[2589]: E0213 04:57:44.710858 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.711280 kubelet[2589]: E0213 04:57:44.711250 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.711395 kubelet[2589]: W0213 04:57:44.711283 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.711395 kubelet[2589]: E0213 04:57:44.711330 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.712064 kubelet[2589]: E0213 04:57:44.711988 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.712064 kubelet[2589]: W0213 04:57:44.712025 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.712064 kubelet[2589]: E0213 04:57:44.712073 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.712759 kubelet[2589]: E0213 04:57:44.712678 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.712759 kubelet[2589]: W0213 04:57:44.712712 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.713101 kubelet[2589]: E0213 04:57:44.712801 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.713251 kubelet[2589]: E0213 04:57:44.713221 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.713368 kubelet[2589]: W0213 04:57:44.713250 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.713368 kubelet[2589]: E0213 04:57:44.713290 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.713599 kubelet[2589]: E0213 04:57:44.713557 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.713599 kubelet[2589]: W0213 04:57:44.713562 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.713599 kubelet[2589]: E0213 04:57:44.713571 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.713688 kubelet[2589]: E0213 04:57:44.713679 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.713688 kubelet[2589]: W0213 04:57:44.713683 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.713688 kubelet[2589]: E0213 04:57:44.713689 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:44.713849 kubelet[2589]: E0213 04:57:44.713806 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:44.713849 kubelet[2589]: W0213 04:57:44.713810 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:44.713849 kubelet[2589]: E0213 04:57:44.713816 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.529699 kubelet[2589]: E0213 04:57:45.529617 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:45.702482 kubelet[2589]: E0213 04:57:45.702402 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.702482 kubelet[2589]: W0213 04:57:45.702471 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.703657 kubelet[2589]: E0213 04:57:45.702549 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.703657 kubelet[2589]: E0213 04:57:45.703119 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.703657 kubelet[2589]: W0213 04:57:45.703155 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.703657 kubelet[2589]: E0213 04:57:45.703212 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.704319 kubelet[2589]: E0213 04:57:45.703787 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.704319 kubelet[2589]: W0213 04:57:45.703822 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.704319 kubelet[2589]: E0213 04:57:45.703873 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.704818 kubelet[2589]: E0213 04:57:45.704485 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.704818 kubelet[2589]: W0213 04:57:45.704519 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.704818 kubelet[2589]: E0213 04:57:45.704573 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.705293 kubelet[2589]: E0213 04:57:45.705102 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.705293 kubelet[2589]: W0213 04:57:45.705133 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.705293 kubelet[2589]: E0213 04:57:45.705184 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.705769 kubelet[2589]: E0213 04:57:45.705674 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.705769 kubelet[2589]: W0213 04:57:45.705707 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.705769 kubelet[2589]: E0213 04:57:45.705757 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.706474 kubelet[2589]: E0213 04:57:45.706414 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.706474 kubelet[2589]: W0213 04:57:45.706462 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.706852 kubelet[2589]: E0213 04:57:45.706519 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.707076 kubelet[2589]: E0213 04:57:45.707038 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.707076 kubelet[2589]: W0213 04:57:45.707069 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.707406 kubelet[2589]: E0213 04:57:45.707120 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.707672 kubelet[2589]: E0213 04:57:45.707635 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.707672 kubelet[2589]: W0213 04:57:45.707665 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.708012 kubelet[2589]: E0213 04:57:45.707716 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.708269 kubelet[2589]: E0213 04:57:45.708232 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.708269 kubelet[2589]: W0213 04:57:45.708261 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.708625 kubelet[2589]: E0213 04:57:45.708310 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.708866 kubelet[2589]: E0213 04:57:45.708829 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.708866 kubelet[2589]: W0213 04:57:45.708859 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.709198 kubelet[2589]: E0213 04:57:45.708908 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.709459 kubelet[2589]: E0213 04:57:45.709412 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.709650 kubelet[2589]: W0213 04:57:45.709459 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.709650 kubelet[2589]: E0213 04:57:45.709511 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.714433 kubelet[2589]: E0213 04:57:45.714426 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.714433 kubelet[2589]: W0213 04:57:45.714432 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.714508 kubelet[2589]: E0213 04:57:45.714443 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.714592 kubelet[2589]: E0213 04:57:45.714584 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.714592 kubelet[2589]: W0213 04:57:45.714590 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.714653 kubelet[2589]: E0213 04:57:45.714598 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.714722 kubelet[2589]: E0213 04:57:45.714715 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.714722 kubelet[2589]: W0213 04:57:45.714721 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.714779 kubelet[2589]: E0213 04:57:45.714729 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.714894 kubelet[2589]: E0213 04:57:45.714887 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.714894 kubelet[2589]: W0213 04:57:45.714893 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.714953 kubelet[2589]: E0213 04:57:45.714902 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715059 kubelet[2589]: E0213 04:57:45.715035 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715059 kubelet[2589]: W0213 04:57:45.715042 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715131 kubelet[2589]: E0213 04:57:45.715064 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715216 kubelet[2589]: E0213 04:57:45.715166 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715216 kubelet[2589]: W0213 04:57:45.715170 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715216 kubelet[2589]: E0213 04:57:45.715194 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715308 kubelet[2589]: E0213 04:57:45.715304 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715308 kubelet[2589]: W0213 04:57:45.715308 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715347 kubelet[2589]: E0213 04:57:45.715314 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715424 kubelet[2589]: E0213 04:57:45.715418 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715454 kubelet[2589]: W0213 04:57:45.715425 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715454 kubelet[2589]: E0213 04:57:45.715436 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715532 kubelet[2589]: E0213 04:57:45.715527 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715532 kubelet[2589]: W0213 04:57:45.715531 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715570 kubelet[2589]: E0213 04:57:45.715538 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715618 kubelet[2589]: E0213 04:57:45.715613 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715618 kubelet[2589]: W0213 04:57:45.715618 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715727 kubelet[2589]: E0213 04:57:45.715639 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715762 kubelet[2589]: E0213 04:57:45.715754 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715794 kubelet[2589]: W0213 04:57:45.715762 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715794 kubelet[2589]: E0213 04:57:45.715775 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715864 kubelet[2589]: E0213 04:57:45.715858 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715922 kubelet[2589]: W0213 04:57:45.715863 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715922 kubelet[2589]: E0213 04:57:45.715875 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.715986 kubelet[2589]: E0213 04:57:45.715947 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.715986 kubelet[2589]: W0213 04:57:45.715953 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.715986 kubelet[2589]: E0213 04:57:45.715963 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.716119 kubelet[2589]: E0213 04:57:45.716047 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.716119 kubelet[2589]: W0213 04:57:45.716053 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.716119 kubelet[2589]: E0213 04:57:45.716063 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.716228 kubelet[2589]: E0213 04:57:45.716184 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.716228 kubelet[2589]: W0213 04:57:45.716188 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.716228 kubelet[2589]: E0213 04:57:45.716193 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.716299 kubelet[2589]: E0213 04:57:45.716267 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.716299 kubelet[2589]: W0213 04:57:45.716270 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.716299 kubelet[2589]: E0213 04:57:45.716278 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.716387 kubelet[2589]: E0213 04:57:45.716383 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.716387 kubelet[2589]: W0213 04:57:45.716387 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.716429 kubelet[2589]: E0213 04:57:45.716394 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:45.716478 kubelet[2589]: E0213 04:57:45.716474 2589 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 04:57:45.716478 kubelet[2589]: W0213 04:57:45.716478 2589 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 04:57:45.716535 kubelet[2589]: E0213 04:57:45.716483 2589 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 04:57:46.074567 sshd[3308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:46.074000 audit[3308]: USER_AUTH pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:46.167637 kernel: audit: type=1100 audit(1707800266.074:1134): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:47.529150 kubelet[2589]: E0213 04:57:47.529045 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:48.734923 sshd[3308]: Failed password for root from 180.101.88.197 port 12187 ssh2 Feb 13 04:57:49.282000 audit[3308]: ANOM_LOGIN_FAILURES pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:49.283299 sshd[3308]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 04:57:49.282000 audit[3308]: USER_AUTH pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:49.444798 kernel: audit: type=2100 audit(1707800269.282:1135): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:49.444835 kernel: audit: type=1100 audit(1707800269.282:1136): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:49.529269 kubelet[2589]: E0213 04:57:49.529146 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:51.020346 sshd[3308]: Failed password for root from 180.101.88.197 port 12187 ssh2 Feb 13 04:57:51.529697 kubelet[2589]: E0213 04:57:51.529590 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:52.491000 audit[3308]: USER_AUTH pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:52.584635 kernel: audit: type=1100 audit(1707800272.491:1137): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:53.529082 kubelet[2589]: E0213 04:57:53.529007 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:54.308684 sshd[3308]: Failed password for root from 180.101.88.197 port 12187 ssh2 Feb 13 04:57:55.528868 kubelet[2589]: E0213 04:57:55.528848 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:55.700796 sshd[3308]: Received disconnect from 180.101.88.197 port 12187:11: [preauth] Feb 13 04:57:55.700796 sshd[3308]: Disconnected from authenticating user root 180.101.88.197 port 12187 [preauth] Feb 13 04:57:55.701318 sshd[3308]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:55.703424 systemd[1]: sshd@8-139.178.90.239:22-180.101.88.197:12187.service: Deactivated successfully. Feb 13 04:57:55.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.239:22-180.101.88.197:12187 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:55.795652 kernel: audit: type=1131 audit(1707800275.702:1138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.239:22-180.101.88.197:12187 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:55.904618 systemd[1]: Started sshd@9-139.178.90.239:22-180.101.88.197:23978.service. Feb 13 04:57:55.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.239:22-180.101.88.197:23978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:55.997446 kernel: audit: type=1130 audit(1707800275.903:1139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.239:22-180.101.88.197:23978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:57:57.082381 sshd[3376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:57:57.081000 audit[3376]: USER_AUTH pid=3376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:57.175447 kernel: audit: type=1100 audit(1707800277.081:1140): pid=3376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:57:57.528884 kubelet[2589]: E0213 04:57:57.528785 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:57:59.250032 sshd[3376]: Failed password for root from 180.101.88.197 port 23978 ssh2 Feb 13 04:57:59.529355 kubelet[2589]: E0213 04:57:59.529145 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:00.303000 audit[3376]: USER_AUTH pid=3376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:00.396485 kernel: audit: type=1100 audit(1707800280.303:1141): pid=3376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:01.529133 kubelet[2589]: E0213 04:58:01.529045 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:01.886101 sshd[3376]: Failed password for root from 180.101.88.197 port 23978 ssh2 Feb 13 04:58:02.280656 env[1479]: time="2024-02-13T04:58:02.280526489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:02.283902 env[1479]: time="2024-02-13T04:58:02.283789634Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:02.290234 env[1479]: time="2024-02-13T04:58:02.290101826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:02.342684 env[1479]: time="2024-02-13T04:58:02.342528199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:02.346328 env[1479]: time="2024-02-13T04:58:02.346248911Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 13 04:58:02.351311 env[1479]: time="2024-02-13T04:58:02.351235488Z" level=info msg="CreateContainer within sandbox \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 13 04:58:02.467504 env[1479]: time="2024-02-13T04:58:02.467432816Z" level=info msg="CreateContainer within sandbox \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3\"" Feb 13 04:58:02.467793 env[1479]: time="2024-02-13T04:58:02.467744555Z" level=info msg="StartContainer for \"ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3\"" Feb 13 04:58:02.478133 systemd[1]: Started cri-containerd-ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3.scope. Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f07eabd9dc8 items=0 ppid=3184 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:02.651842 kernel: audit: type=1400 audit(1707800282.485:1142): avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.651923 kernel: audit: type=1300 audit(1707800282.485:1142): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f07eabd9dc8 items=0 ppid=3184 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:02.651940 kernel: audit: type=1327 audit(1707800282.485:1142): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363261633062373366313731366561376338396662333233356330 Feb 13 04:58:02.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363261633062373366313731366561376338396662333233356330 Feb 13 04:58:02.748523 kernel: audit: type=1400 audit(1707800282.485:1143): avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.877248 kernel: audit: type=1400 audit(1707800282.485:1143): avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.877283 kernel: audit: type=1400 audit(1707800282.485:1143): avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.941689 kernel: audit: type=1400 audit(1707800282.485:1143): avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:03.006394 kernel: audit: type=1400 audit(1707800282.485:1143): avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:03.028910 env[1479]: time="2024-02-13T04:58:03.028858304Z" level=info msg="StartContainer for \"ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3\" returns successfully" Feb 13 04:58:03.071121 kernel: audit: type=1400 audit(1707800282.485:1143): avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:03.071375 systemd[1]: cri-containerd-ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3.scope: Deactivated successfully. Feb 13 04:58:03.080338 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3-rootfs.mount: Deactivated successfully. Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.485000 audit: BPF prog-id=139 op=LOAD Feb 13 04:58:02.485000 audit[3387]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e61a8 items=0 ppid=3184 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:02.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363261633062373366313731366561376338396662333233356330 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.650000 audit: BPF prog-id=140 op=LOAD Feb 13 04:58:02.650000 audit[3387]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e61f8 items=0 ppid=3184 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:02.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363261633062373366313731366561376338396662333233356330 Feb 13 04:58:02.811000 audit: BPF prog-id=140 op=UNLOAD Feb 13 04:58:02.811000 audit: BPF prog-id=139 op=UNLOAD Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { perfmon } for pid=3387 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit[3387]: AVC avc: denied { bpf } for pid=3387 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:02.811000 audit: BPF prog-id=141 op=LOAD Feb 13 04:58:02.811000 audit[3387]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e6288 items=0 ppid=3184 pid=3387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:02.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561363261633062373366313731366561376338396662333233356330 Feb 13 04:58:03.146000 audit: BPF prog-id=141 op=UNLOAD Feb 13 04:58:03.360564 env[1479]: time="2024-02-13T04:58:03.360416575Z" level=info msg="shim disconnected" id=ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3 Feb 13 04:58:03.360564 env[1479]: time="2024-02-13T04:58:03.360536975Z" level=warning msg="cleaning up after shim disconnected" id=ea62ac0b73f1716ea7c89fb3235c04fccb852ef7e9799b1385d0fd63c7f7d6e3 namespace=k8s.io Feb 13 04:58:03.360564 env[1479]: time="2024-02-13T04:58:03.360565848Z" level=info msg="cleaning up dead shim" Feb 13 04:58:03.375582 env[1479]: time="2024-02-13T04:58:03.375474443Z" level=warning msg="cleanup warnings time=\"2024-02-13T04:58:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3424 runtime=io.containerd.runc.v2\n" Feb 13 04:58:03.525000 audit[3376]: USER_AUTH pid=3376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=180.101.88.197 addr=180.101.88.197 terminal=ssh res=failed' Feb 13 04:58:03.529653 kubelet[2589]: E0213 04:58:03.529567 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:03.668989 env[1479]: time="2024-02-13T04:58:03.668891654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 13 04:58:05.187670 sshd[3376]: Failed password for root from 180.101.88.197 port 23978 ssh2 Feb 13 04:58:05.529747 kubelet[2589]: E0213 04:58:05.529662 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:06.749248 sshd[3376]: Received disconnect from 180.101.88.197 port 23978:11: [preauth] Feb 13 04:58:06.749248 sshd[3376]: Disconnected from authenticating user root 180.101.88.197 port 23978 [preauth] Feb 13 04:58:06.749817 sshd[3376]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.101.88.197 user=root Feb 13 04:58:06.751725 systemd[1]: sshd@9-139.178.90.239:22-180.101.88.197:23978.service: Deactivated successfully. Feb 13 04:58:06.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.239:22-180.101.88.197:23978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:06.786314 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 13 04:58:06.786381 kernel: audit: type=1131 audit(1707800286.750:1150): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.239:22-180.101.88.197:23978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:06.973997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1803945383.mount: Deactivated successfully. Feb 13 04:58:07.528898 kubelet[2589]: E0213 04:58:07.528844 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:09.529261 kubelet[2589]: E0213 04:58:09.529143 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:10.895000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:10.895000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003106c30 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:10.994513 kernel: audit: type=1400 audit(1707800290.895:1151): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:10.994571 kernel: audit: type=1300 audit(1707800290.895:1151): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003106c30 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:10.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:11.211270 kernel: audit: type=1327 audit(1707800290.895:1151): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:11.211308 kernel: audit: type=1400 audit(1707800290.895:1152): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:10.895000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.304623 kernel: audit: type=1300 audit(1707800290.895:1152): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f960 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:10.895000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f960 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:11.426561 kernel: audit: type=1327 audit(1707800290.895:1152): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:10.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:11.520690 kernel: audit: type=1400 audit(1707800291.197:1153): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.197000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.529021 kubelet[2589]: E0213 04:58:11.528981 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:11.611657 kernel: audit: type=1300 audit(1707800291.197:1153): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c010351ac0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.197000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c010351ac0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.710948 kernel: audit: type=1327 audit(1707800291.197:1153): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:11.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:11.805640 kernel: audit: type=1400 audit(1707800291.197:1154): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.197000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.898277 kernel: audit: type=1400 audit(1707800291.197:1155): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.197000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.991637 kernel: audit: type=1300 audit(1707800291.197:1154): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00f362240 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.197000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00f362240 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:12.091155 kernel: audit: type=1300 audit(1707800291.197:1155): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0114d1980 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.197000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0114d1980 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:12.192537 kernel: audit: type=1327 audit(1707800291.197:1154): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:11.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:12.382529 kernel: audit: type=1327 audit(1707800291.197:1155): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:12.382578 kernel: audit: type=1400 audit(1707800291.207:1156): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.207000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:12.475140 kernel: audit: type=1300 audit(1707800291.207:1156): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007a2d6e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.207000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007a2d6e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:12.575332 kernel: audit: type=1327 audit(1707800291.207:1156): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:11.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:12.669211 kernel: audit: type=1400 audit(1707800291.207:1157): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.207000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.207000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00a5c1080 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:11.207000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:11.207000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01158f2f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:58:11.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:58:13.528825 kubelet[2589]: E0213 04:58:13.528781 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:15.529091 kubelet[2589]: E0213 04:58:15.528995 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:17.529737 kubelet[2589]: E0213 04:58:17.529631 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:19.528162 kubelet[2589]: E0213 04:58:19.528146 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:19.847988 env[1479]: time="2024-02-13T04:58:19.847913026Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:19.848569 env[1479]: time="2024-02-13T04:58:19.848527069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:19.849501 env[1479]: time="2024-02-13T04:58:19.849435666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:19.850303 env[1479]: time="2024-02-13T04:58:19.850290486Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:19.851116 env[1479]: time="2024-02-13T04:58:19.851102282Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 13 04:58:19.862264 env[1479]: time="2024-02-13T04:58:19.862248369Z" level=info msg="CreateContainer within sandbox \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 13 04:58:19.867646 env[1479]: time="2024-02-13T04:58:19.867628663Z" level=info msg="CreateContainer within sandbox \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba\"" Feb 13 04:58:19.867847 env[1479]: time="2024-02-13T04:58:19.867832432Z" level=info msg="StartContainer for \"97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba\"" Feb 13 04:58:19.876780 systemd[1]: Started cri-containerd-97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba.scope. Feb 13 04:58:19.884446 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 04:58:19.884575 kernel: audit: type=1400 audit(1707800299.883:1159): avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f168340b2c8 items=0 ppid=3184 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:19.976492 kernel: audit: type=1300 audit(1707800299.883:1159): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f168340b2c8 items=0 ppid=3184 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:19.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937623066393262656533623535363430356464346239356239396539 Feb 13 04:58:20.165982 kernel: audit: type=1327 audit(1707800299.883:1159): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937623066393262656533623535363430356464346239356239396539 Feb 13 04:58:20.166026 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.229326 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.292715 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.356092 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.361303 env[1479]: time="2024-02-13T04:58:20.361278191Z" level=info msg="StartContainer for \"97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba\" returns successfully" Feb 13 04:58:20.419937 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.547942 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.547972 kernel: audit: type=1400 audit(1707800299.883:1160): avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.883000 audit: BPF prog-id=142 op=LOAD Feb 13 04:58:19.883000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f3c58 items=0 ppid=3184 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:19.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937623066393262656533623535363430356464346239356239396539 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:19.975000 audit: BPF prog-id=143 op=LOAD Feb 13 04:58:19.975000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f3ca8 items=0 ppid=3184 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:19.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937623066393262656533623535363430356464346239356239396539 Feb 13 04:58:20.165000 audit: BPF prog-id=143 op=UNLOAD Feb 13 04:58:20.165000 audit: BPF prog-id=142 op=UNLOAD Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:20.165000 audit: BPF prog-id=144 op=LOAD Feb 13 04:58:20.165000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f3d38 items=0 ppid=3184 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:20.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937623066393262656533623535363430356464346239356239396539 Feb 13 04:58:20.996833 env[1479]: time="2024-02-13T04:58:20.996754595Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 04:58:20.998142 systemd[1]: cri-containerd-97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba.scope: Deactivated successfully. Feb 13 04:58:21.007572 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba-rootfs.mount: Deactivated successfully. Feb 13 04:58:21.012000 audit: BPF prog-id=144 op=UNLOAD Feb 13 04:58:21.035791 kubelet[2589]: I0213 04:58:21.035701 2589 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 13 04:58:21.071535 kubelet[2589]: I0213 04:58:21.071472 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:58:21.072283 kubelet[2589]: I0213 04:58:21.072230 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:58:21.073011 kubelet[2589]: I0213 04:58:21.072970 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:58:21.086416 systemd[1]: Created slice kubepods-burstable-pod35689c7e_ec6f_4b92_8517_00414ddc12f4.slice. Feb 13 04:58:21.095047 systemd[1]: Created slice kubepods-burstable-pod39394708_2484_42e0_a8ca_54c653f419f6.slice. Feb 13 04:58:21.101007 systemd[1]: Created slice kubepods-besteffort-pod7c109c4b_9729_4b47_8ab3_bc6ca5fc5a0b.slice. Feb 13 04:58:21.174602 kubelet[2589]: I0213 04:58:21.174477 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/39394708-2484-42e0-a8ca-54c653f419f6-config-volume\") pod \"coredns-5d78c9869d-vbk6c\" (UID: \"39394708-2484-42e0-a8ca-54c653f419f6\") " pod="kube-system/coredns-5d78c9869d-vbk6c" Feb 13 04:58:21.174602 kubelet[2589]: I0213 04:58:21.174602 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b-tigera-ca-bundle\") pod \"calico-kube-controllers-5445dfb9f4-lpwfr\" (UID: \"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b\") " pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" Feb 13 04:58:21.175024 kubelet[2589]: I0213 04:58:21.174803 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b5z7t\" (UniqueName: \"kubernetes.io/projected/7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b-kube-api-access-b5z7t\") pod \"calico-kube-controllers-5445dfb9f4-lpwfr\" (UID: \"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b\") " pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" Feb 13 04:58:21.175024 kubelet[2589]: I0213 04:58:21.174964 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8qhcm\" (UniqueName: \"kubernetes.io/projected/35689c7e-ec6f-4b92-8517-00414ddc12f4-kube-api-access-8qhcm\") pod \"coredns-5d78c9869d-8kcl5\" (UID: \"35689c7e-ec6f-4b92-8517-00414ddc12f4\") " pod="kube-system/coredns-5d78c9869d-8kcl5" Feb 13 04:58:21.175266 kubelet[2589]: I0213 04:58:21.175089 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j944z\" (UniqueName: \"kubernetes.io/projected/39394708-2484-42e0-a8ca-54c653f419f6-kube-api-access-j944z\") pod \"coredns-5d78c9869d-vbk6c\" (UID: \"39394708-2484-42e0-a8ca-54c653f419f6\") " pod="kube-system/coredns-5d78c9869d-vbk6c" Feb 13 04:58:21.175266 kubelet[2589]: I0213 04:58:21.175163 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/35689c7e-ec6f-4b92-8517-00414ddc12f4-config-volume\") pod \"coredns-5d78c9869d-8kcl5\" (UID: \"35689c7e-ec6f-4b92-8517-00414ddc12f4\") " pod="kube-system/coredns-5d78c9869d-8kcl5" Feb 13 04:58:21.392742 env[1479]: time="2024-02-13T04:58:21.392524677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8kcl5,Uid:35689c7e-ec6f-4b92-8517-00414ddc12f4,Namespace:kube-system,Attempt:0,}" Feb 13 04:58:21.398783 env[1479]: time="2024-02-13T04:58:21.398672287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vbk6c,Uid:39394708-2484-42e0-a8ca-54c653f419f6,Namespace:kube-system,Attempt:0,}" Feb 13 04:58:21.404831 env[1479]: time="2024-02-13T04:58:21.404723795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5445dfb9f4-lpwfr,Uid:7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b,Namespace:calico-system,Attempt:0,}" Feb 13 04:58:21.480528 env[1479]: time="2024-02-13T04:58:21.480409784Z" level=info msg="shim disconnected" id=97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba Feb 13 04:58:21.480874 env[1479]: time="2024-02-13T04:58:21.480520684Z" level=warning msg="cleaning up after shim disconnected" id=97b0f92bee3b556405dd4b95b99e9391477b6618cb9a4b4b39e9e1e6b66bf0ba namespace=k8s.io Feb 13 04:58:21.480874 env[1479]: time="2024-02-13T04:58:21.480562567Z" level=info msg="cleaning up dead shim" Feb 13 04:58:21.499072 env[1479]: time="2024-02-13T04:58:21.498974247Z" level=warning msg="cleanup warnings time=\"2024-02-13T04:58:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3517 runtime=io.containerd.runc.v2\n" Feb 13 04:58:21.534482 systemd[1]: Created slice kubepods-besteffort-pod91f90690_897e_4df1_979a_b43047e67f6d.slice. Feb 13 04:58:21.536528 env[1479]: time="2024-02-13T04:58:21.536486216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2c97r,Uid:91f90690-897e-4df1-979a-b43047e67f6d,Namespace:calico-system,Attempt:0,}" Feb 13 04:58:21.552267 env[1479]: time="2024-02-13T04:58:21.552212719Z" level=error msg="Failed to destroy network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.552471 env[1479]: time="2024-02-13T04:58:21.552431646Z" level=error msg="encountered an error cleaning up failed sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.552529 env[1479]: time="2024-02-13T04:58:21.552470093Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5445dfb9f4-lpwfr,Uid:7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.552659 kubelet[2589]: E0213 04:58:21.552639 2589 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.552710 kubelet[2589]: E0213 04:58:21.552698 2589 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" Feb 13 04:58:21.552746 kubelet[2589]: E0213 04:58:21.552723 2589 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" Feb 13 04:58:21.552783 kubelet[2589]: E0213 04:58:21.552775 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5445dfb9f4-lpwfr_calico-system(7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5445dfb9f4-lpwfr_calico-system(7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" podUID=7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b Feb 13 04:58:21.553519 env[1479]: time="2024-02-13T04:58:21.553492524Z" level=error msg="Failed to destroy network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553634 env[1479]: time="2024-02-13T04:58:21.553613731Z" level=error msg="Failed to destroy network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553728 env[1479]: time="2024-02-13T04:58:21.553709807Z" level=error msg="encountered an error cleaning up failed sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553777 env[1479]: time="2024-02-13T04:58:21.553747082Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vbk6c,Uid:39394708-2484-42e0-a8ca-54c653f419f6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553815 env[1479]: time="2024-02-13T04:58:21.553777659Z" level=error msg="encountered an error cleaning up failed sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553815 env[1479]: time="2024-02-13T04:58:21.553803958Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8kcl5,Uid:35689c7e-ec6f-4b92-8517-00414ddc12f4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553904 kubelet[2589]: E0213 04:58:21.553895 2589 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.553935 kubelet[2589]: E0213 04:58:21.553926 2589 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8kcl5" Feb 13 04:58:21.553960 kubelet[2589]: E0213 04:58:21.553941 2589 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8kcl5" Feb 13 04:58:21.553984 kubelet[2589]: E0213 04:58:21.553895 2589 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.554007 kubelet[2589]: E0213 04:58:21.553992 2589 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-vbk6c" Feb 13 04:58:21.554007 kubelet[2589]: E0213 04:58:21.554005 2589 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-vbk6c" Feb 13 04:58:21.554053 kubelet[2589]: E0213 04:58:21.554027 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-vbk6c_kube-system(39394708-2484-42e0-a8ca-54c653f419f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-vbk6c_kube-system(39394708-2484-42e0-a8ca-54c653f419f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-vbk6c" podUID=39394708-2484-42e0-a8ca-54c653f419f6 Feb 13 04:58:21.554053 kubelet[2589]: E0213 04:58:21.553969 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-8kcl5_kube-system(35689c7e-ec6f-4b92-8517-00414ddc12f4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-8kcl5_kube-system(35689c7e-ec6f-4b92-8517-00414ddc12f4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8kcl5" podUID=35689c7e-ec6f-4b92-8517-00414ddc12f4 Feb 13 04:58:21.568273 env[1479]: time="2024-02-13T04:58:21.568236646Z" level=error msg="Failed to destroy network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.568461 env[1479]: time="2024-02-13T04:58:21.568444621Z" level=error msg="encountered an error cleaning up failed sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.568517 env[1479]: time="2024-02-13T04:58:21.568476782Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2c97r,Uid:91f90690-897e-4df1-979a-b43047e67f6d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.568676 kubelet[2589]: E0213 04:58:21.568642 2589 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.568676 kubelet[2589]: E0213 04:58:21.568672 2589 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2c97r" Feb 13 04:58:21.568741 kubelet[2589]: E0213 04:58:21.568685 2589 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2c97r" Feb 13 04:58:21.568741 kubelet[2589]: E0213 04:58:21.568717 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2c97r_calico-system(91f90690-897e-4df1-979a-b43047e67f6d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2c97r_calico-system(91f90690-897e-4df1-979a-b43047e67f6d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:21.721795 kubelet[2589]: I0213 04:58:21.721737 2589 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:21.722155 env[1479]: time="2024-02-13T04:58:21.722049896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 13 04:58:21.723094 env[1479]: time="2024-02-13T04:58:21.723027029Z" level=info msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" Feb 13 04:58:21.724002 kubelet[2589]: I0213 04:58:21.723960 2589 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:21.725088 env[1479]: time="2024-02-13T04:58:21.725022761Z" level=info msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" Feb 13 04:58:21.726207 kubelet[2589]: I0213 04:58:21.726152 2589 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:21.727275 env[1479]: time="2024-02-13T04:58:21.727196903Z" level=info msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" Feb 13 04:58:21.728117 kubelet[2589]: I0213 04:58:21.728068 2589 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:21.729161 env[1479]: time="2024-02-13T04:58:21.729082460Z" level=info msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" Feb 13 04:58:21.769625 env[1479]: time="2024-02-13T04:58:21.769547964Z" level=error msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" failed" error="failed to destroy network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.769870 kubelet[2589]: E0213 04:58:21.769841 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:21.769984 kubelet[2589]: E0213 04:58:21.769912 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661} Feb 13 04:58:21.769984 kubelet[2589]: E0213 04:58:21.769959 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91f90690-897e-4df1-979a-b43047e67f6d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:21.770104 kubelet[2589]: E0213 04:58:21.769991 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91f90690-897e-4df1-979a-b43047e67f6d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:21.771001 env[1479]: time="2024-02-13T04:58:21.770945671Z" level=error msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" failed" error="failed to destroy network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.771101 kubelet[2589]: E0213 04:58:21.771088 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:21.771152 kubelet[2589]: E0213 04:58:21.771114 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa} Feb 13 04:58:21.771152 kubelet[2589]: E0213 04:58:21.771147 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"35689c7e-ec6f-4b92-8517-00414ddc12f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:21.771264 kubelet[2589]: E0213 04:58:21.771174 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"35689c7e-ec6f-4b92-8517-00414ddc12f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8kcl5" podUID=35689c7e-ec6f-4b92-8517-00414ddc12f4 Feb 13 04:58:21.771346 env[1479]: time="2024-02-13T04:58:21.771280543Z" level=error msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" failed" error="failed to destroy network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.771420 kubelet[2589]: E0213 04:58:21.771412 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:21.771481 kubelet[2589]: E0213 04:58:21.771427 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570} Feb 13 04:58:21.771481 kubelet[2589]: E0213 04:58:21.771466 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:21.771577 kubelet[2589]: E0213 04:58:21.771492 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" podUID=7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b Feb 13 04:58:21.772977 env[1479]: time="2024-02-13T04:58:21.772949092Z" level=error msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" failed" error="failed to destroy network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:21.773135 kubelet[2589]: E0213 04:58:21.773089 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:21.773135 kubelet[2589]: E0213 04:58:21.773111 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1} Feb 13 04:58:21.773215 kubelet[2589]: E0213 04:58:21.773139 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"39394708-2484-42e0-a8ca-54c653f419f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:21.773215 kubelet[2589]: E0213 04:58:21.773161 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"39394708-2484-42e0-a8ca-54c653f419f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-vbk6c" podUID=39394708-2484-42e0-a8ca-54c653f419f6 Feb 13 04:58:22.013547 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570-shm.mount: Deactivated successfully. Feb 13 04:58:22.013897 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa-shm.mount: Deactivated successfully. Feb 13 04:58:22.014209 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1-shm.mount: Deactivated successfully. Feb 13 04:58:24.363000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:24.363000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001016cc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:24.363000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:24.364000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:24.364000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c025c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:24.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:24.368000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:24.368000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001474920 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:24.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:24.370000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:58:24.370000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001016de0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:58:24.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:58:33.533010 env[1479]: time="2024-02-13T04:58:33.532845668Z" level=info msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" Feb 13 04:58:33.586006 env[1479]: time="2024-02-13T04:58:33.585914965Z" level=error msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" failed" error="failed to destroy network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:33.586219 kubelet[2589]: E0213 04:58:33.586167 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:33.586219 kubelet[2589]: E0213 04:58:33.586209 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa} Feb 13 04:58:33.586640 kubelet[2589]: E0213 04:58:33.586253 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"35689c7e-ec6f-4b92-8517-00414ddc12f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:33.586640 kubelet[2589]: E0213 04:58:33.586288 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"35689c7e-ec6f-4b92-8517-00414ddc12f4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8kcl5" podUID=35689c7e-ec6f-4b92-8517-00414ddc12f4 Feb 13 04:58:36.528764 env[1479]: time="2024-02-13T04:58:36.528707651Z" level=info msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" Feb 13 04:58:36.528971 env[1479]: time="2024-02-13T04:58:36.528707752Z" level=info msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" Feb 13 04:58:36.528971 env[1479]: time="2024-02-13T04:58:36.528707660Z" level=info msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" Feb 13 04:58:36.541395 env[1479]: time="2024-02-13T04:58:36.541359445Z" level=error msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" failed" error="failed to destroy network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:36.541587 kubelet[2589]: E0213 04:58:36.541553 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:36.541794 kubelet[2589]: E0213 04:58:36.541598 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661} Feb 13 04:58:36.541794 kubelet[2589]: E0213 04:58:36.541621 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91f90690-897e-4df1-979a-b43047e67f6d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:36.541794 kubelet[2589]: E0213 04:58:36.541639 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91f90690-897e-4df1-979a-b43047e67f6d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2c97r" podUID=91f90690-897e-4df1-979a-b43047e67f6d Feb 13 04:58:36.541794 kubelet[2589]: E0213 04:58:36.541784 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:36.541930 env[1479]: time="2024-02-13T04:58:36.541678151Z" level=error msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" failed" error="failed to destroy network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:36.541955 kubelet[2589]: E0213 04:58:36.541799 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570} Feb 13 04:58:36.541955 kubelet[2589]: E0213 04:58:36.541832 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:36.541955 kubelet[2589]: E0213 04:58:36.541847 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" podUID=7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b Feb 13 04:58:36.542104 env[1479]: time="2024-02-13T04:58:36.542087386Z" level=error msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" failed" error="failed to destroy network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 04:58:36.542159 kubelet[2589]: E0213 04:58:36.542154 2589 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:36.542185 kubelet[2589]: E0213 04:58:36.542164 2589 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1} Feb 13 04:58:36.542185 kubelet[2589]: E0213 04:58:36.542181 2589 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"39394708-2484-42e0-a8ca-54c653f419f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 04:58:36.542236 kubelet[2589]: E0213 04:58:36.542194 2589 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"39394708-2484-42e0-a8ca-54c653f419f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-vbk6c" podUID=39394708-2484-42e0-a8ca-54c653f419f6 Feb 13 04:58:38.585029 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1181800995.mount: Deactivated successfully. Feb 13 04:58:38.615690 env[1479]: time="2024-02-13T04:58:38.615654726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:38.616493 env[1479]: time="2024-02-13T04:58:38.616420062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:38.617539 env[1479]: time="2024-02-13T04:58:38.617477348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:38.618964 env[1479]: time="2024-02-13T04:58:38.618913726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:38.619317 env[1479]: time="2024-02-13T04:58:38.619267188Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 13 04:58:38.624795 env[1479]: time="2024-02-13T04:58:38.624743971Z" level=info msg="CreateContainer within sandbox \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 13 04:58:38.630640 env[1479]: time="2024-02-13T04:58:38.630594103Z" level=info msg="CreateContainer within sandbox \"6887a81a5e7150cae2cb3783f265370bf9deff17831e41b03aa34528cba15406\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"be0595ffa259a9cbcab83adae38863e8cbf055b0a9b21b230b693c66f4cc7ddd\"" Feb 13 04:58:38.630939 env[1479]: time="2024-02-13T04:58:38.630908284Z" level=info msg="StartContainer for \"be0595ffa259a9cbcab83adae38863e8cbf055b0a9b21b230b693c66f4cc7ddd\"" Feb 13 04:58:38.639275 systemd[1]: Started cri-containerd-be0595ffa259a9cbcab83adae38863e8cbf055b0a9b21b230b693c66f4cc7ddd.scope. Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.674329 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 13 04:58:38.674372 kernel: audit: type=1400 audit(1707800318.646:1170): avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7feae3bddcc8 items=0 ppid=3184 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:38.834880 kernel: audit: type=1300 audit(1707800318.646:1170): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7feae3bddcc8 items=0 ppid=3184 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:38.834943 kernel: audit: type=1327 audit(1707800318.646:1170): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303539356666613235396139636263616238336164616533383836 Feb 13 04:58:38.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303539356666613235396139636263616238336164616533383836 Feb 13 04:58:38.931922 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.991308 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:39.054787 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:39.118386 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:39.124143 env[1479]: time="2024-02-13T04:58:39.124111934Z" level=info msg="StartContainer for \"be0595ffa259a9cbcab83adae38863e8cbf055b0a9b21b230b693c66f4cc7ddd\" returns successfully" Feb 13 04:58:39.146774 systemd[1]: Started sshd@10-139.178.90.239:22-2.57.122.87:39058.service. Feb 13 04:58:39.182277 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:39.246172 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:39.310173 kernel: audit: type=1400 audit(1707800318.646:1171): avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.646000 audit: BPF prog-id=145 op=LOAD Feb 13 04:58:38.646000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027bc58 items=0 ppid=3184 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:38.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303539356666613235396139636263616238336164616533383836 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.736000 audit: BPF prog-id=146 op=LOAD Feb 13 04:58:38.736000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027bca8 items=0 ppid=3184 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:38.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303539356666613235396139636263616238336164616533383836 Feb 13 04:58:38.926000 audit: BPF prog-id=146 op=UNLOAD Feb 13 04:58:38.926000 audit: BPF prog-id=145 op=UNLOAD Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:38.926000 audit: BPF prog-id=147 op=LOAD Feb 13 04:58:38.926000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027bd38 items=0 ppid=3184 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:38.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303539356666613235396139636263616238336164616533383836 Feb 13 04:58:39.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.239:22-2.57.122.87:39058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:39.457957 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 13 04:58:39.458002 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 13 04:58:39.822715 kubelet[2589]: I0213 04:58:39.822534 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-rjvch" podStartSLOduration=2.701814678 podCreationTimestamp="2024-02-13 04:57:33 +0000 UTC" firstStartedPulling="2024-02-13 04:57:34.498889436 +0000 UTC m=+19.024497658" lastFinishedPulling="2024-02-13 04:58:38.619495534 +0000 UTC m=+83.145103767" observedRunningTime="2024-02-13 04:58:39.820189412 +0000 UTC m=+84.345797713" watchObservedRunningTime="2024-02-13 04:58:39.822420787 +0000 UTC m=+84.348029058" Feb 13 04:58:39.867240 sshd[4004]: Invalid user hlwang from 2.57.122.87 port 39058 Feb 13 04:58:40.059590 sshd[4004]: pam_faillock(sshd:auth): User unknown Feb 13 04:58:40.060505 sshd[4004]: pam_unix(sshd:auth): check pass; user unknown Feb 13 04:58:40.060587 sshd[4004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 04:58:40.061405 sshd[4004]: pam_faillock(sshd:auth): User unknown Feb 13 04:58:40.060000 audit[4004]: USER_AUTH pid=4004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 04:58:40.596000 audit[4115]: AVC avc: denied { write } for pid=4115 comm="tee" name="fd" dev="proc" ino=44074 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit[4115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd55240971 a2=241 a3=1b6 items=1 ppid=4085 pid=4115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=41215 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.596000 audit[4125]: AVC avc: denied { write } for pid=4125 comm="tee" name="fd" dev="proc" ino=45085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit[4125]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe749f8971 a2=241 a3=1b6 items=1 ppid=4086 pid=4125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 13 04:58:40.596000 audit[4122]: AVC avc: denied { write } for pid=4122 comm="tee" name="fd" dev="proc" ino=42257 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=45082 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.596000 audit[4122]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed1ac0972 a2=241 a3=1b6 items=1 ppid=4089 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=38321 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.596000 audit[4127]: AVC avc: denied { write } for pid=4127 comm="tee" name="fd" dev="proc" ino=46089 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit[4127]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa419c962 a2=241 a3=1b6 items=1 ppid=4087 pid=4127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=46086 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.596000 audit[4124]: AVC avc: denied { write } for pid=4124 comm="tee" name="fd" dev="proc" ino=41219 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit[4124]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfbb18961 a2=241 a3=1b6 items=1 ppid=4082 pid=4124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=32408 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.596000 audit[4130]: AVC avc: denied { write } for pid=4130 comm="tee" name="fd" dev="proc" ino=36661 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit[4130]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeef736971 a2=241 a3=1b6 items=1 ppid=4084 pid=4130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=41216 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.596000 audit[4117]: AVC avc: denied { write } for pid=4117 comm="tee" name="fd" dev="proc" ino=34811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 04:58:40.596000 audit[4117]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1e373973 a2=241 a3=1b6 items=1 ppid=4088 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.596000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 13 04:58:40.596000 audit: PATH item=0 name="/dev/fd/63" inode=35551 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 04:58:40.596000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit: BPF prog-id=148 op=LOAD Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca2316f90 a2=70 a3=7faf5aa7c000 items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit: BPF prog-id=148 op=UNLOAD Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit: BPF prog-id=149 op=LOAD Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca2316f90 a2=70 a3=6e items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit: BPF prog-id=149 op=UNLOAD Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca2316f40 a2=70 a3=7ffca2316f90 items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit: BPF prog-id=150 op=LOAD Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffca2316f20 a2=70 a3=7ffca2316f90 items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit: BPF prog-id=150 op=UNLOAD Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2317000 a2=70 a3=0 items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca2316ff0 a2=70 a3=0 items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffca2317030 a2=70 a3=0 items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { perfmon } for pid=4264 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit[4264]: AVC avc: denied { bpf } for pid=4264 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.688000 audit: BPF prog-id=151 op=LOAD Feb 13 04:58:40.688000 audit[4264]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffca2316f50 a2=70 a3=ffffffff items=0 ppid=4091 pid=4264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.688000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 04:58:40.690000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.690000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8ab96d80 a2=70 a3=fff80800 items=0 ppid=4091 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 04:58:40.690000 audit[4268]: AVC avc: denied { bpf } for pid=4268 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:40.690000 audit[4268]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff8ab96c50 a2=70 a3=3 items=0 ppid=4091 pid=4268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 04:58:40.707000 audit: BPF prog-id=151 op=UNLOAD Feb 13 04:58:40.730000 audit[4323]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:40.730000 audit[4323]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffce3ecd9b0 a2=0 a3=7ffce3ecd99c items=0 ppid=4091 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.730000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:40.732000 audit[4322]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=4322 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:40.732000 audit[4322]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe8b2d1450 a2=0 a3=560361835000 items=0 ppid=4091 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:40.732000 audit[4324]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=4324 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:40.732000 audit[4324]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc62361f00 a2=0 a3=563a7ee54000 items=0 ppid=4091 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.732000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:40.734000 audit[4327]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4327 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:40.734000 audit[4327]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffede5a9830 a2=0 a3=55d4c4c48000 items=0 ppid=4091 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:40.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:41.680792 systemd-networkd[1317]: vxlan.calico: Link UP Feb 13 04:58:41.680804 systemd-networkd[1317]: vxlan.calico: Gained carrier Feb 13 04:58:42.133840 sshd[4004]: Failed password for invalid user hlwang from 2.57.122.87 port 39058 ssh2 Feb 13 04:58:43.616679 sshd[4004]: Connection closed by invalid user hlwang 2.57.122.87 port 39058 [preauth] Feb 13 04:58:43.619237 systemd[1]: sshd@10-139.178.90.239:22-2.57.122.87:39058.service: Deactivated successfully. Feb 13 04:58:43.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.239:22-2.57.122.87:39058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 04:58:43.633774 systemd-networkd[1317]: vxlan.calico: Gained IPv6LL Feb 13 04:58:46.530357 env[1479]: time="2024-02-13T04:58:46.530252046Z" level=info msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.567 [INFO][4389] k8s.go 578: Cleaning up netns ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.567 [INFO][4389] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" iface="eth0" netns="/var/run/netns/cni-271e914e-e28c-b48a-ad6b-284bab216f64" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.567 [INFO][4389] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" iface="eth0" netns="/var/run/netns/cni-271e914e-e28c-b48a-ad6b-284bab216f64" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.567 [INFO][4389] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" iface="eth0" netns="/var/run/netns/cni-271e914e-e28c-b48a-ad6b-284bab216f64" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.567 [INFO][4389] k8s.go 585: Releasing IP address(es) ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.567 [INFO][4389] utils.go 188: Calico CNI releasing IP address ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.577 [INFO][4405] ipam_plugin.go 415: Releasing address using handleID ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.577 [INFO][4405] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.577 [INFO][4405] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.581 [WARNING][4405] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.581 [INFO][4405] ipam_plugin.go 443: Releasing address using workloadID ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.582 [INFO][4405] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:46.584025 env[1479]: 2024-02-13 04:58:46.583 [INFO][4389] k8s.go 591: Teardown processing complete. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:58:46.584388 env[1479]: time="2024-02-13T04:58:46.584108909Z" level=info msg="TearDown network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" successfully" Feb 13 04:58:46.584388 env[1479]: time="2024-02-13T04:58:46.584133831Z" level=info msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" returns successfully" Feb 13 04:58:46.584616 env[1479]: time="2024-02-13T04:58:46.584563876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8kcl5,Uid:35689c7e-ec6f-4b92-8517-00414ddc12f4,Namespace:kube-system,Attempt:1,}" Feb 13 04:58:46.586034 systemd[1]: run-netns-cni\x2d271e914e\x2de28c\x2db48a\x2dad6b\x2d284bab216f64.mount: Deactivated successfully. Feb 13 04:58:46.649987 systemd-networkd[1317]: cali4ffd08045b1: Link UP Feb 13 04:58:46.706366 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 04:58:46.706417 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4ffd08045b1: link becomes ready Feb 13 04:58:46.706421 systemd-networkd[1317]: cali4ffd08045b1: Gained carrier Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.607 [INFO][4417] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0 coredns-5d78c9869d- kube-system 35689c7e-ec6f-4b92-8517-00414ddc12f4 769 0 2024-02-13 04:57:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-01dc72b3af coredns-5d78c9869d-8kcl5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4ffd08045b1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.607 [INFO][4417] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.623 [INFO][4440] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" HandleID="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.630 [INFO][4440] ipam_plugin.go 268: Auto assigning IP ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" HandleID="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b5840), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-01dc72b3af", "pod":"coredns-5d78c9869d-8kcl5", "timestamp":"2024-02-13 04:58:46.623617227 +0000 UTC"}, Hostname:"ci-3510.3.2-a-01dc72b3af", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.630 [INFO][4440] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.630 [INFO][4440] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.630 [INFO][4440] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-01dc72b3af' Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.631 [INFO][4440] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.635 [INFO][4440] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.638 [INFO][4440] ipam.go 489: Trying affinity for 192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.639 [INFO][4440] ipam.go 155: Attempting to load block cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.641 [INFO][4440] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.641 [INFO][4440] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.128/26 handle="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.642 [INFO][4440] ipam.go 1682: Creating new handle: k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.644 [INFO][4440] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.128/26 handle="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.647 [INFO][4440] ipam.go 1216: Successfully claimed IPs: [192.168.126.129/26] block=192.168.126.128/26 handle="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.647 [INFO][4440] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.129/26] handle="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.647 [INFO][4440] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:46.712646 env[1479]: 2024-02-13 04:58:46.647 [INFO][4440] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.129/26] IPv6=[] ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" HandleID="k8s-pod-network.2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.713124 env[1479]: 2024-02-13 04:58:46.649 [INFO][4417] k8s.go 385: Populated endpoint ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"35689c7e-ec6f-4b92-8517-00414ddc12f4", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"", Pod:"coredns-5d78c9869d-8kcl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ffd08045b1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:46.713124 env[1479]: 2024-02-13 04:58:46.649 [INFO][4417] k8s.go 386: Calico CNI using IPs: [192.168.126.129/32] ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.713124 env[1479]: 2024-02-13 04:58:46.649 [INFO][4417] dataplane_linux.go 68: Setting the host side veth name to cali4ffd08045b1 ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.713124 env[1479]: 2024-02-13 04:58:46.706 [INFO][4417] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.713124 env[1479]: 2024-02-13 04:58:46.706 [INFO][4417] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"35689c7e-ec6f-4b92-8517-00414ddc12f4", ResourceVersion:"769", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e", Pod:"coredns-5d78c9869d-8kcl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ffd08045b1", MAC:"82:07:03:b4:f8:28", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:46.713124 env[1479]: 2024-02-13 04:58:46.711 [INFO][4417] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e" Namespace="kube-system" Pod="coredns-5d78c9869d-8kcl5" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:58:46.718192 env[1479]: time="2024-02-13T04:58:46.718127148Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:58:46.718192 env[1479]: time="2024-02-13T04:58:46.718155864Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:58:46.718192 env[1479]: time="2024-02-13T04:58:46.718162697Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:58:46.718313 env[1479]: time="2024-02-13T04:58:46.718239037Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e pid=4483 runtime=io.containerd.runc.v2 Feb 13 04:58:46.719000 audit[4495]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:46.726387 systemd[1]: Started cri-containerd-2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e.scope. Feb 13 04:58:46.746695 kernel: kauditd_printk_skb: 154 callbacks suppressed Feb 13 04:58:46.746734 kernel: audit: type=1325 audit(1707800326.719:1204): table=filter:101 family=2 entries=36 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:46.719000 audit[4495]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcff7ec9c0 a2=0 a3=7ffcff7ec9ac items=0 ppid=4091 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:46.805498 kernel: audit: type=1300 audit(1707800326.719:1204): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffcff7ec9c0 a2=0 a3=7ffcff7ec9ac items=0 ppid=4091 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:46.719000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:46.901477 kernel: audit: type=1327 audit(1707800326.719:1204): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.025248 kernel: audit: type=1400 audit(1707800326.812:1205): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.025283 kernel: audit: type=1400 audit(1707800326.812:1206): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087975 kernel: audit: type=1400 audit(1707800326.812:1207): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.150699 kernel: audit: type=1400 audit(1707800326.812:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.276799 kernel: audit: type=1400 audit(1707800326.812:1209): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.276828 kernel: audit: type=1400 audit(1707800326.812:1210): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.339779 kernel: audit: type=1400 audit(1707800326.812:1211): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit: BPF prog-id=152 op=LOAD Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4483 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:46.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623133393565303338626237636235396233653863313963666334 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4483 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:46.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623133393565303338626237636235396233653863313963666334 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:46.962000 audit: BPF prog-id=153 op=LOAD Feb 13 04:58:46.962000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d7ae0 items=0 ppid=4483 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:46.962000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623133393565303338626237636235396233653863313963666334 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.087000 audit: BPF prog-id=154 op=LOAD Feb 13 04:58:47.087000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d7b28 items=0 ppid=4483 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623133393565303338626237636235396233653863313963666334 Feb 13 04:58:47.213000 audit: BPF prog-id=154 op=UNLOAD Feb 13 04:58:47.213000 audit: BPF prog-id=153 op=UNLOAD Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { perfmon } for pid=4494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit[4494]: AVC avc: denied { bpf } for pid=4494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.213000 audit: BPF prog-id=155 op=LOAD Feb 13 04:58:47.213000 audit[4494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d7f38 items=0 ppid=4483 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261623133393565303338626237636235396233653863313963666334 Feb 13 04:58:47.418657 env[1479]: time="2024-02-13T04:58:47.418632078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8kcl5,Uid:35689c7e-ec6f-4b92-8517-00414ddc12f4,Namespace:kube-system,Attempt:1,} returns sandbox id \"2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e\"" Feb 13 04:58:47.419897 env[1479]: time="2024-02-13T04:58:47.419853350Z" level=info msg="CreateContainer within sandbox \"2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 04:58:47.424063 env[1479]: time="2024-02-13T04:58:47.424046654Z" level=info msg="CreateContainer within sandbox \"2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"24009113569714a8e64a4323a5a6e23ea9de4658c0dac4590fde22e4dd1ec1b1\"" Feb 13 04:58:47.424195 env[1479]: time="2024-02-13T04:58:47.424184768Z" level=info msg="StartContainer for \"24009113569714a8e64a4323a5a6e23ea9de4658c0dac4590fde22e4dd1ec1b1\"" Feb 13 04:58:47.431373 systemd[1]: Started cri-containerd-24009113569714a8e64a4323a5a6e23ea9de4658c0dac4590fde22e4dd1ec1b1.scope. Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit: BPF prog-id=156 op=LOAD Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4483 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303039313133353639373134613865363461343332336135613665 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4483 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303039313133353639373134613865363461343332336135613665 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit: BPF prog-id=157 op=LOAD Feb 13 04:58:47.437000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00026bde0 items=0 ppid=4483 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303039313133353639373134613865363461343332336135613665 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit: BPF prog-id=158 op=LOAD Feb 13 04:58:47.437000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00026be28 items=0 ppid=4483 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303039313133353639373134613865363461343332336135613665 Feb 13 04:58:47.437000 audit: BPF prog-id=158 op=UNLOAD Feb 13 04:58:47.437000 audit: BPF prog-id=157 op=UNLOAD Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { perfmon } for pid=4524 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit[4524]: AVC avc: denied { bpf } for pid=4524 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.437000 audit: BPF prog-id=159 op=LOAD Feb 13 04:58:47.437000 audit[4524]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c2238 items=0 ppid=4483 pid=4524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234303039313133353639373134613865363461343332336135613665 Feb 13 04:58:47.443203 env[1479]: time="2024-02-13T04:58:47.443151050Z" level=info msg="StartContainer for \"24009113569714a8e64a4323a5a6e23ea9de4658c0dac4590fde22e4dd1ec1b1\" returns successfully" Feb 13 04:58:47.530332 env[1479]: time="2024-02-13T04:58:47.530210696Z" level=info msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.609 [INFO][4579] k8s.go 578: Cleaning up netns ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.609 [INFO][4579] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" iface="eth0" netns="/var/run/netns/cni-f78171de-320f-c84b-bedc-0762b426c097" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.609 [INFO][4579] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" iface="eth0" netns="/var/run/netns/cni-f78171de-320f-c84b-bedc-0762b426c097" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.609 [INFO][4579] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" iface="eth0" netns="/var/run/netns/cni-f78171de-320f-c84b-bedc-0762b426c097" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.609 [INFO][4579] k8s.go 585: Releasing IP address(es) ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.610 [INFO][4579] utils.go 188: Calico CNI releasing IP address ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.625 [INFO][4599] ipam_plugin.go 415: Releasing address using handleID ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.625 [INFO][4599] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.625 [INFO][4599] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.632 [WARNING][4599] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.632 [INFO][4599] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.633 [INFO][4599] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:47.635621 env[1479]: 2024-02-13 04:58:47.634 [INFO][4579] k8s.go 591: Teardown processing complete. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:58:47.636630 env[1479]: time="2024-02-13T04:58:47.635697673Z" level=info msg="TearDown network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" successfully" Feb 13 04:58:47.636630 env[1479]: time="2024-02-13T04:58:47.635738001Z" level=info msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" returns successfully" Feb 13 04:58:47.636630 env[1479]: time="2024-02-13T04:58:47.636347527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5445dfb9f4-lpwfr,Uid:7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b,Namespace:calico-system,Attempt:1,}" Feb 13 04:58:47.638250 systemd[1]: run-netns-cni\x2df78171de\x2d320f\x2dc84b\x2dbedc\x2d0762b426c097.mount: Deactivated successfully. Feb 13 04:58:47.726364 systemd-networkd[1317]: cali6a22e4e2fcf: Link UP Feb 13 04:58:47.781908 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 04:58:47.781944 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6a22e4e2fcf: link becomes ready Feb 13 04:58:47.782066 systemd-networkd[1317]: cali6a22e4e2fcf: Gained carrier Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.668 [INFO][4612] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0 calico-kube-controllers-5445dfb9f4- calico-system 7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b 780 0 2024-02-13 04:57:33 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5445dfb9f4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-01dc72b3af calico-kube-controllers-5445dfb9f4-lpwfr eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6a22e4e2fcf [] []}} ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.669 [INFO][4612] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.691 [INFO][4635] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" HandleID="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.701 [INFO][4635] ipam_plugin.go 268: Auto assigning IP ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" HandleID="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0006537a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-01dc72b3af", "pod":"calico-kube-controllers-5445dfb9f4-lpwfr", "timestamp":"2024-02-13 04:58:47.691701184 +0000 UTC"}, Hostname:"ci-3510.3.2-a-01dc72b3af", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.701 [INFO][4635] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.701 [INFO][4635] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.701 [INFO][4635] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-01dc72b3af' Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.703 [INFO][4635] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.706 [INFO][4635] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.710 [INFO][4635] ipam.go 489: Trying affinity for 192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.712 [INFO][4635] ipam.go 155: Attempting to load block cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.714 [INFO][4635] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.714 [INFO][4635] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.128/26 handle="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.716 [INFO][4635] ipam.go 1682: Creating new handle: k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262 Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.719 [INFO][4635] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.128/26 handle="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.723 [INFO][4635] ipam.go 1216: Successfully claimed IPs: [192.168.126.130/26] block=192.168.126.128/26 handle="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.723 [INFO][4635] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.130/26] handle="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.723 [INFO][4635] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:47.787898 env[1479]: 2024-02-13 04:58:47.723 [INFO][4635] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.130/26] IPv6=[] ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" HandleID="k8s-pod-network.c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.788436 env[1479]: 2024-02-13 04:58:47.725 [INFO][4612] k8s.go 385: Populated endpoint ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0", GenerateName:"calico-kube-controllers-5445dfb9f4-", Namespace:"calico-system", SelfLink:"", UID:"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5445dfb9f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"", Pod:"calico-kube-controllers-5445dfb9f4-lpwfr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.126.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6a22e4e2fcf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:47.788436 env[1479]: 2024-02-13 04:58:47.725 [INFO][4612] k8s.go 386: Calico CNI using IPs: [192.168.126.130/32] ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.788436 env[1479]: 2024-02-13 04:58:47.725 [INFO][4612] dataplane_linux.go 68: Setting the host side veth name to cali6a22e4e2fcf ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.788436 env[1479]: 2024-02-13 04:58:47.782 [INFO][4612] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.788436 env[1479]: 2024-02-13 04:58:47.782 [INFO][4612] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0", GenerateName:"calico-kube-controllers-5445dfb9f4-", Namespace:"calico-system", SelfLink:"", UID:"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5445dfb9f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262", Pod:"calico-kube-controllers-5445dfb9f4-lpwfr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.126.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6a22e4e2fcf", MAC:"3e:6c:4a:06:8e:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:47.788436 env[1479]: 2024-02-13 04:58:47.787 [INFO][4612] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262" Namespace="calico-system" Pod="calico-kube-controllers-5445dfb9f4-lpwfr" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:58:47.793578 env[1479]: time="2024-02-13T04:58:47.793512389Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:58:47.793578 env[1479]: time="2024-02-13T04:58:47.793533705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:58:47.793578 env[1479]: time="2024-02-13T04:58:47.793540627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:58:47.793708 env[1479]: time="2024-02-13T04:58:47.793608786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262 pid=4674 runtime=io.containerd.runc.v2 Feb 13 04:58:47.794000 audit[4684]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=4684 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:47.794000 audit[4684]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffcf20f1600 a2=0 a3=7ffcf20f15ec items=0 ppid=4091 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:47.799093 systemd[1]: Started cri-containerd-c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262.scope. Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.804000 audit: BPF prog-id=160 op=LOAD Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4674 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334613736613661343663363063623262613431663036306532613863 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4674 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334613736613661343663363063623262613431663036306532613863 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit: BPF prog-id=161 op=LOAD Feb 13 04:58:47.805000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000271d90 items=0 ppid=4674 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334613736613661343663363063623262613431663036306532613863 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit: BPF prog-id=162 op=LOAD Feb 13 04:58:47.805000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000271dd8 items=0 ppid=4674 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334613736613661343663363063623262613431663036306532613863 Feb 13 04:58:47.805000 audit: BPF prog-id=162 op=UNLOAD Feb 13 04:58:47.805000 audit: BPF prog-id=161 op=UNLOAD Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { perfmon } for pid=4686 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit[4686]: AVC avc: denied { bpf } for pid=4686 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:47.805000 audit: BPF prog-id=163 op=LOAD Feb 13 04:58:47.805000 audit[4686]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003e61e8 items=0 ppid=4674 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334613736613661343663363063623262613431663036306532613863 Feb 13 04:58:47.817699 kubelet[2589]: I0213 04:58:47.817681 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-8kcl5" podStartSLOduration=79.817650907 podCreationTimestamp="2024-02-13 04:57:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 04:58:47.81737361 +0000 UTC m=+92.342981839" watchObservedRunningTime="2024-02-13 04:58:47.817650907 +0000 UTC m=+92.343259130" Feb 13 04:58:47.822215 env[1479]: time="2024-02-13T04:58:47.822190557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5445dfb9f4-lpwfr,Uid:7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b,Namespace:calico-system,Attempt:1,} returns sandbox id \"c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262\"" Feb 13 04:58:47.822976 env[1479]: time="2024-02-13T04:58:47.822957002Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 13 04:58:47.823000 audit[4710]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:47.823000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff6e915ee0 a2=0 a3=7fff6e915ecc items=0 ppid=2861 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:47.823000 audit[4710]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:47.823000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff6e915ee0 a2=0 a3=31030 items=0 ppid=2861 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:47.845000 audit[4712]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=4712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:47.845000 audit[4712]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fffa79bf410 a2=0 a3=7fffa79bf3fc items=0 ppid=2861 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:47.854000 audit[4712]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:47.854000 audit[4712]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fffa79bf410 a2=0 a3=7fffa79bf3fc items=0 ppid=2861 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:47.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:48.305746 systemd-networkd[1317]: cali4ffd08045b1: Gained IPv6LL Feb 13 04:58:49.393899 systemd-networkd[1317]: cali6a22e4e2fcf: Gained IPv6LL Feb 13 04:58:49.531045 env[1479]: time="2024-02-13T04:58:49.530894709Z" level=info msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.570 [INFO][4732] k8s.go 578: Cleaning up netns ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.570 [INFO][4732] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" iface="eth0" netns="/var/run/netns/cni-8fdaf5bc-eb52-9b8f-b051-e6c01b360631" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.570 [INFO][4732] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" iface="eth0" netns="/var/run/netns/cni-8fdaf5bc-eb52-9b8f-b051-e6c01b360631" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.570 [INFO][4732] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" iface="eth0" netns="/var/run/netns/cni-8fdaf5bc-eb52-9b8f-b051-e6c01b360631" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.570 [INFO][4732] k8s.go 585: Releasing IP address(es) ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.570 [INFO][4732] utils.go 188: Calico CNI releasing IP address ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.580 [INFO][4745] ipam_plugin.go 415: Releasing address using handleID ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.580 [INFO][4745] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.580 [INFO][4745] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.584 [WARNING][4745] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.584 [INFO][4745] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.585 [INFO][4745] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:49.587086 env[1479]: 2024-02-13 04:58:49.586 [INFO][4732] k8s.go 591: Teardown processing complete. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:58:49.587423 env[1479]: time="2024-02-13T04:58:49.587153175Z" level=info msg="TearDown network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" successfully" Feb 13 04:58:49.587423 env[1479]: time="2024-02-13T04:58:49.587176093Z" level=info msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" returns successfully" Feb 13 04:58:49.587596 env[1479]: time="2024-02-13T04:58:49.587583239Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2c97r,Uid:91f90690-897e-4df1-979a-b43047e67f6d,Namespace:calico-system,Attempt:1,}" Feb 13 04:58:49.588616 systemd[1]: run-netns-cni\x2d8fdaf5bc\x2deb52\x2d9b8f\x2db051\x2de6c01b360631.mount: Deactivated successfully. Feb 13 04:58:49.652467 systemd-networkd[1317]: cali513c15b4467: Link UP Feb 13 04:58:49.706745 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 04:58:49.706787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali513c15b4467: link becomes ready Feb 13 04:58:49.706787 systemd-networkd[1317]: cali513c15b4467: Gained carrier Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.610 [INFO][4760] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0 csi-node-driver- calico-system 91f90690-897e-4df1-979a-b43047e67f6d 797 0 2024-02-13 04:57:33 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-01dc72b3af csi-node-driver-2c97r eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali513c15b4467 [] []}} ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.610 [INFO][4760] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.627 [INFO][4782] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" HandleID="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.634 [INFO][4782] ipam_plugin.go 268: Auto assigning IP ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" HandleID="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00058d490), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-01dc72b3af", "pod":"csi-node-driver-2c97r", "timestamp":"2024-02-13 04:58:49.627529119 +0000 UTC"}, Hostname:"ci-3510.3.2-a-01dc72b3af", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.634 [INFO][4782] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.634 [INFO][4782] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.634 [INFO][4782] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-01dc72b3af' Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.635 [INFO][4782] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.638 [INFO][4782] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.641 [INFO][4782] ipam.go 489: Trying affinity for 192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.642 [INFO][4782] ipam.go 155: Attempting to load block cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.644 [INFO][4782] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.644 [INFO][4782] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.128/26 handle="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.645 [INFO][4782] ipam.go 1682: Creating new handle: k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205 Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.647 [INFO][4782] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.128/26 handle="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.650 [INFO][4782] ipam.go 1216: Successfully claimed IPs: [192.168.126.131/26] block=192.168.126.128/26 handle="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.650 [INFO][4782] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.131/26] handle="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.650 [INFO][4782] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:49.711748 env[1479]: 2024-02-13 04:58:49.650 [INFO][4782] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.131/26] IPv6=[] ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" HandleID="k8s-pod-network.d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.712255 env[1479]: 2024-02-13 04:58:49.651 [INFO][4760] k8s.go 385: Populated endpoint ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91f90690-897e-4df1-979a-b43047e67f6d", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"", Pod:"csi-node-driver-2c97r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali513c15b4467", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:49.712255 env[1479]: 2024-02-13 04:58:49.651 [INFO][4760] k8s.go 386: Calico CNI using IPs: [192.168.126.131/32] ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.712255 env[1479]: 2024-02-13 04:58:49.651 [INFO][4760] dataplane_linux.go 68: Setting the host side veth name to cali513c15b4467 ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.712255 env[1479]: 2024-02-13 04:58:49.706 [INFO][4760] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.712255 env[1479]: 2024-02-13 04:58:49.706 [INFO][4760] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91f90690-897e-4df1-979a-b43047e67f6d", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205", Pod:"csi-node-driver-2c97r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali513c15b4467", MAC:"0a:41:3a:e5:a4:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:49.712255 env[1479]: 2024-02-13 04:58:49.711 [INFO][4760] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205" Namespace="calico-system" Pod="csi-node-driver-2c97r" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:58:49.717142 env[1479]: time="2024-02-13T04:58:49.717077787Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:58:49.717142 env[1479]: time="2024-02-13T04:58:49.717098751Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:58:49.717142 env[1479]: time="2024-02-13T04:58:49.717105668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:58:49.717274 env[1479]: time="2024-02-13T04:58:49.717164812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205 pid=4819 runtime=io.containerd.runc.v2 Feb 13 04:58:49.718000 audit[4828]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4828 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:49.718000 audit[4828]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffcef0f1320 a2=0 a3=7ffcef0f130c items=0 ppid=4091 pid=4828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:49.718000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:49.723840 systemd[1]: Started cri-containerd-d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205.scope. Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.727000 audit: BPF prog-id=164 op=LOAD Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4819 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:49.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333134346633316536376436316131613238663139373439616139 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4819 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:49.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333134346633316536376436316131613238663139373439616139 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit: BPF prog-id=165 op=LOAD Feb 13 04:58:49.728000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288530 items=0 ppid=4819 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:49.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333134346633316536376436316131613238663139373439616139 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit: BPF prog-id=166 op=LOAD Feb 13 04:58:49.728000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000288578 items=0 ppid=4819 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:49.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333134346633316536376436316131613238663139373439616139 Feb 13 04:58:49.728000 audit: BPF prog-id=166 op=UNLOAD Feb 13 04:58:49.728000 audit: BPF prog-id=165 op=UNLOAD Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { perfmon } for pid=4830 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit[4830]: AVC avc: denied { bpf } for pid=4830 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:49.728000 audit: BPF prog-id=167 op=LOAD Feb 13 04:58:49.728000 audit[4830]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000288988 items=0 ppid=4819 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:49.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437333134346633316536376436316131613238663139373439616139 Feb 13 04:58:49.732962 env[1479]: time="2024-02-13T04:58:49.732939572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2c97r,Uid:91f90690-897e-4df1-979a-b43047e67f6d,Namespace:calico-system,Attempt:1,} returns sandbox id \"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205\"" Feb 13 04:58:51.633769 systemd-networkd[1317]: cali513c15b4467: Gained IPv6LL Feb 13 04:58:52.530247 env[1479]: time="2024-02-13T04:58:52.530152025Z" level=info msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.596 [INFO][4877] k8s.go 578: Cleaning up netns ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.596 [INFO][4877] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" iface="eth0" netns="/var/run/netns/cni-3d431d40-3df6-4237-c24e-9a77f7b3abae" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.597 [INFO][4877] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" iface="eth0" netns="/var/run/netns/cni-3d431d40-3df6-4237-c24e-9a77f7b3abae" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.597 [INFO][4877] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" iface="eth0" netns="/var/run/netns/cni-3d431d40-3df6-4237-c24e-9a77f7b3abae" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.597 [INFO][4877] k8s.go 585: Releasing IP address(es) ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.597 [INFO][4877] utils.go 188: Calico CNI releasing IP address ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.612 [INFO][4893] ipam_plugin.go 415: Releasing address using handleID ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.612 [INFO][4893] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.612 [INFO][4893] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.618 [WARNING][4893] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.618 [INFO][4893] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.619 [INFO][4893] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:52.621719 env[1479]: 2024-02-13 04:58:52.620 [INFO][4877] k8s.go 591: Teardown processing complete. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:58:52.622172 env[1479]: time="2024-02-13T04:58:52.621801546Z" level=info msg="TearDown network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" successfully" Feb 13 04:58:52.622172 env[1479]: time="2024-02-13T04:58:52.621832353Z" level=info msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" returns successfully" Feb 13 04:58:52.622447 env[1479]: time="2024-02-13T04:58:52.622391781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vbk6c,Uid:39394708-2484-42e0-a8ca-54c653f419f6,Namespace:kube-system,Attempt:1,}" Feb 13 04:58:52.623938 systemd[1]: run-netns-cni\x2d3d431d40\x2d3df6\x2d4237\x2dc24e\x2d9a77f7b3abae.mount: Deactivated successfully. Feb 13 04:58:52.702328 systemd-networkd[1317]: califc78cce70ae: Link UP Feb 13 04:58:52.755403 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 04:58:52.755457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califc78cce70ae: link becomes ready Feb 13 04:58:52.755437 systemd-networkd[1317]: califc78cce70ae: Gained carrier Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.651 [INFO][4913] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0 coredns-5d78c9869d- kube-system 39394708-2484-42e0-a8ca-54c653f419f6 806 0 2024-02-13 04:57:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-01dc72b3af coredns-5d78c9869d-vbk6c eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califc78cce70ae [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.651 [INFO][4913] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.671 [INFO][4935] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" HandleID="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.679 [INFO][4935] ipam_plugin.go 268: Auto assigning IP ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" HandleID="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000125be0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-01dc72b3af", "pod":"coredns-5d78c9869d-vbk6c", "timestamp":"2024-02-13 04:58:52.671160163 +0000 UTC"}, Hostname:"ci-3510.3.2-a-01dc72b3af", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.679 [INFO][4935] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.680 [INFO][4935] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.680 [INFO][4935] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-01dc72b3af' Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.681 [INFO][4935] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.684 [INFO][4935] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.688 [INFO][4935] ipam.go 489: Trying affinity for 192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.689 [INFO][4935] ipam.go 155: Attempting to load block cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.691 [INFO][4935] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.691 [INFO][4935] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.128/26 handle="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.693 [INFO][4935] ipam.go 1682: Creating new handle: k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825 Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.696 [INFO][4935] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.128/26 handle="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.699 [INFO][4935] ipam.go 1216: Successfully claimed IPs: [192.168.126.132/26] block=192.168.126.128/26 handle="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.699 [INFO][4935] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.132/26] handle="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.700 [INFO][4935] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:58:52.760791 env[1479]: 2024-02-13 04:58:52.700 [INFO][4935] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.132/26] IPv6=[] ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" HandleID="k8s-pod-network.3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.761242 env[1479]: 2024-02-13 04:58:52.701 [INFO][4913] k8s.go 385: Populated endpoint ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"39394708-2484-42e0-a8ca-54c653f419f6", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"", Pod:"coredns-5d78c9869d-vbk6c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc78cce70ae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:52.761242 env[1479]: 2024-02-13 04:58:52.701 [INFO][4913] k8s.go 386: Calico CNI using IPs: [192.168.126.132/32] ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.761242 env[1479]: 2024-02-13 04:58:52.701 [INFO][4913] dataplane_linux.go 68: Setting the host side veth name to califc78cce70ae ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.761242 env[1479]: 2024-02-13 04:58:52.755 [INFO][4913] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.761242 env[1479]: 2024-02-13 04:58:52.755 [INFO][4913] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"39394708-2484-42e0-a8ca-54c653f419f6", ResourceVersion:"806", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825", Pod:"coredns-5d78c9869d-vbk6c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc78cce70ae", MAC:"02:f2:83:bf:92:b3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:58:52.761242 env[1479]: 2024-02-13 04:58:52.759 [INFO][4913] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825" Namespace="kube-system" Pod="coredns-5d78c9869d-vbk6c" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:58:52.766072 env[1479]: time="2024-02-13T04:58:52.766015995Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:58:52.766072 env[1479]: time="2024-02-13T04:58:52.766037066Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:58:52.766072 env[1479]: time="2024-02-13T04:58:52.766043971Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:58:52.766181 env[1479]: time="2024-02-13T04:58:52.766127233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825 pid=4976 runtime=io.containerd.runc.v2 Feb 13 04:58:52.765000 audit[4977]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=4977 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:52.775376 systemd[1]: Started cri-containerd-3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825.scope. Feb 13 04:58:52.791131 kernel: kauditd_printk_skb: 239 callbacks suppressed Feb 13 04:58:52.791175 kernel: audit: type=1325 audit(1707800332.765:1283): table=filter:108 family=2 entries=38 op=nft_register_chain pid=4977 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:58:52.765000 audit[4977]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffd3e5202c0 a2=0 a3=7ffd3e5202ac items=0 ppid=4091 pid=4977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:52.937789 kernel: audit: type=1300 audit(1707800332.765:1283): arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffd3e5202c0 a2=0 a3=7ffd3e5202ac items=0 ppid=4091 pid=4977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:52.937857 kernel: audit: type=1327 audit(1707800332.765:1283): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:52.765000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054851 kernel: audit: type=1400 audit(1707800332.853:1284): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054920 kernel: audit: type=1400 audit(1707800332.853:1285): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.114240 kernel: audit: type=1400 audit(1707800332.853:1286): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.173507 kernel: audit: type=1400 audit(1707800332.853:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.233247 kernel: audit: type=1400 audit(1707800332.853:1288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.293412 kernel: audit: type=1400 audit(1707800332.853:1289): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.354518 kernel: audit: type=1400 audit(1707800332.853:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:52.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit: BPF prog-id=168 op=LOAD Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4976 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366237313935376532363237666263663465663639363735336534 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4976 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366237313935376532363237666263663465663639363735336534 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.054000 audit: BPF prog-id=169 op=LOAD Feb 13 04:58:53.054000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024b30 items=0 ppid=4976 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366237313935376532363237666263663465663639363735336534 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.172000 audit: BPF prog-id=170 op=LOAD Feb 13 04:58:53.172000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024b78 items=0 ppid=4976 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366237313935376532363237666263663465663639363735336534 Feb 13 04:58:53.292000 audit: BPF prog-id=170 op=UNLOAD Feb 13 04:58:53.292000 audit: BPF prog-id=169 op=UNLOAD Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { perfmon } for pid=4987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit[4987]: AVC avc: denied { bpf } for pid=4987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.292000 audit: BPF prog-id=171 op=LOAD Feb 13 04:58:53.292000 audit[4987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024f88 items=0 ppid=4976 pid=4987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364366237313935376532363237666263663465663639363735336534 Feb 13 04:58:53.431887 env[1479]: time="2024-02-13T04:58:53.431832647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-vbk6c,Uid:39394708-2484-42e0-a8ca-54c653f419f6,Namespace:kube-system,Attempt:1,} returns sandbox id \"3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825\"" Feb 13 04:58:53.433048 env[1479]: time="2024-02-13T04:58:53.433005482Z" level=info msg="CreateContainer within sandbox \"3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 04:58:53.452141 env[1479]: time="2024-02-13T04:58:53.452097521Z" level=info msg="CreateContainer within sandbox \"3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b7ef1f26717278304e3f334362a8f8ef74d3e6987803da435115fc029948dfdf\"" Feb 13 04:58:53.452347 env[1479]: time="2024-02-13T04:58:53.452333948Z" level=info msg="StartContainer for \"b7ef1f26717278304e3f334362a8f8ef74d3e6987803da435115fc029948dfdf\"" Feb 13 04:58:53.459514 systemd[1]: Started cri-containerd-b7ef1f26717278304e3f334362a8f8ef74d3e6987803da435115fc029948dfdf.scope. Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit: BPF prog-id=172 op=LOAD Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4976 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656631663236373137323738333034653366333334333632613866 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4976 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656631663236373137323738333034653366333334333632613866 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit: BPF prog-id=173 op=LOAD Feb 13 04:58:53.465000 audit[5042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000086c00 items=0 ppid=4976 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656631663236373137323738333034653366333334333632613866 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit: BPF prog-id=174 op=LOAD Feb 13 04:58:53.465000 audit[5042]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000086c48 items=0 ppid=4976 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656631663236373137323738333034653366333334333632613866 Feb 13 04:58:53.465000 audit: BPF prog-id=174 op=UNLOAD Feb 13 04:58:53.465000 audit: BPF prog-id=173 op=UNLOAD Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { perfmon } for pid=5042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit[5042]: AVC avc: denied { bpf } for pid=5042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:53.465000 audit: BPF prog-id=175 op=LOAD Feb 13 04:58:53.465000 audit[5042]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000087058 items=0 ppid=4976 pid=5042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656631663236373137323738333034653366333334333632613866 Feb 13 04:58:53.471577 env[1479]: time="2024-02-13T04:58:53.471526258Z" level=info msg="StartContainer for \"b7ef1f26717278304e3f334362a8f8ef74d3e6987803da435115fc029948dfdf\" returns successfully" Feb 13 04:58:53.861584 kubelet[2589]: I0213 04:58:53.861524 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-vbk6c" podStartSLOduration=85.861423977 podCreationTimestamp="2024-02-13 04:57:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 04:58:53.860351233 +0000 UTC m=+98.385959549" watchObservedRunningTime="2024-02-13 04:58:53.861423977 +0000 UTC m=+98.387032245" Feb 13 04:58:53.883000 audit[5085]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:53.883000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffed5886350 a2=0 a3=7ffed588633c items=0 ppid=2861 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.883000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:53.887000 audit[5085]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=5085 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:53.887000 audit[5085]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffed5886350 a2=0 a3=7ffed588633c items=0 ppid=2861 pid=5085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:53.908000 audit[5087]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=5087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:53.908000 audit[5087]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdb3849f90 a2=0 a3=7ffdb3849f7c items=0 ppid=2861 pid=5087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:53.914000 audit[5087]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=5087 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:58:53.914000 audit[5087]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffdb3849f90 a2=0 a3=7ffdb3849f7c items=0 ppid=2861 pid=5087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:53.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:58:54.001767 systemd-networkd[1317]: califc78cce70ae: Gained IPv6LL Feb 13 04:58:57.411230 env[1479]: time="2024-02-13T04:58:57.411183461Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:57.411882 env[1479]: time="2024-02-13T04:58:57.411836507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:57.412779 env[1479]: time="2024-02-13T04:58:57.412756261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:57.414221 env[1479]: time="2024-02-13T04:58:57.414206256Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:58:57.414574 env[1479]: time="2024-02-13T04:58:57.414559738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 13 04:58:57.415004 env[1479]: time="2024-02-13T04:58:57.414969078Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 13 04:58:57.418927 env[1479]: time="2024-02-13T04:58:57.418879208Z" level=info msg="CreateContainer within sandbox \"c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 13 04:58:57.423299 env[1479]: time="2024-02-13T04:58:57.423253677Z" level=info msg="CreateContainer within sandbox \"c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"de0e0c32ad2ffc9938206e5df660165167fe9f1c4c7375360b73a4d064baedba\"" Feb 13 04:58:57.423564 env[1479]: time="2024-02-13T04:58:57.423524483Z" level=info msg="StartContainer for \"de0e0c32ad2ffc9938206e5df660165167fe9f1c4c7375360b73a4d064baedba\"" Feb 13 04:58:57.431087 systemd[1]: Started cri-containerd-de0e0c32ad2ffc9938206e5df660165167fe9f1c4c7375360b73a4d064baedba.scope. Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit: BPF prog-id=176 op=LOAD Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4674 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:57.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306530633332616432666663393933383230366535646636363031 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4674 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:57.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306530633332616432666663393933383230366535646636363031 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit: BPF prog-id=177 op=LOAD Feb 13 04:58:57.437000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300ae0 items=0 ppid=4674 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:57.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306530633332616432666663393933383230366535646636363031 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit: BPF prog-id=178 op=LOAD Feb 13 04:58:57.437000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300b28 items=0 ppid=4674 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:57.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306530633332616432666663393933383230366535646636363031 Feb 13 04:58:57.437000 audit: BPF prog-id=178 op=UNLOAD Feb 13 04:58:57.437000 audit: BPF prog-id=177 op=UNLOAD Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { perfmon } for pid=5098 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit[5098]: AVC avc: denied { bpf } for pid=5098 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:58:57.437000 audit: BPF prog-id=179 op=LOAD Feb 13 04:58:57.437000 audit[5098]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300f38 items=0 ppid=4674 pid=5098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:58:57.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465306530633332616432666663393933383230366535646636363031 Feb 13 04:58:57.454474 env[1479]: time="2024-02-13T04:58:57.454448165Z" level=info msg="StartContainer for \"de0e0c32ad2ffc9938206e5df660165167fe9f1c4c7375360b73a4d064baedba\" returns successfully" Feb 13 04:58:57.878479 kubelet[2589]: I0213 04:58:57.878390 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5445dfb9f4-lpwfr" podStartSLOduration=75.286239 podCreationTimestamp="2024-02-13 04:57:33 +0000 UTC" firstStartedPulling="2024-02-13 04:58:47.822785317 +0000 UTC m=+92.348393553" lastFinishedPulling="2024-02-13 04:58:57.414803409 +0000 UTC m=+101.940411634" observedRunningTime="2024-02-13 04:58:57.877710039 +0000 UTC m=+102.403318379" watchObservedRunningTime="2024-02-13 04:58:57.878257081 +0000 UTC m=+102.403865409" Feb 13 04:59:01.608229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1982671513.mount: Deactivated successfully. Feb 13 04:59:02.988581 kubelet[2589]: I0213 04:59:02.988545 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:59:02.987000 audit[5169]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:02.993062 kubelet[2589]: I0213 04:59:02.993031 2589 topology_manager.go:212] "Topology Admit Handler" Feb 13 04:59:02.996384 systemd[1]: Created slice kubepods-besteffort-pod1ab93040_1c4e_4263_aee5_c027620a8eba.slice. Feb 13 04:59:03.000284 systemd[1]: Created slice kubepods-besteffort-pod194fc59e_cc6b_4ed7_b8dd_6fb1d729b884.slice. Feb 13 04:59:03.015072 kernel: kauditd_printk_skb: 176 callbacks suppressed Feb 13 04:59:03.015170 kernel: audit: type=1325 audit(1707800342.987:1342): table=filter:113 family=2 entries=9 op=nft_register_rule pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:02.987000 audit[5169]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdd5290b50 a2=0 a3=7ffdd5290b3c items=0 ppid=2861 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.096574 kubelet[2589]: I0213 04:59:03.096509 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jkj4d\" (UniqueName: \"kubernetes.io/projected/194fc59e-cc6b-4ed7-b8dd-6fb1d729b884-kube-api-access-jkj4d\") pod \"calico-apiserver-c9dc97947-sgmbn\" (UID: \"194fc59e-cc6b-4ed7-b8dd-6fb1d729b884\") " pod="calico-apiserver/calico-apiserver-c9dc97947-sgmbn" Feb 13 04:59:03.096574 kubelet[2589]: I0213 04:59:03.096555 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1ab93040-1c4e-4263-aee5-c027620a8eba-calico-apiserver-certs\") pod \"calico-apiserver-c9dc97947-f4b9t\" (UID: \"1ab93040-1c4e-4263-aee5-c027620a8eba\") " pod="calico-apiserver/calico-apiserver-c9dc97947-f4b9t" Feb 13 04:59:03.096574 kubelet[2589]: I0213 04:59:03.096569 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dms8j\" (UniqueName: \"kubernetes.io/projected/1ab93040-1c4e-4263-aee5-c027620a8eba-kube-api-access-dms8j\") pod \"calico-apiserver-c9dc97947-f4b9t\" (UID: \"1ab93040-1c4e-4263-aee5-c027620a8eba\") " pod="calico-apiserver/calico-apiserver-c9dc97947-f4b9t" Feb 13 04:59:03.096686 kubelet[2589]: I0213 04:59:03.096594 2589 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/194fc59e-cc6b-4ed7-b8dd-6fb1d729b884-calico-apiserver-certs\") pod \"calico-apiserver-c9dc97947-sgmbn\" (UID: \"194fc59e-cc6b-4ed7-b8dd-6fb1d729b884\") " pod="calico-apiserver/calico-apiserver-c9dc97947-sgmbn" Feb 13 04:59:03.165229 kernel: audit: type=1300 audit(1707800342.987:1342): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdd5290b50 a2=0 a3=7ffdd5290b3c items=0 ppid=2861 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.165275 kernel: audit: type=1327 audit(1707800342.987:1342): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:02.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:03.196997 kubelet[2589]: E0213 04:59:03.196980 2589 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 04:59:03.197057 kubelet[2589]: E0213 04:59:03.197028 2589 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/194fc59e-cc6b-4ed7-b8dd-6fb1d729b884-calico-apiserver-certs podName:194fc59e-cc6b-4ed7-b8dd-6fb1d729b884 nodeName:}" failed. No retries permitted until 2024-02-13 04:59:03.697015891 +0000 UTC m=+108.222624113 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/194fc59e-cc6b-4ed7-b8dd-6fb1d729b884-calico-apiserver-certs") pod "calico-apiserver-c9dc97947-sgmbn" (UID: "194fc59e-cc6b-4ed7-b8dd-6fb1d729b884") : secret "calico-apiserver-certs" not found Feb 13 04:59:03.197057 kubelet[2589]: E0213 04:59:03.196980 2589 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 13 04:59:03.197141 kubelet[2589]: E0213 04:59:03.197075 2589 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/1ab93040-1c4e-4263-aee5-c027620a8eba-calico-apiserver-certs podName:1ab93040-1c4e-4263-aee5-c027620a8eba nodeName:}" failed. No retries permitted until 2024-02-13 04:59:03.697068275 +0000 UTC m=+108.222676497 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/1ab93040-1c4e-4263-aee5-c027620a8eba-calico-apiserver-certs") pod "calico-apiserver-c9dc97947-f4b9t" (UID: "1ab93040-1c4e-4263-aee5-c027620a8eba") : secret "calico-apiserver-certs" not found Feb 13 04:59:02.989000 audit[5169]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:02.989000 audit[5169]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdd5290b50 a2=0 a3=7ffdd5290b3c items=0 ppid=2861 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.373466 kernel: audit: type=1325 audit(1707800342.989:1343): table=nat:114 family=2 entries=20 op=nft_register_rule pid=5169 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:03.373550 kernel: audit: type=1300 audit(1707800342.989:1343): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdd5290b50 a2=0 a3=7ffdd5290b3c items=0 ppid=2861 pid=5169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.373570 kernel: audit: type=1327 audit(1707800342.989:1343): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:02.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:03.226000 audit[5175]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:03.226000 audit[5175]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffed62f8ff0 a2=0 a3=7ffed62f8fdc items=0 ppid=2861 pid=5175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.584702 kernel: audit: type=1325 audit(1707800343.226:1344): table=filter:115 family=2 entries=10 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:03.584753 kernel: audit: type=1300 audit(1707800343.226:1344): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffed62f8ff0 a2=0 a3=7ffed62f8fdc items=0 ppid=2861 pid=5175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.584770 kernel: audit: type=1327 audit(1707800343.226:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:03.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:03.433000 audit[5175]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:03.433000 audit[5175]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffed62f8ff0 a2=0 a3=7ffed62f8fdc items=0 ppid=2861 pid=5175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:03.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:03.701447 kernel: audit: type=1325 audit(1707800343.433:1345): table=nat:116 family=2 entries=20 op=nft_register_rule pid=5175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:03.898677 env[1479]: time="2024-02-13T04:59:03.898618322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c9dc97947-f4b9t,Uid:1ab93040-1c4e-4263-aee5-c027620a8eba,Namespace:calico-apiserver,Attempt:0,}" Feb 13 04:59:03.902224 env[1479]: time="2024-02-13T04:59:03.902203389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c9dc97947-sgmbn,Uid:194fc59e-cc6b-4ed7-b8dd-6fb1d729b884,Namespace:calico-apiserver,Attempt:0,}" Feb 13 04:59:03.955047 env[1479]: time="2024-02-13T04:59:03.955024383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:03.955645 env[1479]: time="2024-02-13T04:59:03.955633857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:03.956319 env[1479]: time="2024-02-13T04:59:03.956278672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:03.957102 env[1479]: time="2024-02-13T04:59:03.957062947Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:03.957424 env[1479]: time="2024-02-13T04:59:03.957393392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 13 04:59:03.958256 env[1479]: time="2024-02-13T04:59:03.958242820Z" level=info msg="CreateContainer within sandbox \"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 13 04:59:03.961313 systemd-networkd[1317]: cali43a2c490936: Link UP Feb 13 04:59:04.017770 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 04:59:04.017853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali43a2c490936: link becomes ready Feb 13 04:59:04.017881 systemd-networkd[1317]: cali43a2c490936: Gained carrier Feb 13 04:59:04.019653 env[1479]: time="2024-02-13T04:59:04.019620697Z" level=info msg="CreateContainer within sandbox \"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1953f935dfacfba26e4e2b5286d2f6c19305da49d548248c6d6a74b211df305d\"" Feb 13 04:59:04.019992 env[1479]: time="2024-02-13T04:59:04.019973963Z" level=info msg="StartContainer for \"1953f935dfacfba26e4e2b5286d2f6c19305da49d548248c6d6a74b211df305d\"" Feb 13 04:59:04.020219 systemd-networkd[1317]: calid38d02bed12: Link UP Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.923 [INFO][5190] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0 calico-apiserver-c9dc97947- calico-apiserver 194fc59e-cc6b-4ed7-b8dd-6fb1d729b884 903 0 2024-02-13 04:59:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c9dc97947 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-01dc72b3af calico-apiserver-c9dc97947-sgmbn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali43a2c490936 [] []}} ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.923 [INFO][5190] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.936 [INFO][5234] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" HandleID="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.943 [INFO][5234] ipam_plugin.go 268: Auto assigning IP ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" HandleID="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000885670), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-01dc72b3af", "pod":"calico-apiserver-c9dc97947-sgmbn", "timestamp":"2024-02-13 04:59:03.936278873 +0000 UTC"}, Hostname:"ci-3510.3.2-a-01dc72b3af", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.943 [INFO][5234] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.943 [INFO][5234] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.943 [INFO][5234] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-01dc72b3af' Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.945 [INFO][5234] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.947 [INFO][5234] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.950 [INFO][5234] ipam.go 489: Trying affinity for 192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.951 [INFO][5234] ipam.go 155: Attempting to load block cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.953 [INFO][5234] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.953 [INFO][5234] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.128/26 handle="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.954 [INFO][5234] ipam.go 1682: Creating new handle: k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8 Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.956 [INFO][5234] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.128/26 handle="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.959 [INFO][5234] ipam.go 1216: Successfully claimed IPs: [192.168.126.133/26] block=192.168.126.128/26 handle="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.959 [INFO][5234] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.133/26] handle="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.959 [INFO][5234] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:04.024952 env[1479]: 2024-02-13 04:59:03.959 [INFO][5234] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.133/26] IPv6=[] ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" HandleID="k8s-pod-network.3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.025428 env[1479]: 2024-02-13 04:59:03.960 [INFO][5190] k8s.go 385: Populated endpoint ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0", GenerateName:"calico-apiserver-c9dc97947-", Namespace:"calico-apiserver", SelfLink:"", UID:"194fc59e-cc6b-4ed7-b8dd-6fb1d729b884", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 59, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c9dc97947", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"", Pod:"calico-apiserver-c9dc97947-sgmbn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.126.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali43a2c490936", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:04.025428 env[1479]: 2024-02-13 04:59:03.960 [INFO][5190] k8s.go 386: Calico CNI using IPs: [192.168.126.133/32] ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.025428 env[1479]: 2024-02-13 04:59:03.960 [INFO][5190] dataplane_linux.go 68: Setting the host side veth name to cali43a2c490936 ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.025428 env[1479]: 2024-02-13 04:59:04.018 [INFO][5190] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.025428 env[1479]: 2024-02-13 04:59:04.018 [INFO][5190] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0", GenerateName:"calico-apiserver-c9dc97947-", Namespace:"calico-apiserver", SelfLink:"", UID:"194fc59e-cc6b-4ed7-b8dd-6fb1d729b884", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 59, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c9dc97947", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8", Pod:"calico-apiserver-c9dc97947-sgmbn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.126.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali43a2c490936", MAC:"72:e1:be:be:41:b5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:04.025428 env[1479]: 2024-02-13 04:59:04.022 [INFO][5190] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-sgmbn" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--sgmbn-eth0" Feb 13 04:59:04.029241 systemd[1]: Started cri-containerd-1953f935dfacfba26e4e2b5286d2f6c19305da49d548248c6d6a74b211df305d.scope. Feb 13 04:59:04.031339 env[1479]: time="2024-02-13T04:59:04.030920347Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:59:04.031339 env[1479]: time="2024-02-13T04:59:04.030948495Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:59:04.031339 env[1479]: time="2024-02-13T04:59:04.030957544Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:59:04.031339 env[1479]: time="2024-02-13T04:59:04.031033525Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8 pid=5309 runtime=io.containerd.runc.v2 Feb 13 04:59:04.031000 audit[5322]: NETFILTER_CFG table=filter:117 family=2 entries=65 op=nft_register_chain pid=5322 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:59:04.031000 audit[5322]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7ffd1e0e0150 a2=0 a3=7ffd1e0e013c items=0 ppid=4091 pid=5322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.031000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:59:04.037019 systemd[1]: Started cri-containerd-3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8.scope. Feb 13 04:59:04.048863 systemd-networkd[1317]: calid38d02bed12: Gained carrier Feb 13 04:59:04.049451 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid38d02bed12: link becomes ready Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.921 [INFO][5179] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0 calico-apiserver-c9dc97947- calico-apiserver 1ab93040-1c4e-4263-aee5-c027620a8eba 901 0 2024-02-13 04:59:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c9dc97947 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-01dc72b3af calico-apiserver-c9dc97947-f4b9t eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid38d02bed12 [] []}} ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.921 [INFO][5179] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.937 [INFO][5229] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" HandleID="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.943 [INFO][5229] ipam_plugin.go 268: Auto assigning IP ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" HandleID="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000518c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-01dc72b3af", "pod":"calico-apiserver-c9dc97947-f4b9t", "timestamp":"2024-02-13 04:59:03.93785039 +0000 UTC"}, Hostname:"ci-3510.3.2-a-01dc72b3af", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.943 [INFO][5229] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.959 [INFO][5229] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.959 [INFO][5229] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-01dc72b3af' Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.960 [INFO][5229] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.963 [INFO][5229] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.966 [INFO][5229] ipam.go 489: Trying affinity for 192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.967 [INFO][5229] ipam.go 155: Attempting to load block cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.989 [INFO][5229] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.128/26 host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.989 [INFO][5229] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.128/26 handle="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.990 [INFO][5229] ipam.go 1682: Creating new handle: k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3 Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:03.993 [INFO][5229] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.128/26 handle="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:04.018 [INFO][5229] ipam.go 1216: Successfully claimed IPs: [192.168.126.134/26] block=192.168.126.128/26 handle="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:04.018 [INFO][5229] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.134/26] handle="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" host="ci-3510.3.2-a-01dc72b3af" Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:04.018 [INFO][5229] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:04.055826 env[1479]: 2024-02-13 04:59:04.018 [INFO][5229] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.134/26] IPv6=[] ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" HandleID="k8s-pod-network.4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.056293 env[1479]: 2024-02-13 04:59:04.019 [INFO][5179] k8s.go 385: Populated endpoint ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0", GenerateName:"calico-apiserver-c9dc97947-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ab93040-1c4e-4263-aee5-c027620a8eba", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 59, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c9dc97947", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"", Pod:"calico-apiserver-c9dc97947-f4b9t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.126.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid38d02bed12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:04.056293 env[1479]: 2024-02-13 04:59:04.019 [INFO][5179] k8s.go 386: Calico CNI using IPs: [192.168.126.134/32] ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.056293 env[1479]: 2024-02-13 04:59:04.019 [INFO][5179] dataplane_linux.go 68: Setting the host side veth name to calid38d02bed12 ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.056293 env[1479]: 2024-02-13 04:59:04.048 [INFO][5179] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.056293 env[1479]: 2024-02-13 04:59:04.049 [INFO][5179] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0", GenerateName:"calico-apiserver-c9dc97947-", Namespace:"calico-apiserver", SelfLink:"", UID:"1ab93040-1c4e-4263-aee5-c027620a8eba", ResourceVersion:"901", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 59, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c9dc97947", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3", Pod:"calico-apiserver-c9dc97947-f4b9t", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.126.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid38d02bed12", MAC:"9a:24:42:14:d6:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:04.056293 env[1479]: 2024-02-13 04:59:04.054 [INFO][5179] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3" Namespace="calico-apiserver" Pod="calico-apiserver-c9dc97947-f4b9t" WorkloadEndpoint="ci--3510.3.2--a--01dc72b3af-k8s-calico--apiserver--c9dc97947--f4b9t-eth0" Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit: BPF prog-id=180 op=LOAD Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5309 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316262383135353631363162306330393731316262353537366338 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5309 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316262383135353631363162306330393731316262353537366338 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit: BPF prog-id=181 op=LOAD Feb 13 04:59:04.057000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023a820 items=0 ppid=5309 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316262383135353631363162306330393731316262353537366338 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit: BPF prog-id=182 op=LOAD Feb 13 04:59:04.057000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023a868 items=0 ppid=5309 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316262383135353631363162306330393731316262353537366338 Feb 13 04:59:04.057000 audit: BPF prog-id=182 op=UNLOAD Feb 13 04:59:04.057000 audit: BPF prog-id=181 op=UNLOAD Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { perfmon } for pid=5321 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit[5321]: AVC avc: denied { bpf } for pid=5321 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.057000 audit: BPF prog-id=183 op=LOAD Feb 13 04:59:04.057000 audit[5321]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023ac78 items=0 ppid=5309 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362316262383135353631363162306330393731316262353537366338 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff8ed0ecdb8 items=0 ppid=4819 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139353366393335646661636662613236653465326235323836643266 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit: BPF prog-id=184 op=LOAD Feb 13 04:59:04.058000 audit[5276]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030e698 items=0 ppid=4819 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139353366393335646661636662613236653465326235323836643266 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit: BPF prog-id=185 op=LOAD Feb 13 04:59:04.058000 audit[5276]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030e6e8 items=0 ppid=4819 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139353366393335646661636662613236653465326235323836643266 Feb 13 04:59:04.058000 audit: BPF prog-id=185 op=UNLOAD Feb 13 04:59:04.058000 audit: BPF prog-id=184 op=UNLOAD Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { perfmon } for pid=5276 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit[5276]: AVC avc: denied { bpf } for pid=5276 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.058000 audit: BPF prog-id=186 op=LOAD Feb 13 04:59:04.058000 audit[5276]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030e778 items=0 ppid=4819 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139353366393335646661636662613236653465326235323836643266 Feb 13 04:59:04.061000 audit[5358]: NETFILTER_CFG table=filter:118 family=2 entries=46 op=nft_register_chain pid=5358 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 04:59:04.061000 audit[5358]: SYSCALL arch=c000003e syscall=46 success=yes exit=23292 a0=3 a1=7fff9d22cda0 a2=0 a3=7fff9d22cd8c items=0 ppid=4091 pid=5358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.061000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 04:59:04.075413 env[1479]: time="2024-02-13T04:59:04.075386832Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c9dc97947-sgmbn,Uid:194fc59e-cc6b-4ed7-b8dd-6fb1d729b884,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8\"" Feb 13 04:59:04.076175 env[1479]: time="2024-02-13T04:59:04.076162293Z" level=info msg="StartContainer for \"1953f935dfacfba26e4e2b5286d2f6c19305da49d548248c6d6a74b211df305d\" returns successfully" Feb 13 04:59:04.076268 env[1479]: time="2024-02-13T04:59:04.076257912Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 13 04:59:04.079028 env[1479]: time="2024-02-13T04:59:04.078996909Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 04:59:04.079028 env[1479]: time="2024-02-13T04:59:04.079018583Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 04:59:04.079140 env[1479]: time="2024-02-13T04:59:04.079026657Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 04:59:04.079140 env[1479]: time="2024-02-13T04:59:04.079091238Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3 pid=5384 runtime=io.containerd.runc.v2 Feb 13 04:59:04.084322 systemd[1]: Started cri-containerd-4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3.scope. Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit: BPF prog-id=187 op=LOAD Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5384 pid=5393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323061346665323237636431613230383139633339633862623661 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5384 pid=5393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323061346665323237636431613230383139633339633862623661 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit: BPF prog-id=188 op=LOAD Feb 13 04:59:04.089000 audit[5393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000381d90 items=0 ppid=5384 pid=5393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323061346665323237636431613230383139633339633862623661 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit: BPF prog-id=189 op=LOAD Feb 13 04:59:04.089000 audit[5393]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000381dd8 items=0 ppid=5384 pid=5393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323061346665323237636431613230383139633339633862623661 Feb 13 04:59:04.089000 audit: BPF prog-id=189 op=UNLOAD Feb 13 04:59:04.089000 audit: BPF prog-id=188 op=UNLOAD Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { perfmon } for pid=5393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit[5393]: AVC avc: denied { bpf } for pid=5393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:04.089000 audit: BPF prog-id=190 op=LOAD Feb 13 04:59:04.089000 audit[5393]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f81e8 items=0 ppid=5384 pid=5393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438323061346665323237636431613230383139633339633862623661 Feb 13 04:59:04.106959 env[1479]: time="2024-02-13T04:59:04.106933917Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c9dc97947-f4b9t,Uid:1ab93040-1c4e-4263-aee5-c027620a8eba,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3\"" Feb 13 04:59:05.201691 systemd-networkd[1317]: cali43a2c490936: Gained IPv6LL Feb 13 04:59:05.714668 systemd-networkd[1317]: calid38d02bed12: Gained IPv6LL Feb 13 04:59:10.895000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:10.938797 kernel: kauditd_printk_skb: 165 callbacks suppressed Feb 13 04:59:10.938882 kernel: audit: type=1400 audit(1707800350.895:1390): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:10.895000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000773d40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:11.146216 kernel: audit: type=1300 audit(1707800350.895:1390): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000773d40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:11.146272 kernel: audit: type=1327 audit(1707800350.895:1390): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:10.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:10.895000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.326188 kernel: audit: type=1400 audit(1707800350.895:1391): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.326259 kernel: audit: type=1300 audit(1707800350.895:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f5f560 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:10.895000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f5f560 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:11.443354 kernel: audit: type=1327 audit(1707800350.895:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:10.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:11.534162 kernel: audit: type=1400 audit(1707800351.196:1392): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.196000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.622856 kernel: audit: type=1400 audit(1707800351.196:1393): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.196000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.196000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.799824 kernel: audit: type=1400 audit(1707800351.196:1394): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.799902 kernel: audit: type=1300 audit(1707800351.196:1394): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0082f5aa0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.196000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0082f5aa0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.196000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0052606a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:59:11.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:59:11.196000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c008186720 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:59:11.206000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.206000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0063300f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:59:11.206000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.206000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c008315ce0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:59:11.206000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:11.206000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c008e3a3c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 04:59:11.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 04:59:15.528313 env[1479]: time="2024-02-13T04:59:15.528286584Z" level=info msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.547 [WARNING][5442] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0", GenerateName:"calico-kube-controllers-5445dfb9f4-", Namespace:"calico-system", SelfLink:"", UID:"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5445dfb9f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262", Pod:"calico-kube-controllers-5445dfb9f4-lpwfr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.126.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6a22e4e2fcf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.547 [INFO][5442] k8s.go 578: Cleaning up netns ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.547 [INFO][5442] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" iface="eth0" netns="" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.547 [INFO][5442] k8s.go 585: Releasing IP address(es) ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.547 [INFO][5442] utils.go 188: Calico CNI releasing IP address ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.557 [INFO][5459] ipam_plugin.go 415: Releasing address using handleID ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.557 [INFO][5459] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.557 [INFO][5459] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.561 [WARNING][5459] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.561 [INFO][5459] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.562 [INFO][5459] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.563924 env[1479]: 2024-02-13 04:59:15.563 [INFO][5442] k8s.go 591: Teardown processing complete. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.564258 env[1479]: time="2024-02-13T04:59:15.563940659Z" level=info msg="TearDown network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" successfully" Feb 13 04:59:15.564258 env[1479]: time="2024-02-13T04:59:15.563961663Z" level=info msg="StopPodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" returns successfully" Feb 13 04:59:15.564306 env[1479]: time="2024-02-13T04:59:15.564288167Z" level=info msg="RemovePodSandbox for \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" Feb 13 04:59:15.564326 env[1479]: time="2024-02-13T04:59:15.564307286Z" level=info msg="Forcibly stopping sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\"" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.582 [WARNING][5488] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0", GenerateName:"calico-kube-controllers-5445dfb9f4-", Namespace:"calico-system", SelfLink:"", UID:"7c109c4b-9729-4b47-8ab3-bc6ca5fc5a0b", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5445dfb9f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"c4a76a6a46c60cb2ba41f060e2a8c58225d7e9b0140d9d2a5f405a4ede60d262", Pod:"calico-kube-controllers-5445dfb9f4-lpwfr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.126.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6a22e4e2fcf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.582 [INFO][5488] k8s.go 578: Cleaning up netns ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.582 [INFO][5488] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" iface="eth0" netns="" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.582 [INFO][5488] k8s.go 585: Releasing IP address(es) ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.582 [INFO][5488] utils.go 188: Calico CNI releasing IP address ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.591 [INFO][5505] ipam_plugin.go 415: Releasing address using handleID ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.592 [INFO][5505] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.592 [INFO][5505] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.597 [WARNING][5505] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.597 [INFO][5505] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" HandleID="k8s-pod-network.eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Workload="ci--3510.3.2--a--01dc72b3af-k8s-calico--kube--controllers--5445dfb9f4--lpwfr-eth0" Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.598 [INFO][5505] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.599809 env[1479]: 2024-02-13 04:59:15.599 [INFO][5488] k8s.go 591: Teardown processing complete. ContainerID="eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570" Feb 13 04:59:15.599809 env[1479]: time="2024-02-13T04:59:15.599788880Z" level=info msg="TearDown network for sandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" successfully" Feb 13 04:59:15.601250 env[1479]: time="2024-02-13T04:59:15.601237541Z" level=info msg="RemovePodSandbox \"eea6ed26526344f0240e327a0e1c0fc5b541af67965bfbbe1957fab6bb752570\" returns successfully" Feb 13 04:59:15.601575 env[1479]: time="2024-02-13T04:59:15.601530851Z" level=info msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.619 [WARNING][5533] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"35689c7e-ec6f-4b92-8517-00414ddc12f4", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e", Pod:"coredns-5d78c9869d-8kcl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ffd08045b1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.619 [INFO][5533] k8s.go 578: Cleaning up netns ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.619 [INFO][5533] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" iface="eth0" netns="" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.619 [INFO][5533] k8s.go 585: Releasing IP address(es) ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.619 [INFO][5533] utils.go 188: Calico CNI releasing IP address ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.629 [INFO][5551] ipam_plugin.go 415: Releasing address using handleID ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.629 [INFO][5551] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.629 [INFO][5551] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.634 [WARNING][5551] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.634 [INFO][5551] ipam_plugin.go 443: Releasing address using workloadID ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.635 [INFO][5551] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.636288 env[1479]: 2024-02-13 04:59:15.635 [INFO][5533] k8s.go 591: Teardown processing complete. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.636722 env[1479]: time="2024-02-13T04:59:15.636302992Z" level=info msg="TearDown network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" successfully" Feb 13 04:59:15.636722 env[1479]: time="2024-02-13T04:59:15.636319149Z" level=info msg="StopPodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" returns successfully" Feb 13 04:59:15.636722 env[1479]: time="2024-02-13T04:59:15.636549260Z" level=info msg="RemovePodSandbox for \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" Feb 13 04:59:15.636722 env[1479]: time="2024-02-13T04:59:15.636570691Z" level=info msg="Forcibly stopping sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\"" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.653 [WARNING][5583] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"35689c7e-ec6f-4b92-8517-00414ddc12f4", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"2ab1395e038bb7cb59b3e8c19cfc4c5a59652f600c79610540d4389e924c995e", Pod:"coredns-5d78c9869d-8kcl5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4ffd08045b1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.654 [INFO][5583] k8s.go 578: Cleaning up netns ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.654 [INFO][5583] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" iface="eth0" netns="" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.654 [INFO][5583] k8s.go 585: Releasing IP address(es) ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.654 [INFO][5583] utils.go 188: Calico CNI releasing IP address ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.663 [INFO][5595] ipam_plugin.go 415: Releasing address using handleID ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.663 [INFO][5595] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.663 [INFO][5595] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.667 [WARNING][5595] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.667 [INFO][5595] ipam_plugin.go 443: Releasing address using workloadID ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" HandleID="k8s-pod-network.43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--8kcl5-eth0" Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.668 [INFO][5595] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.669655 env[1479]: 2024-02-13 04:59:15.669 [INFO][5583] k8s.go 591: Teardown processing complete. ContainerID="43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa" Feb 13 04:59:15.669968 env[1479]: time="2024-02-13T04:59:15.669671674Z" level=info msg="TearDown network for sandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" successfully" Feb 13 04:59:15.671190 env[1479]: time="2024-02-13T04:59:15.671150929Z" level=info msg="RemovePodSandbox \"43abe9e92dbe3b94be660206e335777781ef747bf543c060f0e97a426b7a85fa\" returns successfully" Feb 13 04:59:15.671419 env[1479]: time="2024-02-13T04:59:15.671382888Z" level=info msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.689 [WARNING][5625] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91f90690-897e-4df1-979a-b43047e67f6d", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205", Pod:"csi-node-driver-2c97r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali513c15b4467", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.689 [INFO][5625] k8s.go 578: Cleaning up netns ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.689 [INFO][5625] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" iface="eth0" netns="" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.689 [INFO][5625] k8s.go 585: Releasing IP address(es) ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.689 [INFO][5625] utils.go 188: Calico CNI releasing IP address ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.698 [INFO][5640] ipam_plugin.go 415: Releasing address using handleID ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.698 [INFO][5640] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.698 [INFO][5640] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.702 [WARNING][5640] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.702 [INFO][5640] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.704 [INFO][5640] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.705240 env[1479]: 2024-02-13 04:59:15.704 [INFO][5625] k8s.go 591: Teardown processing complete. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.705616 env[1479]: time="2024-02-13T04:59:15.705258273Z" level=info msg="TearDown network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" successfully" Feb 13 04:59:15.705616 env[1479]: time="2024-02-13T04:59:15.705278582Z" level=info msg="StopPodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" returns successfully" Feb 13 04:59:15.705616 env[1479]: time="2024-02-13T04:59:15.705557763Z" level=info msg="RemovePodSandbox for \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" Feb 13 04:59:15.705616 env[1479]: time="2024-02-13T04:59:15.705578614Z" level=info msg="Forcibly stopping sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\"" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.723 [WARNING][5673] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91f90690-897e-4df1-979a-b43047e67f6d", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205", Pod:"csi-node-driver-2c97r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali513c15b4467", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.723 [INFO][5673] k8s.go 578: Cleaning up netns ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.723 [INFO][5673] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" iface="eth0" netns="" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.723 [INFO][5673] k8s.go 585: Releasing IP address(es) ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.723 [INFO][5673] utils.go 188: Calico CNI releasing IP address ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.733 [INFO][5689] ipam_plugin.go 415: Releasing address using handleID ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.733 [INFO][5689] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.733 [INFO][5689] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.737 [WARNING][5689] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.737 [INFO][5689] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" HandleID="k8s-pod-network.0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Workload="ci--3510.3.2--a--01dc72b3af-k8s-csi--node--driver--2c97r-eth0" Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.738 [INFO][5689] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.739790 env[1479]: 2024-02-13 04:59:15.739 [INFO][5673] k8s.go 591: Teardown processing complete. ContainerID="0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661" Feb 13 04:59:15.740113 env[1479]: time="2024-02-13T04:59:15.739794721Z" level=info msg="TearDown network for sandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" successfully" Feb 13 04:59:15.741236 env[1479]: time="2024-02-13T04:59:15.741223110Z" level=info msg="RemovePodSandbox \"0ffa15c59256ebea9d18b2f7ff979ccfc109f8af5ab433be335c2f9fd8536661\" returns successfully" Feb 13 04:59:15.741539 env[1479]: time="2024-02-13T04:59:15.741523173Z" level=info msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.760 [WARNING][5716] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"39394708-2484-42e0-a8ca-54c653f419f6", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825", Pod:"coredns-5d78c9869d-vbk6c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc78cce70ae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.760 [INFO][5716] k8s.go 578: Cleaning up netns ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.760 [INFO][5716] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" iface="eth0" netns="" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.760 [INFO][5716] k8s.go 585: Releasing IP address(es) ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.760 [INFO][5716] utils.go 188: Calico CNI releasing IP address ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.770 [INFO][5730] ipam_plugin.go 415: Releasing address using handleID ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.770 [INFO][5730] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.770 [INFO][5730] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.775 [WARNING][5730] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.775 [INFO][5730] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.776 [INFO][5730] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.778929 env[1479]: 2024-02-13 04:59:15.778 [INFO][5716] k8s.go 591: Teardown processing complete. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.778929 env[1479]: time="2024-02-13T04:59:15.778910829Z" level=info msg="TearDown network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" successfully" Feb 13 04:59:15.779254 env[1479]: time="2024-02-13T04:59:15.778930258Z" level=info msg="StopPodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" returns successfully" Feb 13 04:59:15.779254 env[1479]: time="2024-02-13T04:59:15.779200585Z" level=info msg="RemovePodSandbox for \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" Feb 13 04:59:15.779254 env[1479]: time="2024-02-13T04:59:15.779218335Z" level=info msg="Forcibly stopping sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\"" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.797 [WARNING][5763] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"39394708-2484-42e0-a8ca-54c653f419f6", ResourceVersion:"822", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 4, 57, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-01dc72b3af", ContainerID:"3d6b71957e2627fbcf4ef696753e458d96d71a119a867fa1f3d2f1df96db6825", Pod:"coredns-5d78c9869d-vbk6c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.126.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califc78cce70ae", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.797 [INFO][5763] k8s.go 578: Cleaning up netns ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.797 [INFO][5763] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" iface="eth0" netns="" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.797 [INFO][5763] k8s.go 585: Releasing IP address(es) ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.797 [INFO][5763] utils.go 188: Calico CNI releasing IP address ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.807 [INFO][5776] ipam_plugin.go 415: Releasing address using handleID ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.807 [INFO][5776] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.807 [INFO][5776] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.811 [WARNING][5776] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.811 [INFO][5776] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" HandleID="k8s-pod-network.acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Workload="ci--3510.3.2--a--01dc72b3af-k8s-coredns--5d78c9869d--vbk6c-eth0" Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.812 [INFO][5776] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 04:59:15.813794 env[1479]: 2024-02-13 04:59:15.813 [INFO][5763] k8s.go 591: Teardown processing complete. ContainerID="acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1" Feb 13 04:59:15.813794 env[1479]: time="2024-02-13T04:59:15.813774284Z" level=info msg="TearDown network for sandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" successfully" Feb 13 04:59:15.815170 env[1479]: time="2024-02-13T04:59:15.815128218Z" level=info msg="RemovePodSandbox \"acd3d0319cbcb837518681a13053158c02a2621428b16926852fcd6f0252c6c1\" returns successfully" Feb 13 04:59:20.720569 env[1479]: time="2024-02-13T04:59:20.720545230Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:20.721107 env[1479]: time="2024-02-13T04:59:20.721094279Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:20.722113 env[1479]: time="2024-02-13T04:59:20.722101496Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:20.723068 env[1479]: time="2024-02-13T04:59:20.723025346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:20.723527 env[1479]: time="2024-02-13T04:59:20.723489854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 13 04:59:20.723826 env[1479]: time="2024-02-13T04:59:20.723775221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 13 04:59:20.724343 env[1479]: time="2024-02-13T04:59:20.724329797Z" level=info msg="CreateContainer within sandbox \"3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 13 04:59:20.728276 env[1479]: time="2024-02-13T04:59:20.728226538Z" level=info msg="CreateContainer within sandbox \"3b1bb81556161b0c09711bb5576c81df5b1bd6f430e8b815720fca97ebd7d1d8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1773b66474e7f6a9ce24d35103718c1ec8b8572934ae28c3a41a81cc68078757\"" Feb 13 04:59:20.728494 env[1479]: time="2024-02-13T04:59:20.728447690Z" level=info msg="StartContainer for \"1773b66474e7f6a9ce24d35103718c1ec8b8572934ae28c3a41a81cc68078757\"" Feb 13 04:59:20.738929 systemd[1]: Started cri-containerd-1773b66474e7f6a9ce24d35103718c1ec8b8572934ae28c3a41a81cc68078757.scope. Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.770466 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 04:59:20.770668 kernel: audit: type=1400 audit(1707800360.743:1398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.894320 kernel: audit: type=1400 audit(1707800360.743:1399): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.894369 kernel: audit: type=1400 audit(1707800360.743:1400): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.956230 kernel: audit: type=1400 audit(1707800360.743:1401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.080774 kernel: audit: type=1400 audit(1707800360.743:1402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.080815 kernel: audit: type=1400 audit(1707800360.743:1403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.143759 kernel: audit: type=1400 audit(1707800360.743:1404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.208052 kernel: audit: type=1400 audit(1707800360.743:1405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.272652 kernel: audit: type=1400 audit(1707800360.743:1406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.336903 kernel: audit: type=1400 audit(1707800360.830:1407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.830000 audit: BPF prog-id=191 op=LOAD Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=5309 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:20.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373362363634373465376636613963653234643335313033373138 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=5309 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:20.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373362363634373465376636613963653234643335313033373138 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.831000 audit: BPF prog-id=192 op=LOAD Feb 13 04:59:20.831000 audit[5803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a29d0 items=0 ppid=5309 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:20.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373362363634373465376636613963653234643335313033373138 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:20.954000 audit: BPF prog-id=193 op=LOAD Feb 13 04:59:20.954000 audit[5803]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a2a18 items=0 ppid=5309 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:20.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373362363634373465376636613963653234643335313033373138 Feb 13 04:59:21.079000 audit: BPF prog-id=193 op=UNLOAD Feb 13 04:59:21.079000 audit: BPF prog-id=192 op=UNLOAD Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { perfmon } for pid=5803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit[5803]: AVC avc: denied { bpf } for pid=5803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:21.079000 audit: BPF prog-id=194 op=LOAD Feb 13 04:59:21.079000 audit[5803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a2e28 items=0 ppid=5309 pid=5803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:21.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137373362363634373465376636613963653234643335313033373138 Feb 13 04:59:21.416898 env[1479]: time="2024-02-13T04:59:21.416868282Z" level=info msg="StartContainer for \"1773b66474e7f6a9ce24d35103718c1ec8b8572934ae28c3a41a81cc68078757\" returns successfully" Feb 13 04:59:21.753000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 04:59:21.753000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000daaca0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 04:59:21.753000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 04:59:21.961021 kubelet[2589]: I0213 04:59:21.960971 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c9dc97947-sgmbn" podStartSLOduration=3.313291817 podCreationTimestamp="2024-02-13 04:59:02 +0000 UTC" firstStartedPulling="2024-02-13 04:59:04.07609261 +0000 UTC m=+108.601700832" lastFinishedPulling="2024-02-13 04:59:20.723667224 +0000 UTC m=+125.249275450" observedRunningTime="2024-02-13 04:59:21.960510822 +0000 UTC m=+126.486119137" watchObservedRunningTime="2024-02-13 04:59:21.960866435 +0000 UTC m=+126.486474703" Feb 13 04:59:21.985000 audit[5892]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=5892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:21.985000 audit[5892]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff6973cf20 a2=0 a3=7fff6973cf0c items=0 ppid=2861 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:21.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:21.987000 audit[5892]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=5892 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:21.987000 audit[5892]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff6973cf20 a2=0 a3=7fff6973cf0c items=0 ppid=2861 pid=5892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:21.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:24.364000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:24.364000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c66c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:24.364000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:24.365000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:24.365000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8ab20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:24.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:24.368000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:24.368000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e05d40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:24.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 04:59:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c6b60 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 04:59:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 04:59:25.902815 env[1479]: time="2024-02-13T04:59:25.902758211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:25.903387 env[1479]: time="2024-02-13T04:59:25.903351737Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:25.904204 env[1479]: time="2024-02-13T04:59:25.904136806Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:25.905086 env[1479]: time="2024-02-13T04:59:25.905027674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:25.905404 env[1479]: time="2024-02-13T04:59:25.905367482Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 13 04:59:25.905773 env[1479]: time="2024-02-13T04:59:25.905745583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 13 04:59:25.906562 env[1479]: time="2024-02-13T04:59:25.906519855Z" level=info msg="CreateContainer within sandbox \"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 13 04:59:25.911327 env[1479]: time="2024-02-13T04:59:25.911286330Z" level=info msg="CreateContainer within sandbox \"d73144f31e67d61a1a28f19749aa9f945a251c93f75a3abd4eb0a87ce641a205\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"45f2bf31602fb7f837ba660f8642809462f4f7920825e5c0a0948e34e9c1f788\"" Feb 13 04:59:25.911643 env[1479]: time="2024-02-13T04:59:25.911596848Z" level=info msg="StartContainer for \"45f2bf31602fb7f837ba660f8642809462f4f7920825e5c0a0948e34e9c1f788\"" Feb 13 04:59:25.922210 systemd[1]: Started cri-containerd-45f2bf31602fb7f837ba660f8642809462f4f7920825e5c0a0948e34e9c1f788.scope. Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.956533 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 13 04:59:25.956581 kernel: audit: type=1400 audit(1707800365.928:1423): avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7a91e45aa8 items=0 ppid=4819 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.118774 kernel: audit: type=1300 audit(1707800365.928:1423): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7a91e45aa8 items=0 ppid=4819 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.118807 kernel: audit: type=1327 audit(1707800365.928:1423): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663262663331363032666237663833376261363630663836343238 Feb 13 04:59:25.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663262663331363032666237663833376261363630663836343238 Feb 13 04:59:26.212674 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.275798 env[1479]: time="2024-02-13T04:59:26.275728051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:26.276444 env[1479]: time="2024-02-13T04:59:26.276401881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:26.276533 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.277360 env[1479]: time="2024-02-13T04:59:26.277346581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:26.278209 env[1479]: time="2024-02-13T04:59:26.278197025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 04:59:26.278967 env[1479]: time="2024-02-13T04:59:26.278951151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 13 04:59:26.279724 env[1479]: time="2024-02-13T04:59:26.279709300Z" level=info msg="CreateContainer within sandbox \"4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.340513 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.406261 env[1479]: time="2024-02-13T04:59:26.406240990Z" level=info msg="CreateContainer within sandbox \"4820a4fe227cd1a20819c39c8bb6a1eb52b9ec65e6d6a64a8c762398ce65aea3\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"dd6616409d136e5c5dcc4c91f64b1d48a66757e1ceca5677ce8a4f163c6922d9\"" Feb 13 04:59:26.406522 env[1479]: time="2024-02-13T04:59:26.406507595Z" level=info msg="StartContainer for \"dd6616409d136e5c5dcc4c91f64b1d48a66757e1ceca5677ce8a4f163c6922d9\"" Feb 13 04:59:26.413839 systemd[1]: Started cri-containerd-dd6616409d136e5c5dcc4c91f64b1d48a66757e1ceca5677ce8a4f163c6922d9.scope. Feb 13 04:59:26.468922 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.469002 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.473960 env[1479]: time="2024-02-13T04:59:26.473935910Z" level=info msg="StartContainer for \"45f2bf31602fb7f837ba660f8642809462f4f7920825e5c0a0948e34e9c1f788\" returns successfully" Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.597913 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.598009 kernel: audit: type=1400 audit(1707800365.928:1424): avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.622826 kubelet[2589]: I0213 04:59:26.622815 2589 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 13 04:59:26.622991 kubelet[2589]: I0213 04:59:26.622834 2589 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:25.928000 audit: BPF prog-id=195 op=LOAD Feb 13 04:59:25.928000 audit[5927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ba8 items=0 ppid=4819 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:25.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663262663331363032666237663833376261363630663836343238 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.020000 audit: BPF prog-id=196 op=LOAD Feb 13 04:59:26.020000 audit[5927]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7bf8 items=0 ppid=4819 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663262663331363032666237663833376261363630663836343238 Feb 13 04:59:26.212000 audit: BPF prog-id=196 op=UNLOAD Feb 13 04:59:26.212000 audit: BPF prog-id=195 op=UNLOAD Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { perfmon } for pid=5927 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit[5927]: AVC avc: denied { bpf } for pid=5927 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.212000 audit: BPF prog-id=197 op=LOAD Feb 13 04:59:26.212000 audit[5927]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c88 items=0 ppid=4819 pid=5927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435663262663331363032666237663833376261363630663836343238 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit: BPF prog-id=198 op=LOAD Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5384 pid=5950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363631363430396431333665356335646363346339316636346231 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5384 pid=5950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363631363430396431333665356335646363346339316636346231 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit: BPF prog-id=199 op=LOAD Feb 13 04:59:26.662000 audit[5950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e9d10 items=0 ppid=5384 pid=5950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363631363430396431333665356335646363346339316636346231 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit: BPF prog-id=200 op=LOAD Feb 13 04:59:26.662000 audit[5950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e9d58 items=0 ppid=5384 pid=5950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363631363430396431333665356335646363346339316636346231 Feb 13 04:59:26.662000 audit: BPF prog-id=200 op=UNLOAD Feb 13 04:59:26.662000 audit: BPF prog-id=199 op=UNLOAD Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { perfmon } for pid=5950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit[5950]: AVC avc: denied { bpf } for pid=5950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 04:59:26.662000 audit: BPF prog-id=201 op=LOAD Feb 13 04:59:26.662000 audit[5950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2168 items=0 ppid=5384 pid=5950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464363631363430396431333665356335646363346339316636346231 Feb 13 04:59:26.691822 env[1479]: time="2024-02-13T04:59:26.691755468Z" level=info msg="StartContainer for \"dd6616409d136e5c5dcc4c91f64b1d48a66757e1ceca5677ce8a4f163c6922d9\" returns successfully" Feb 13 04:59:26.960000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 04:59:26.960000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b18540 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 04:59:26.960000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 04:59:26.972165 kubelet[2589]: I0213 04:59:26.972137 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2c97r" podStartSLOduration=77.799979494 podCreationTimestamp="2024-02-13 04:57:33 +0000 UTC" firstStartedPulling="2024-02-13 04:58:49.73348173 +0000 UTC m=+94.259089951" lastFinishedPulling="2024-02-13 04:59:25.905595135 +0000 UTC m=+130.431203360" observedRunningTime="2024-02-13 04:59:26.971037844 +0000 UTC m=+131.496646088" watchObservedRunningTime="2024-02-13 04:59:26.972092903 +0000 UTC m=+131.497701142" Feb 13 04:59:26.980793 kubelet[2589]: I0213 04:59:26.980767 2589 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c9dc97947-f4b9t" podStartSLOduration=2.809179891 podCreationTimestamp="2024-02-13 04:59:02 +0000 UTC" firstStartedPulling="2024-02-13 04:59:04.107499398 +0000 UTC m=+108.633107621" lastFinishedPulling="2024-02-13 04:59:26.279044319 +0000 UTC m=+130.804652544" observedRunningTime="2024-02-13 04:59:26.980081006 +0000 UTC m=+131.505689258" watchObservedRunningTime="2024-02-13 04:59:26.980724814 +0000 UTC m=+131.506333050" Feb 13 04:59:26.991000 audit[6009]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=6009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:26.991000 audit[6009]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffee393e70 a2=0 a3=7fffee393e5c items=0 ppid=2861 pid=6009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:26.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:27.008000 audit[6009]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=6009 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:27.008000 audit[6009]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffee393e70 a2=0 a3=7fffee393e5c items=0 ppid=2861 pid=6009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:27.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:33.941700 systemd[1]: run-containerd-runc-k8s.io-1773b66474e7f6a9ce24d35103718c1ec8b8572934ae28c3a41a81cc68078757-runc.GAbO2h.mount: Deactivated successfully. Feb 13 04:59:33.989000 audit[6052]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=6052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:34.017517 kernel: kauditd_printk_skb: 99 callbacks suppressed Feb 13 04:59:34.017610 kernel: audit: type=1325 audit(1707800373.989:1450): table=filter:123 family=2 entries=9 op=nft_register_rule pid=6052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:33.989000 audit[6052]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffddb9fdfe0 a2=0 a3=7ffddb9fdfcc items=0 ppid=2861 pid=6052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.175368 kernel: audit: type=1300 audit(1707800373.989:1450): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffddb9fdfe0 a2=0 a3=7ffddb9fdfcc items=0 ppid=2861 pid=6052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.175437 kernel: audit: type=1327 audit(1707800373.989:1450): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:33.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:33.990000 audit[6052]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=6052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:33.990000 audit[6052]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7ffddb9fdfe0 a2=0 a3=7ffddb9fdfcc items=0 ppid=2861 pid=6052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.392782 kernel: audit: type=1325 audit(1707800373.990:1451): table=nat:124 family=2 entries=27 op=nft_register_chain pid=6052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:34.392815 kernel: audit: type=1300 audit(1707800373.990:1451): arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7ffddb9fdfe0 a2=0 a3=7ffddb9fdfcc items=0 ppid=2861 pid=6052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.392832 kernel: audit: type=1327 audit(1707800373.990:1451): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:33.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:34.237000 audit[6055]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=6055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:34.237000 audit[6055]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdbfb9c240 a2=0 a3=7ffdbfb9c22c items=0 ppid=2861 pid=6055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.612581 kernel: audit: type=1325 audit(1707800374.237:1452): table=filter:125 family=2 entries=8 op=nft_register_rule pid=6055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:34.612619 kernel: audit: type=1300 audit(1707800374.237:1452): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdbfb9c240 a2=0 a3=7ffdbfb9c22c items=0 ppid=2861 pid=6055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.612636 kernel: audit: type=1327 audit(1707800374.237:1452): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:34.237000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:34.454000 audit[6055]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=6055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 04:59:34.454000 audit[6055]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffdbfb9c240 a2=0 a3=7ffdbfb9c22c items=0 ppid=2861 pid=6055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 04:59:34.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 04:59:34.732443 kernel: audit: type=1325 audit(1707800374.454:1453): table=nat:126 family=2 entries=34 op=nft_register_chain pid=6055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 05:00:09.931738 systemd[1]: Started sshd@11-139.178.90.239:22-218.92.0.76:38823.service. Feb 13 05:00:09.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.239:22-218.92.0.76:38823 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:09.959373 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 05:00:09.959546 kernel: audit: type=1130 audit(1707800409.931:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.239:22-218.92.0.76:38823 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:10.896000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:10.896000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00002da00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:10.988515 kernel: audit: type=1400 audit(1707800410.896:1455): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:10.988574 kernel: audit: type=1300 audit(1707800410.896:1455): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00002da00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:10.896000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:11.205357 kernel: audit: type=1327 audit(1707800410.896:1455): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:11.205420 kernel: audit: type=1400 audit(1707800410.897:1456): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:10.897000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.297330 kernel: audit: type=1300 audit(1707800410.897:1456): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00309ef30 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:10.897000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00309ef30 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:11.338671 sshd[6159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:11.417755 kernel: audit: type=1327 audit(1707800410.897:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:10.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.601461 kernel: audit: type=1400 audit(1707800411.199:1457): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.601496 kernel: audit: type=1300 audit(1707800411.199:1457): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00abd1a60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00abd1a60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.700026 kernel: audit: type=1327 audit(1707800411.199:1457): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007d59f50 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ac7c510 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009b1d440 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009b1d470 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c005ef7ae0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:00:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:00:11.338000 audit[6159]: USER_AUTH pid=6159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:13.235705 sshd[6159]: Failed password for root from 218.92.0.76 port 38823 ssh2 Feb 13 05:00:14.551000 audit[6159]: USER_AUTH pid=6159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:16.192825 sshd[6159]: Failed password for root from 218.92.0.76 port 38823 ssh2 Feb 13 05:00:17.762000 audit[6159]: USER_AUTH pid=6159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:17.789556 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 13 05:00:17.789626 kernel: audit: type=1100 audit(1707800417.762:1465): pid=6159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:20.152096 sshd[6159]: Failed password for root from 218.92.0.76 port 38823 ssh2 Feb 13 05:00:20.973679 sshd[6159]: Received disconnect from 218.92.0.76 port 38823:11: [preauth] Feb 13 05:00:20.973679 sshd[6159]: Disconnected from authenticating user root 218.92.0.76 port 38823 [preauth] Feb 13 05:00:20.974230 sshd[6159]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:20.976240 systemd[1]: sshd@11-139.178.90.239:22-218.92.0.76:38823.service: Deactivated successfully. Feb 13 05:00:20.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.239:22-218.92.0.76:38823 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.068533 kernel: audit: type=1131 audit(1707800420.976:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.239:22-218.92.0.76:38823 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.123622 systemd[1]: Started sshd@12-139.178.90.239:22-218.92.0.76:52472.service. Feb 13 05:00:21.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.239:22-218.92.0.76:52472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.213634 kernel: audit: type=1130 audit(1707800421.123:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.239:22-218.92.0.76:52472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:21.753000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:00:21.753000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a44ae0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:00:21.945835 kernel: audit: type=1400 audit(1707800421.753:1468): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:00:21.945951 kernel: audit: type=1300 audit(1707800421.753:1468): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a44ae0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:00:21.945984 kernel: audit: type=1327 audit(1707800421.753:1468): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:00:21.753000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:00:22.165794 sshd[6183]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:22.165000 audit[6183]: USER_AUTH pid=6183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:22.263637 kernel: audit: type=1100 audit(1707800422.165:1469): pid=6183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:23.907905 sshd[6183]: Failed password for root from 218.92.0.76 port 52472 ssh2 Feb 13 05:00:24.366000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:24.366000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475000 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:24.587079 kernel: audit: type=1400 audit(1707800424.366:1470): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:24.587115 kernel: audit: type=1300 audit(1707800424.366:1470): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475000 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:24.587134 kernel: audit: type=1327 audit(1707800424.366:1470): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:24.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:24.680528 kernel: audit: type=1400 audit(1707800424.366:1471): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:24.366000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:24.770908 kernel: audit: type=1300 audit(1707800424.366:1471): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009fffe0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:24.366000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009fffe0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:24.891807 kernel: audit: type=1327 audit(1707800424.366:1471): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:24.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:24.985340 kernel: audit: type=1400 audit(1707800424.370:1472): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:24.370000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:25.075826 kernel: audit: type=1300 audit(1707800424.370:1472): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb7240 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:24.370000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb7240 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:25.197225 kernel: audit: type=1327 audit(1707800424.370:1472): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:24.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:25.365969 sshd[6183]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:00:25.382769 kernel: audit: type=1400 audit(1707800424.371:1473): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:00:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016227e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:00:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:00:25.365000 audit[6183]: ANOM_LOGIN_FAILURES pid=6183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:25.365000 audit[6183]: USER_AUTH pid=6183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:26.852243 sshd[6183]: Failed password for root from 218.92.0.76 port 52472 ssh2 Feb 13 05:00:26.961000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:00:26.961000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010a0fc0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:00:26.961000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:00:27.045000 audit[6183]: USER_AUTH pid=6183 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:28.807650 sshd[6183]: Failed password for root from 218.92.0.76 port 52472 ssh2 Feb 13 05:00:30.246836 sshd[6183]: Received disconnect from 218.92.0.76 port 52472:11: [preauth] Feb 13 05:00:30.246836 sshd[6183]: Disconnected from authenticating user root 218.92.0.76 port 52472 [preauth] Feb 13 05:00:30.247374 sshd[6183]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:30.249578 systemd[1]: sshd@12-139.178.90.239:22-218.92.0.76:52472.service: Deactivated successfully. Feb 13 05:00:30.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.239:22-218.92.0.76:52472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:30.277826 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 13 05:00:30.277865 kernel: audit: type=1131 audit(1707800430.248:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.239:22-218.92.0.76:52472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:30.444364 systemd[1]: Started sshd@13-139.178.90.239:22-218.92.0.76:61521.service. Feb 13 05:00:30.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.239:22-218.92.0.76:61521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:30.536652 kernel: audit: type=1130 audit(1707800430.443:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.239:22-218.92.0.76:61521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:31.517676 sshd[6256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:31.516000 audit[6256]: USER_AUTH pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:31.607447 kernel: audit: type=1100 audit(1707800431.516:1480): pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:33.494851 sshd[6256]: Failed password for root from 218.92.0.76 port 61521 ssh2 Feb 13 05:00:34.721000 audit[6256]: USER_AUTH pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:34.813581 kernel: audit: type=1100 audit(1707800434.721:1481): pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:36.444715 sshd[6256]: Failed password for root from 218.92.0.76 port 61521 ssh2 Feb 13 05:00:37.927000 audit[6256]: USER_AUTH pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:38.019614 kernel: audit: type=1100 audit(1707800437.927:1482): pid=6256 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.76 addr=218.92.0.76 terminal=ssh res=failed' Feb 13 05:00:39.730557 sshd[6256]: Failed password for root from 218.92.0.76 port 61521 ssh2 Feb 13 05:00:41.137977 sshd[6256]: Received disconnect from 218.92.0.76 port 61521:11: [preauth] Feb 13 05:00:41.137977 sshd[6256]: Disconnected from authenticating user root 218.92.0.76 port 61521 [preauth] Feb 13 05:00:41.138534 sshd[6256]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.76 user=root Feb 13 05:00:41.140681 systemd[1]: sshd@13-139.178.90.239:22-218.92.0.76:61521.service: Deactivated successfully. Feb 13 05:00:41.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.239:22-218.92.0.76:61521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:00:41.233639 kernel: audit: type=1131 audit(1707800441.140:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.239:22-218.92.0.76:61521 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:01:10.897000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:10.897000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018110c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:11.112079 kernel: audit: type=1400 audit(1707800470.897:1484): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.112153 kernel: audit: type=1300 audit(1707800470.897:1484): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018110c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:11.112191 kernel: audit: type=1327 audit(1707800470.897:1484): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:10.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:10.897000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.300371 kernel: audit: type=1400 audit(1707800470.897:1485): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.300504 kernel: audit: type=1300 audit(1707800470.897:1485): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cd3800 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:10.897000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001cd3800 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:10.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:11.515040 kernel: audit: type=1327 audit(1707800470.897:1485): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:11.515107 kernel: audit: type=1400 audit(1707800471.199:1486): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.697219 kernel: audit: type=1400 audit(1707800471.199:1487): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.697275 kernel: audit: type=1300 audit(1707800471.199:1487): arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0103844b0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0103844b0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ba6c630 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.895459 kernel: audit: type=1300 audit(1707800471.199:1486): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ba6c630 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:01:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:01:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c013f0e120 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:01:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c013f0e140 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:01:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e6de120 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:01:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008984e40 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:01:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:01:21.753000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:01:21.782396 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:01:21.782482 kernel: audit: type=1400 audit(1707800481.753:1492): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:01:21.753000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cca4a0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:01:21.977322 kernel: audit: type=1300 audit(1707800481.753:1492): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cca4a0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:01:21.977381 kernel: audit: type=1327 audit(1707800481.753:1492): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:01:21.753000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:01:24.365000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.365000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f6e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:24.584407 kernel: audit: type=1400 audit(1707800484.365:1493): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.584446 kernel: audit: type=1300 audit(1707800484.365:1493): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f6e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:24.584464 kernel: audit: type=1327 audit(1707800484.365:1493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:24.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:24.678540 kernel: audit: type=1400 audit(1707800484.365:1494): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.365000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.769460 kernel: audit: type=1300 audit(1707800484.365:1494): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001016640 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:24.365000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001016640 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:24.891211 kernel: audit: type=1327 audit(1707800484.365:1494): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:24.365000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:24.985402 kernel: audit: type=1400 audit(1707800484.369:1495): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.369000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.369000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fcdda0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:24.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:24.370000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:01:24.370000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001811700 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:01:24.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:01:26.961000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:01:27.008494 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:01:27.008581 kernel: audit: type=1400 audit(1707800486.961:1497): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:01:26.961000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010a1c80 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:01:27.201807 kernel: audit: type=1300 audit(1707800486.961:1497): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010a1c80 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:01:27.201895 kernel: audit: type=1327 audit(1707800486.961:1497): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:01:26.961000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:02:10.898000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:10.898000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.082337 kernel: audit: type=1400 audit(1707800530.898:1498): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.082394 kernel: audit: type=1400 audit(1707800530.898:1499): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.082414 kernel: audit: type=1300 audit(1707800530.898:1498): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000764420 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:10.898000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000764420 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:11.204248 kernel: audit: type=1327 audit(1707800530.898:1498): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:10.898000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:11.297939 kernel: audit: type=1300 audit(1707800530.898:1499): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011cc380 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:10.898000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011cc380 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:11.418520 kernel: audit: type=1327 audit(1707800530.898:1499): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:10.898000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:11.511794 kernel: audit: type=1400 audit(1707800531.199:1500): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.601953 kernel: audit: type=1300 audit(1707800531.199:1500): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0099ccc60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0099ccc60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.700506 kernel: audit: type=1400 audit(1707800531.199:1501): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.791816 kernel: audit: type=1327 audit(1707800531.199:1500): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00dacbf50 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009ec8ae0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009ec8c00 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0160211a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009248000 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:02:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:02:21.755000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:02:21.784016 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:02:21.784108 kernel: audit: type=1400 audit(1707800541.755:1506): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:02:21.755000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012f32c0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:02:21.878446 kernel: audit: type=1300 audit(1707800541.755:1506): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012f32c0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:02:21.755000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:02:22.071290 kernel: audit: type=1327 audit(1707800541.755:1506): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:02:24.367000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.367000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c7580 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:24.583007 kernel: audit: type=1400 audit(1707800544.367:1507): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.583042 kernel: audit: type=1300 audit(1707800544.367:1507): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c7580 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:24.583059 kernel: audit: type=1327 audit(1707800544.367:1507): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:24.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:24.676604 kernel: audit: type=1400 audit(1707800544.367:1508): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.367000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.767104 kernel: audit: type=1300 audit(1707800544.367:1508): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8a6a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:24.367000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8a6a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:24.887792 kernel: audit: type=1327 audit(1707800544.367:1508): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:24.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:24.981383 kernel: audit: type=1400 audit(1707800544.371:1509): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00116c040 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:24.372000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:02:24.372000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00116c060 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:02:24.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:02:26.963000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:02:26.991631 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:02:26.991687 kernel: audit: type=1400 audit(1707800546.963:1511): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:02:27.087464 kernel: audit: type=1300 audit(1707800546.963:1511): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b21600 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:02:26.963000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b21600 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:02:26.963000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:02:27.276914 kernel: audit: type=1327 audit(1707800546.963:1511): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:03:10.899000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:10.899000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001017500 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:11.118523 kernel: audit: type=1400 audit(1707800590.899:1512): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.118577 kernel: audit: type=1300 audit(1707800590.899:1512): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001017500 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:11.118595 kernel: audit: type=1327 audit(1707800590.899:1512): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:10.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:11.214128 kernel: audit: type=1400 audit(1707800590.899:1513): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:10.899000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.305688 kernel: audit: type=1300 audit(1707800590.899:1513): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015c9c20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:10.899000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015c9c20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:11.426377 kernel: audit: type=1327 audit(1707800590.899:1513): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:10.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:11.519766 kernel: audit: type=1400 audit(1707800591.199:1514): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008b59560 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.708427 kernel: audit: type=1300 audit(1707800591.199:1514): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008b59560 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.708462 kernel: audit: type=1327 audit(1707800591.199:1514): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:11.801676 kernel: audit: type=1400 audit(1707800591.199:1515): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00a12ccc0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0094029c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009dc7890 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009ae2560 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009dc78f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:03:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:03:21.756000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:03:21.799328 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:03:21.799414 kernel: audit: type=1400 audit(1707800601.756:1520): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:03:21.756000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003a4ac0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:03:21.991710 kernel: audit: type=1300 audit(1707800601.756:1520): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0003a4ac0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:03:21.991745 kernel: audit: type=1327 audit(1707800601.756:1520): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:03:21.756000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:03:24.368000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.368000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018106c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:24.583225 kernel: audit: type=1400 audit(1707800604.368:1521): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.583268 kernel: audit: type=1300 audit(1707800604.368:1521): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0018106c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:24.583286 kernel: audit: type=1327 audit(1707800604.368:1521): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:24.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:24.676482 kernel: audit: type=1400 audit(1707800604.368:1522): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.368000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.766527 kernel: audit: type=1300 audit(1707800604.368:1522): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a28e40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:24.368000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a28e40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:24.886995 kernel: audit: type=1327 audit(1707800604.368:1522): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:24.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:24.980301 kernel: audit: type=1400 audit(1707800604.371:1523): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a28e60 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:24.373000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:03:24.373000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bce00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:03:24.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:03:26.964000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:03:26.992324 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:03:26.992420 kernel: audit: type=1400 audit(1707800606.964:1525): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:03:26.964000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120bcc0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:03:27.182519 kernel: audit: type=1300 audit(1707800606.964:1525): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00120bcc0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:03:27.182606 kernel: audit: type=1327 audit(1707800606.964:1525): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:03:26.964000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:03:30.656017 systemd[1]: Started sshd@14-139.178.90.239:22-211.197.45.55:44395.service. Feb 13 05:03:30.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.239:22-211.197.45.55:44395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:30.747664 kernel: audit: type=1130 audit(1707800610.655:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.239:22-211.197.45.55:44395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:32.137647 sshd[6900]: Invalid user usr from 211.197.45.55 port 44395 Feb 13 05:03:32.143745 sshd[6900]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:32.144907 sshd[6900]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:03:32.144996 sshd[6900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.45.55 Feb 13 05:03:32.145920 sshd[6900]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:32.145000 audit[6900]: USER_AUTH pid=6900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="usr" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:32.237534 kernel: audit: type=1100 audit(1707800612.145:1527): pid=6900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="usr" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:34.304836 sshd[6900]: Failed password for invalid user usr from 211.197.45.55 port 44395 ssh2 Feb 13 05:03:35.607675 sshd[6900]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:35.608773 sshd[6900]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:03:35.609852 sshd[6900]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:35.609000 audit[6900]: USER_AUTH pid=6900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="usr" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:35.707468 kernel: audit: type=1100 audit(1707800615.609:1528): pid=6900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="usr" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:37.848425 sshd[6900]: Failed password for invalid user usr from 211.197.45.55 port 44395 ssh2 Feb 13 05:03:39.879938 sshd[6900]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:39.880981 sshd[6900]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:03:39.882137 sshd[6900]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:39.881000 audit[6900]: USER_AUTH pid=6900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="usr" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:39.973447 kernel: audit: type=1100 audit(1707800619.881:1529): pid=6900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="usr" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:42.336657 sshd[6900]: Failed password for invalid user usr from 211.197.45.55 port 44395 ssh2 Feb 13 05:03:43.511757 sshd[6900]: Connection closed by invalid user usr 211.197.45.55 port 44395 [preauth] Feb 13 05:03:43.512276 sshd[6900]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.45.55 Feb 13 05:03:43.514398 systemd[1]: sshd@14-139.178.90.239:22-211.197.45.55:44395.service: Deactivated successfully. Feb 13 05:03:43.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.239:22-211.197.45.55:44395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:43.606514 kernel: audit: type=1131 audit(1707800623.514:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.239:22-211.197.45.55:44395 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:43.637286 systemd[1]: Started sshd@15-139.178.90.239:22-211.197.45.55:44529.service. Feb 13 05:03:43.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.239:22-211.197.45.55:44529 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:43.727464 kernel: audit: type=1130 audit(1707800623.636:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.239:22-211.197.45.55:44529 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:45.613013 sshd[6945]: Invalid user support from 211.197.45.55 port 44529 Feb 13 05:03:45.618998 sshd[6945]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:45.619782 sshd[6945]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:03:45.619799 sshd[6945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.45.55 Feb 13 05:03:45.619992 sshd[6945]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:45.619000 audit[6945]: USER_AUTH pid=6945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:45.712647 kernel: audit: type=1100 audit(1707800625.619:1532): pid=6945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:47.230799 sshd[6945]: Failed password for invalid user support from 211.197.45.55 port 44529 ssh2 Feb 13 05:03:48.978536 sshd[6945]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:48.979489 sshd[6945]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:03:48.980491 sshd[6945]: pam_faillock(sshd:auth): User unknown Feb 13 05:03:48.980000 audit[6945]: USER_AUTH pid=6945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:49.072446 kernel: audit: type=1100 audit(1707800628.980:1533): pid=6945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="support" exe="/usr/sbin/sshd" hostname=211.197.45.55 addr=211.197.45.55 terminal=ssh res=failed' Feb 13 05:03:51.669852 sshd[6945]: Failed password for invalid user support from 211.197.45.55 port 44529 ssh2 Feb 13 05:03:53.552156 sshd[6945]: Connection closed by invalid user support 211.197.45.55 port 44529 [preauth] Feb 13 05:03:53.552677 sshd[6945]: PAM 1 more authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.197.45.55 Feb 13 05:03:53.554819 systemd[1]: sshd@15-139.178.90.239:22-211.197.45.55:44529.service: Deactivated successfully. Feb 13 05:03:53.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.239:22-211.197.45.55:44529 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:03:53.647654 kernel: audit: type=1131 audit(1707800633.554:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.90.239:22-211.197.45.55:44529 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:04:10.899000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:10.899000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d57860 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:11.119859 kernel: audit: type=1400 audit(1707800650.899:1535): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.119958 kernel: audit: type=1300 audit(1707800650.899:1535): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d57860 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:11.120005 kernel: audit: type=1327 audit(1707800650.899:1535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:10.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:10.899000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.308305 kernel: audit: type=1400 audit(1707800650.899:1536): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.308360 kernel: audit: type=1300 audit(1707800650.899:1536): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000773f00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:10.899000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000773f00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:10.899000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:11.524942 kernel: audit: type=1327 audit(1707800650.899:1536): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:11.525011 kernel: audit: type=1400 audit(1707800651.199:1537): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00aaa8030 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.716392 kernel: audit: type=1300 audit(1707800651.199:1537): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00aaa8030 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.716458 kernel: audit: type=1327 audit(1707800651.199:1537): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.902048 kernel: audit: type=1400 audit(1707800651.199:1538): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0043ec240 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007ffd020 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c006a8b160 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00aaa8180 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00970e930 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:04:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:04:21.757000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:04:21.802722 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:04:21.803156 kernel: audit: type=1400 audit(1707800661.757:1543): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:04:21.757000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012669e0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:04:21.898519 kernel: audit: type=1300 audit(1707800661.757:1543): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012669e0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:04:21.757000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:04:22.090468 kernel: audit: type=1327 audit(1707800661.757:1543): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:04:24.368000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:24.368000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f8c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:24.582689 kernel: audit: type=1400 audit(1707800664.368:1544): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:24.582737 kernel: audit: type=1300 audit(1707800664.368:1544): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f8c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:24.582755 kernel: audit: type=1327 audit(1707800664.368:1544): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:24.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:24.676095 kernel: audit: type=1400 audit(1707800664.368:1545): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:24.368000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:24.368000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c02040 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:24.886939 kernel: audit: type=1300 audit(1707800664.368:1545): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c02040 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:24.886976 kernel: audit: type=1327 audit(1707800664.368:1545): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:24.368000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:25.071169 kernel: audit: type=1400 audit(1707800664.371:1546): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e05b00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:24.373000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:04:24.373000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e05b20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:04:24.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:04:26.964000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:04:26.993499 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:04:26.993596 kernel: audit: type=1400 audit(1707800666.964:1548): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:04:26.964000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000431760 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:04:27.184147 kernel: audit: type=1300 audit(1707800666.964:1548): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000431760 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:04:27.184233 kernel: audit: type=1327 audit(1707800666.964:1548): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:04:26.964000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:05:10.900000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:10.900000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007657d0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:11.121189 kernel: audit: type=1400 audit(1707800710.900:1549): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.121238 kernel: audit: type=1300 audit(1707800710.900:1549): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007657d0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:11.121260 kernel: audit: type=1327 audit(1707800710.900:1549): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:10.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:11.214621 kernel: audit: type=1400 audit(1707800710.900:1550): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:10.900000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.305029 kernel: audit: type=1300 audit(1707800710.900:1550): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009fe100 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:10.900000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009fe100 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:11.427053 kernel: audit: type=1327 audit(1707800710.900:1550): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:10.900000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:11.521625 kernel: audit: type=1400 audit(1707800711.199:1551): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.614121 kernel: audit: type=1300 audit(1707800711.199:1551): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008473890 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008473890 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.712511 kernel: audit: type=1327 audit(1707800711.199:1551): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:11.805606 kernel: audit: type=1400 audit(1707800711.199:1552): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00dacb680 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:11.199000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.199000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009f09bc0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008187980 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008ccea20 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b8eb4d0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:05:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:05:21.758000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:05:21.790786 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:05:21.790890 kernel: audit: type=1400 audit(1707800721.758:1557): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:05:21.758000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00152c400 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:05:21.982619 kernel: audit: type=1300 audit(1707800721.758:1557): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00152c400 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:05:21.982750 kernel: audit: type=1327 audit(1707800721.758:1557): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:05:21.758000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:05:24.370000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.370000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a28aa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:24.585838 kernel: audit: type=1400 audit(1707800724.370:1558): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.585873 kernel: audit: type=1300 audit(1707800724.370:1558): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a28aa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:24.585889 kernel: audit: type=1327 audit(1707800724.370:1558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:24.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:24.680154 kernel: audit: type=1400 audit(1707800724.370:1559): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.370000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.770322 kernel: audit: type=1300 audit(1707800724.370:1559): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001016c40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:24.370000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001016c40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:24.890911 kernel: audit: type=1327 audit(1707800724.370:1559): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:24.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:24.984214 kernel: audit: type=1400 audit(1707800724.371:1560): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011ccf40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:24.374000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:05:24.374000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c7da0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:05:24.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:05:26.966000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:05:26.994171 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:05:26.994212 kernel: audit: type=1400 audit(1707800726.966:1562): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:05:26.966000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c43a40 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:05:27.186201 kernel: audit: type=1300 audit(1707800726.966:1562): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c43a40 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:05:27.186254 kernel: audit: type=1327 audit(1707800726.966:1562): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:05:26.966000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:05:46.262818 systemd[1]: Started sshd@16-139.178.90.239:22-141.98.11.11:63732.service. Feb 13 05:05:46.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.239:22-141.98.11.11:63732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:46.352560 kernel: audit: type=1130 audit(1707800746.262:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.239:22-141.98.11.11:63732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:47.595607 sshd[7373]: Invalid user admin from 141.98.11.11 port 63732 Feb 13 05:05:47.873395 sshd[7373]: pam_faillock(sshd:auth): User unknown Feb 13 05:05:47.874404 sshd[7373]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:05:47.874520 sshd[7373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.11.11 Feb 13 05:05:47.875354 sshd[7373]: pam_faillock(sshd:auth): User unknown Feb 13 05:05:47.875000 audit[7373]: USER_AUTH pid=7373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 05:05:47.971496 kernel: audit: type=1100 audit(1707800747.875:1564): pid=7373 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=141.98.11.11 addr=141.98.11.11 terminal=ssh res=failed' Feb 13 05:05:50.234842 sshd[7373]: Failed password for invalid user admin from 141.98.11.11 port 63732 ssh2 Feb 13 05:05:51.372553 sshd[7373]: Connection closed by invalid user admin 141.98.11.11 port 63732 [preauth] Feb 13 05:05:51.375072 systemd[1]: sshd@16-139.178.90.239:22-141.98.11.11:63732.service: Deactivated successfully. Feb 13 05:05:51.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.239:22-141.98.11.11:63732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:05:51.467501 kernel: audit: type=1131 audit(1707800751.374:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.90.239:22-141.98.11.11:63732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:06:10.901000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:10.901000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b6daa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:11.117956 kernel: audit: type=1400 audit(1707800770.901:1566): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.117997 kernel: audit: type=1300 audit(1707800770.901:1566): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b6daa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:11.118015 kernel: audit: type=1327 audit(1707800770.901:1566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:10.901000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:11.211271 kernel: audit: type=1400 audit(1707800770.901:1567): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:10.901000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.301422 kernel: audit: type=1300 audit(1707800770.901:1567): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bd980 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:10.901000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bd980 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:11.422120 kernel: audit: type=1327 audit(1707800770.901:1567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:10.901000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:11.515520 kernel: audit: type=1400 audit(1707800771.200:1568): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.200000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.606521 kernel: audit: type=1300 audit(1707800771.200:1568): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009cbf320 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.200000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009cbf320 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.704973 kernel: audit: type=1327 audit(1707800771.200:1568): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:11.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:11.798412 kernel: audit: type=1400 audit(1707800771.200:1569): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.200000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.200000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ab4e240 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:11.200000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.200000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008974ab0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:11.211000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.211000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c008974ae0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:11.211000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.211000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008974b10 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:11.211000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:11.211000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00757fbc0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:06:11.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:06:21.758000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:06:21.787410 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:06:21.787476 kernel: audit: type=1400 audit(1707800781.758:1574): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:06:21.758000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017d1ea0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:06:21.980989 kernel: audit: type=1300 audit(1707800781.758:1574): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0017d1ea0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:06:21.981022 kernel: audit: type=1327 audit(1707800781.758:1574): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:06:21.758000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:06:24.369000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.369000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.555679 kernel: audit: type=1400 audit(1707800784.369:1576): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.555714 kernel: audit: type=1400 audit(1707800784.369:1575): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.555734 kernel: audit: type=1300 audit(1707800784.369:1576): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fcd360 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:24.369000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fcd360 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:24.678038 kernel: audit: type=1300 audit(1707800784.369:1575): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb6d80 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:24.369000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb6d80 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:24.798680 kernel: audit: type=1327 audit(1707800784.369:1576): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:24.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:24.892241 kernel: audit: type=1327 audit(1707800784.369:1575): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:24.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:24.985516 kernel: audit: type=1400 audit(1707800784.374:1577): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.374000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.374000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014747a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:24.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:24.374000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:06:24.374000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0014747c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:06:24.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:06:26.967000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:06:27.012930 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:06:27.013023 kernel: audit: type=1400 audit(1707800786.967:1579): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:06:26.967000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1cd40 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:06:27.108510 kernel: audit: type=1300 audit(1707800786.967:1579): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1cd40 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:06:26.967000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:06:27.298950 kernel: audit: type=1327 audit(1707800786.967:1579): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:07:10.903000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:10.903000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.086060 kernel: audit: type=1400 audit(1707800830.903:1580): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.086121 kernel: audit: type=1400 audit(1707800830.903:1581): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.086141 kernel: audit: type=1300 audit(1707800830.903:1580): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8a520 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:10.903000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8a520 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:11.208073 kernel: audit: type=1300 audit(1707800830.903:1581): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d56750 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:10.903000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d56750 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:11.331370 kernel: audit: type=1327 audit(1707800830.903:1581): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:10.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:11.424846 kernel: audit: type=1327 audit(1707800830.903:1580): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:10.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:11.518070 kernel: audit: type=1400 audit(1707800831.202:1582): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.202000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.202000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007ff7720 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.706294 kernel: audit: type=1300 audit(1707800831.202:1582): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007ff7720 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.706331 kernel: audit: type=1327 audit(1707800831.202:1582): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:11.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:11.799161 kernel: audit: type=1400 audit(1707800831.202:1583): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.202000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.202000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0081865a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.202000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00994cc30 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:11.213000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.213000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.213000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0081867b0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.213000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00994cf00 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:11.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:11.213000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:11.213000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c01022efc0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:07:11.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:07:21.761000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:07:21.788707 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:07:21.788746 kernel: audit: type=1400 audit(1707800841.761:1588): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:07:21.761000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a04440 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:07:21.884532 kernel: audit: type=1300 audit(1707800841.761:1588): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a04440 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:07:21.761000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:07:22.073904 kernel: audit: type=1327 audit(1707800841.761:1588): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:07:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475e40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:24.586524 kernel: audit: type=1400 audit(1707800844.371:1589): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.586573 kernel: audit: type=1300 audit(1707800844.371:1589): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475e40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:24.586592 kernel: audit: type=1327 audit(1707800844.371:1589): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:24.679805 kernel: audit: type=1400 audit(1707800844.371:1590): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.371000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.769943 kernel: audit: type=1300 audit(1707800844.371:1590): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001736c00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:24.371000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001736c00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:24.890390 kernel: audit: type=1327 audit(1707800844.371:1590): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:24.371000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:24.983372 kernel: audit: type=1400 audit(1707800844.376:1591): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.376000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.376000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c6000 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:24.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:24.376000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:07:24.376000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c02200 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:07:24.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:07:26.969000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:07:26.998781 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:07:26.998843 kernel: audit: type=1400 audit(1707800846.969:1593): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:07:26.969000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b71380 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:07:27.189156 kernel: audit: type=1300 audit(1707800846.969:1593): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b71380 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:07:27.189192 kernel: audit: type=1327 audit(1707800846.969:1593): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:07:26.969000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:07:30.081946 update_engine[1469]: I0213 05:07:30.081836 1469 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 05:07:30.081946 update_engine[1469]: I0213 05:07:30.081919 1469 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 05:07:30.083752 update_engine[1469]: I0213 05:07:30.083679 1469 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 05:07:30.084643 update_engine[1469]: I0213 05:07:30.084570 1469 omaha_request_params.cc:62] Current group set to lts Feb 13 05:07:30.084874 update_engine[1469]: I0213 05:07:30.084847 1469 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 05:07:30.084874 update_engine[1469]: I0213 05:07:30.084865 1469 update_attempter.cc:643] Scheduling an action processor start. Feb 13 05:07:30.085083 update_engine[1469]: I0213 05:07:30.084898 1469 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 05:07:30.085083 update_engine[1469]: I0213 05:07:30.084965 1469 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 05:07:30.085269 update_engine[1469]: I0213 05:07:30.085104 1469 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 05:07:30.085269 update_engine[1469]: I0213 05:07:30.085122 1469 omaha_request_action.cc:271] Request: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: Feb 13 05:07:30.085269 update_engine[1469]: I0213 05:07:30.085132 1469 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:07:30.086327 locksmithd[1514]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 05:07:30.088201 update_engine[1469]: I0213 05:07:30.088124 1469 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:07:30.088422 update_engine[1469]: E0213 05:07:30.088340 1469 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:07:30.088585 update_engine[1469]: I0213 05:07:30.088514 1469 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 05:07:39.981814 update_engine[1469]: I0213 05:07:39.981720 1469 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:07:39.983051 update_engine[1469]: I0213 05:07:39.982280 1469 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:07:39.983051 update_engine[1469]: E0213 05:07:39.982578 1469 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:07:39.983051 update_engine[1469]: I0213 05:07:39.982821 1469 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 05:07:49.992214 update_engine[1469]: I0213 05:07:49.992121 1469 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:07:49.993553 update_engine[1469]: I0213 05:07:49.992727 1469 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:07:49.993553 update_engine[1469]: E0213 05:07:49.992997 1469 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:07:49.993553 update_engine[1469]: I0213 05:07:49.993247 1469 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 05:07:59.992608 update_engine[1469]: I0213 05:07:59.992516 1469 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:07:59.993898 update_engine[1469]: I0213 05:07:59.993073 1469 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:07:59.993898 update_engine[1469]: E0213 05:07:59.993359 1469 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:07:59.993898 update_engine[1469]: I0213 05:07:59.993613 1469 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 05:07:59.993898 update_engine[1469]: I0213 05:07:59.993641 1469 omaha_request_action.cc:621] Omaha request response: Feb 13 05:07:59.993898 update_engine[1469]: E0213 05:07:59.993842 1469 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 05:07:59.993898 update_engine[1469]: I0213 05:07:59.993883 1469 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 05:07:59.993898 update_engine[1469]: I0213 05:07:59.993898 1469 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 05:07:59.993898 update_engine[1469]: I0213 05:07:59.993911 1469 update_attempter.cc:306] Processing Done. Feb 13 05:07:59.995413 update_engine[1469]: E0213 05:07:59.993945 1469 update_attempter.cc:619] Update failed. Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.993961 1469 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.993974 1469 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.993990 1469 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.994212 1469 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.994285 1469 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.994302 1469 omaha_request_action.cc:271] Request: Feb 13 05:07:59.995413 update_engine[1469]: Feb 13 05:07:59.995413 update_engine[1469]: Feb 13 05:07:59.995413 update_engine[1469]: Feb 13 05:07:59.995413 update_engine[1469]: Feb 13 05:07:59.995413 update_engine[1469]: Feb 13 05:07:59.995413 update_engine[1469]: Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.994318 1469 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.994761 1469 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 05:07:59.995413 update_engine[1469]: E0213 05:07:59.994999 1469 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.995199 1469 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.995223 1469 omaha_request_action.cc:621] Omaha request response: Feb 13 05:07:59.995413 update_engine[1469]: I0213 05:07:59.995240 1469 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 05:07:59.997231 locksmithd[1514]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 05:07:59.997231 locksmithd[1514]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 05:07:59.997629 update_engine[1469]: I0213 05:07:59.995254 1469 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 05:07:59.997629 update_engine[1469]: I0213 05:07:59.995266 1469 update_attempter.cc:306] Processing Done. Feb 13 05:07:59.997629 update_engine[1469]: I0213 05:07:59.995277 1469 update_attempter.cc:310] Error event sent. Feb 13 05:07:59.997629 update_engine[1469]: I0213 05:07:59.995306 1469 update_check_scheduler.cc:74] Next update check in 43m1s Feb 13 05:08:10.904000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:10.904000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001618090 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:11.119233 kernel: audit: type=1400 audit(1707800890.904:1594): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.119271 kernel: audit: type=1300 audit(1707800890.904:1594): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001618090 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:11.119288 kernel: audit: type=1327 audit(1707800890.904:1594): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:10.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:11.212888 kernel: audit: type=1400 audit(1707800890.904:1595): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:10.904000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.304827 kernel: audit: type=1300 audit(1707800890.904:1595): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c6ba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:10.904000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c6ba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:10.904000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:11.521121 kernel: audit: type=1327 audit(1707800890.904:1595): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:11.521160 kernel: audit: type=1400 audit(1707800891.203:1596): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.612109 kernel: audit: type=1300 audit(1707800891.203:1596): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009ec8f30 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c009ec8f30 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.894100 kernel: audit: type=1327 audit(1707800891.203:1596): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:11.894157 kernel: audit: type=1400 audit(1707800891.203:1597): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009e667b0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00e237400 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00f96bda0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0084137a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e31e240 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:08:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:08:21.762000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:08:21.789497 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:08:21.789543 kernel: audit: type=1400 audit(1707800901.762:1602): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:08:21.762000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a05dc0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:08:21.981625 kernel: audit: type=1300 audit(1707800901.762:1602): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001a05dc0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:08:21.981665 kernel: audit: type=1327 audit(1707800901.762:1602): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:08:21.762000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:08:24.372000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.372000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001016720 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:24.587302 kernel: audit: type=1400 audit(1707800904.372:1603): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.587334 kernel: audit: type=1300 audit(1707800904.372:1603): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001016720 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:24.587355 kernel: audit: type=1327 audit(1707800904.372:1603): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:24.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:24.681132 kernel: audit: type=1400 audit(1707800904.372:1604): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.372000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.771288 kernel: audit: type=1300 audit(1707800904.372:1604): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013bcca0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:24.372000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013bcca0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:24.891697 kernel: audit: type=1327 audit(1707800904.372:1604): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:24.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:24.984793 kernel: audit: type=1400 audit(1707800904.376:1605): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.376000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.376000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0005c79e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:24.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:24.377000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:08:24.377000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b10080 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:08:24.377000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:08:26.970000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:08:26.997701 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:08:26.997747 kernel: audit: type=1400 audit(1707800906.970:1607): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:08:26.970000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004367c0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:08:27.190850 kernel: audit: type=1300 audit(1707800906.970:1607): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004367c0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:08:27.190911 kernel: audit: type=1327 audit(1707800906.970:1607): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:08:26.970000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:08:50.991020 systemd[1]: Started sshd@17-139.178.90.239:22-2.57.122.87:38818.service. Feb 13 05:08:50.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.239:22-2.57.122.87:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:51.081449 kernel: audit: type=1130 audit(1707800930.990:1608): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.239:22-2.57.122.87:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:51.752932 sshd[8012]: Invalid user hlwang from 2.57.122.87 port 38818 Feb 13 05:08:51.944000 sshd[8012]: pam_faillock(sshd:auth): User unknown Feb 13 05:08:51.945269 sshd[8012]: pam_unix(sshd:auth): check pass; user unknown Feb 13 05:08:51.945360 sshd[8012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 13 05:08:51.946412 sshd[8012]: pam_faillock(sshd:auth): User unknown Feb 13 05:08:51.946000 audit[8012]: USER_AUTH pid=8012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:08:52.042628 kernel: audit: type=1100 audit(1707800931.946:1609): pid=8012 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hlwang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 13 05:08:53.562837 sshd[8012]: Failed password for invalid user hlwang from 2.57.122.87 port 38818 ssh2 Feb 13 05:08:53.816603 sshd[8012]: Connection closed by invalid user hlwang 2.57.122.87 port 38818 [preauth] Feb 13 05:08:53.819206 systemd[1]: sshd@17-139.178.90.239:22-2.57.122.87:38818.service: Deactivated successfully. Feb 13 05:08:53.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.239:22-2.57.122.87:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:08:53.911487 kernel: audit: type=1131 audit(1707800933.819:1610): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.90.239:22-2.57.122.87:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:10.905000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:10.905000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c82d0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:11.120187 kernel: audit: type=1400 audit(1707800950.905:1611): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.120247 kernel: audit: type=1300 audit(1707800950.905:1611): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c82d0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:11.120278 kernel: audit: type=1327 audit(1707800950.905:1611): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:10.905000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:11.213824 kernel: audit: type=1400 audit(1707800950.905:1612): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:10.905000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.305939 kernel: audit: type=1300 audit(1707800950.905:1612): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00116d7c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:10.905000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00116d7c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:10.905000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:11.519943 kernel: audit: type=1327 audit(1707800950.905:1612): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:11.519989 kernel: audit: type=1400 audit(1707800951.203:1613): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.609939 kernel: audit: type=1300 audit(1707800951.203:1613): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b69cd20 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00b69cd20 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:11.801932 kernel: audit: type=1327 audit(1707800951.203:1613): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:11.801973 kernel: audit: type=1400 audit(1707800951.204:1614): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.204000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.204000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00939cc00 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:11.204000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.204000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00a5ddc50 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00939cdb0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00939cde0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ae83ba0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:09:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:09:21.762000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:09:21.807777 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:09:21.807868 kernel: audit: type=1400 audit(1707800961.762:1619): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:09:21.762000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019f9680 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:09:22.001380 kernel: audit: type=1300 audit(1707800961.762:1619): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0019f9680 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:09:22.001437 kernel: audit: type=1327 audit(1707800961.762:1619): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:09:21.762000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:09:24.373000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:24.373000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000626ae0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:24.586528 kernel: audit: type=1400 audit(1707800964.373:1620): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:24.586562 kernel: audit: type=1300 audit(1707800964.373:1620): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000626ae0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:24.586579 kernel: audit: type=1327 audit(1707800964.373:1620): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:24.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:24.679714 kernel: audit: type=1400 audit(1707800964.373:1621): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:24.373000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:24.769717 kernel: audit: type=1300 audit(1707800964.373:1621): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001017940 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:24.373000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001017940 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:24.890227 kernel: audit: type=1327 audit(1707800964.373:1621): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:24.373000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:24.377000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:25.073419 kernel: audit: type=1400 audit(1707800964.377:1622): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:24.377000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000773e40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:24.377000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:24.377000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:09:24.377000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001017960 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:09:24.377000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:09:26.970000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:09:26.999095 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:09:26.999162 kernel: audit: type=1400 audit(1707800966.970:1624): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:09:26.970000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b7c700 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:09:27.190519 kernel: audit: type=1300 audit(1707800966.970:1624): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b7c700 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:09:27.190563 kernel: audit: type=1327 audit(1707800966.970:1624): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:09:26.970000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:09:59.654424 systemd[1]: Started sshd@18-139.178.90.239:22-61.177.172.136:43759.service. Feb 13 05:09:59.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.239:22-61.177.172.136:43759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:09:59.746448 kernel: audit: type=1130 audit(1707800999.653:1625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.239:22-61.177.172.136:43759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:00.773694 sshd[8287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:00.772000 audit[8287]: USER_AUTH pid=8287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:00.863446 kernel: audit: type=1100 audit(1707801000.772:1626): pid=8287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:03.533597 sshd[8287]: Failed password for root from 61.177.172.136 port 43759 ssh2 Feb 13 05:10:03.990000 audit[8287]: USER_AUTH pid=8287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:04.082629 kernel: audit: type=1100 audit(1707801003.990:1627): pid=8287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:06.496427 sshd[8287]: Failed password for root from 61.177.172.136 port 43759 ssh2 Feb 13 05:10:07.626000 audit[8287]: USER_AUTH pid=8287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:07.719473 kernel: audit: type=1100 audit(1707801007.626:1628): pid=8287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:09.344690 sshd[8287]: Failed password for root from 61.177.172.136 port 43759 ssh2 Feb 13 05:10:10.860258 sshd[8287]: Received disconnect from 61.177.172.136 port 43759:11: [preauth] Feb 13 05:10:10.860258 sshd[8287]: Disconnected from authenticating user root 61.177.172.136 port 43759 [preauth] Feb 13 05:10:10.860843 sshd[8287]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:10.862969 systemd[1]: sshd@18-139.178.90.239:22-61.177.172.136:43759.service: Deactivated successfully. Feb 13 05:10:10.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.239:22-61.177.172.136:43759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:10.905000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:10.955525 kernel: audit: type=1131 audit(1707801010.862:1629): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.90.239:22-61.177.172.136:43759 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:10.955551 kernel: audit: type=1400 audit(1707801010.905:1630): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.018838 systemd[1]: Started sshd@19-139.178.90.239:22-61.177.172.136:61594.service. Feb 13 05:10:11.034836 systemd[1]: Started sshd@20-139.178.90.239:22-218.92.0.27:25716.service. Feb 13 05:10:10.905000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8aa00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:11.165911 kernel: audit: type=1300 audit(1707801010.905:1630): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8aa00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:11.165949 kernel: audit: type=1327 audit(1707801010.905:1630): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:10.905000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:11.259363 kernel: audit: type=1400 audit(1707801010.905:1631): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:10.905000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.350731 kernel: audit: type=1300 audit(1707801010.905:1631): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d56c90 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:10.905000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d56c90 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:11.471045 kernel: audit: type=1327 audit(1707801010.905:1631): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:10.905000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:11.564399 kernel: audit: type=1130 audit(1707801011.017:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.239:22-61.177.172.136:61594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.239:22-61.177.172.136:61594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.653900 kernel: audit: type=1130 audit(1707801011.033:1633): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.239:22-218.92.0.27:25716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.239:22-218.92.0.27:25716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ade69c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:10:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:10:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c0092af900 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:10:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:10:11.203000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.203000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c007a2ce10 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:10:11.203000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:10:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00c6ce600 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:10:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:10:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00c6ce630 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:10:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:10:11.214000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:11.214000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00dfe81e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:10:11.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:10:12.698860 sshd[8330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:12.697000 audit[8330]: USER_AUTH pid=8330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:12.726335 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 13 05:10:12.726375 kernel: audit: type=1100 audit(1707801012.697:1640): pid=8330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:12.761899 sshd[8333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:12.761949 sshd[8333]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:10:12.760000 audit[8333]: ANOM_LOGIN_FAILURES pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:12.880912 kernel: audit: type=2100 audit(1707801012.760:1641): pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:12.880948 kernel: audit: type=1100 audit(1707801012.760:1642): pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:12.760000 audit[8333]: USER_AUTH pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:15.438717 sshd[8330]: Failed password for root from 61.177.172.136 port 61594 ssh2 Feb 13 05:10:15.501789 sshd[8333]: Failed password for root from 218.92.0.27 port 25716 ssh2 Feb 13 05:10:15.913000 audit[8330]: USER_AUTH pid=8330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:16.012495 kernel: audit: type=1100 audit(1707801015.913:1643): pid=8330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:16.417000 audit[8333]: USER_AUTH pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:16.510661 kernel: audit: type=1100 audit(1707801016.417:1644): pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:18.371675 sshd[8333]: Failed password for root from 218.92.0.27 port 25716 ssh2 Feb 13 05:10:18.398693 sshd[8330]: Failed password for root from 61.177.172.136 port 61594 ssh2 Feb 13 05:10:19.135000 audit[8330]: USER_AUTH pid=8330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:19.228540 kernel: audit: type=1100 audit(1707801019.135:1645): pid=8330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:20.060000 audit[8333]: USER_AUTH pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:20.159636 kernel: audit: type=1100 audit(1707801020.060:1646): pid=8333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:21.169935 sshd[8330]: Failed password for root from 61.177.172.136 port 61594 ssh2 Feb 13 05:10:21.764000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:10:21.764000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00196bee0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:10:21.963603 kernel: audit: type=1400 audit(1707801021.764:1647): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:10:21.963637 kernel: audit: type=1300 audit(1707801021.764:1647): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00196bee0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:10:21.963654 kernel: audit: type=1327 audit(1707801021.764:1647): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:10:21.764000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:10:22.229710 sshd[8333]: Failed password for root from 218.92.0.27 port 25716 ssh2 Feb 13 05:10:22.347761 sshd[8330]: Received disconnect from 61.177.172.136 port 61594:11: [preauth] Feb 13 05:10:22.347761 sshd[8330]: Disconnected from authenticating user root 61.177.172.136 port 61594 [preauth] Feb 13 05:10:22.348339 sshd[8330]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:22.350419 systemd[1]: sshd@19-139.178.90.239:22-61.177.172.136:61594.service: Deactivated successfully. Feb 13 05:10:22.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.239:22-61.177.172.136:61594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:22.443659 kernel: audit: type=1131 audit(1707801022.349:1648): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.90.239:22-61.177.172.136:61594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:22.543076 systemd[1]: Started sshd@21-139.178.90.239:22-61.177.172.136:29052.service. Feb 13 05:10:22.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.239:22-61.177.172.136:29052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:22.635469 kernel: audit: type=1130 audit(1707801022.542:1649): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.239:22-61.177.172.136:29052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.281586 sshd[8333]: Received disconnect from 218.92.0.27 port 25716:11: [preauth] Feb 13 05:10:23.281586 sshd[8333]: Disconnected from authenticating user root 218.92.0.27 port 25716 [preauth] Feb 13 05:10:23.282149 sshd[8333]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:23.284228 systemd[1]: sshd@20-139.178.90.239:22-218.92.0.27:25716.service: Deactivated successfully. Feb 13 05:10:23.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.239:22-218.92.0.27:25716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.376508 kernel: audit: type=1131 audit(1707801023.283:1650): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.90.239:22-218.92.0.27:25716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:23.706097 sshd[8380]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:23.704000 audit[8380]: USER_AUTH pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:23.802492 kernel: audit: type=1100 audit(1707801023.704:1651): pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:24.374000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:24.438936 systemd[1]: Started sshd@22-139.178.90.239:22-218.92.0.27:47903.service. Feb 13 05:10:24.374000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8b1e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:24.590944 kernel: audit: type=1400 audit(1707801024.374:1652): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:24.590982 kernel: audit: type=1300 audit(1707801024.374:1652): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8b1e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:24.590999 kernel: audit: type=1327 audit(1707801024.374:1652): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:24.591013 kernel: audit: type=1400 audit(1707801024.374:1653): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:24.591030 kernel: audit: type=1300 audit(1707801024.374:1653): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017379c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:24.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:24.374000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:24.374000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017379c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:24.374000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:24.899520 kernel: audit: type=1327 audit(1707801024.374:1653): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:24.378000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:25.084955 kernel: audit: type=1400 audit(1707801024.378:1654): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:25.084985 kernel: audit: type=1300 audit(1707801024.378:1654): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011ccaa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:24.378000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011ccaa0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:25.207011 kernel: audit: type=1327 audit(1707801024.378:1654): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:24.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:25.287503 sshd[8380]: Failed password for root from 61.177.172.136 port 29052 ssh2 Feb 13 05:10:25.301504 kernel: audit: type=1400 audit(1707801024.378:1655): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:24.378000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:10:24.378000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017379e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:10:24.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:10:24.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.239:22-218.92.0.27:47903 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:26.059283 sshd[8407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:26.058000 audit[8407]: USER_AUTH pid=8407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:26.925000 audit[8380]: USER_AUTH pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:26.971000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:10:26.971000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f1aa0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:10:26.971000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:10:28.052619 sshd[8407]: Failed password for root from 218.92.0.27 port 47903 ssh2 Feb 13 05:10:28.918716 sshd[8380]: Failed password for root from 61.177.172.136 port 29052 ssh2 Feb 13 05:10:29.269000 audit[8407]: USER_AUTH pid=8407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:30.146000 audit[8380]: USER_AUTH pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:30.174885 kernel: kauditd_printk_skb: 9 callbacks suppressed Feb 13 05:10:30.174976 kernel: audit: type=1100 audit(1707801030.146:1661): pid=8380 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=61.177.172.136 addr=61.177.172.136 terminal=ssh res=failed' Feb 13 05:10:31.675618 sshd[8407]: Failed password for root from 218.92.0.27 port 47903 ssh2 Feb 13 05:10:32.356275 sshd[8380]: Failed password for root from 61.177.172.136 port 29052 ssh2 Feb 13 05:10:32.465000 audit[8407]: USER_AUTH pid=8407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:32.557550 kernel: audit: type=1100 audit(1707801032.465:1662): pid=8407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:33.352817 sshd[8380]: Received disconnect from 61.177.172.136 port 29052:11: [preauth] Feb 13 05:10:33.352817 sshd[8380]: Disconnected from authenticating user root 61.177.172.136 port 29052 [preauth] Feb 13 05:10:33.353365 sshd[8380]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.136 user=root Feb 13 05:10:33.355338 systemd[1]: sshd@21-139.178.90.239:22-61.177.172.136:29052.service: Deactivated successfully. Feb 13 05:10:33.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.239:22-61.177.172.136:29052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:33.448640 kernel: audit: type=1131 audit(1707801033.354:1663): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.90.239:22-61.177.172.136:29052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:34.283702 sshd[8407]: Failed password for root from 218.92.0.27 port 47903 ssh2 Feb 13 05:10:35.661556 sshd[8407]: Received disconnect from 218.92.0.27 port 47903:11: [preauth] Feb 13 05:10:35.661556 sshd[8407]: Disconnected from authenticating user root 218.92.0.27 port 47903 [preauth] Feb 13 05:10:35.662090 sshd[8407]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:35.664230 systemd[1]: sshd@22-139.178.90.239:22-218.92.0.27:47903.service: Deactivated successfully. Feb 13 05:10:35.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.239:22-218.92.0.27:47903 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:35.757639 kernel: audit: type=1131 audit(1707801035.663:1664): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.90.239:22-218.92.0.27:47903 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:35.838665 systemd[1]: Started sshd@23-139.178.90.239:22-218.92.0.27:60566.service. Feb 13 05:10:35.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.239:22-218.92.0.27:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:35.930502 kernel: audit: type=1130 audit(1707801035.837:1665): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.239:22-218.92.0.27:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:36.971670 sshd[8454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:36.970000 audit[8454]: USER_AUTH pid=8454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:37.062491 kernel: audit: type=1100 audit(1707801036.970:1666): pid=8454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:39.672483 sshd[8454]: Failed password for root from 218.92.0.27 port 60566 ssh2 Feb 13 05:10:40.190000 audit[8454]: USER_AUTH pid=8454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:40.282636 kernel: audit: type=1100 audit(1707801040.190:1667): pid=8454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:42.440467 sshd[8454]: Failed password for root from 218.92.0.27 port 60566 ssh2 Feb 13 05:10:43.394000 audit[8454]: USER_AUTH pid=8454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:43.487516 kernel: audit: type=1100 audit(1707801043.394:1668): pid=8454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 13 05:10:45.057551 sshd[8454]: Failed password for root from 218.92.0.27 port 60566 ssh2 Feb 13 05:10:46.599952 sshd[8454]: Received disconnect from 218.92.0.27 port 60566:11: [preauth] Feb 13 05:10:46.599952 sshd[8454]: Disconnected from authenticating user root 218.92.0.27 port 60566 [preauth] Feb 13 05:10:46.600569 sshd[8454]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 13 05:10:46.602582 systemd[1]: sshd@23-139.178.90.239:22-218.92.0.27:60566.service: Deactivated successfully. Feb 13 05:10:46.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.239:22-218.92.0.27:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:46.608541 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 05:10:46.693514 kernel: audit: type=1131 audit(1707801046.601:1669): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.90.239:22-218.92.0.27:60566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:46.697964 systemd-tmpfiles[8458]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 05:10:46.698190 systemd-tmpfiles[8458]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 05:10:46.698868 systemd-tmpfiles[8458]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 05:10:46.709295 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 05:10:46.709388 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 05:10:46.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:46.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:46.799784 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 05:10:46.884381 kernel: audit: type=1130 audit(1707801046.708:1670): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:10:46.884421 kernel: audit: type=1131 audit(1707801046.708:1671): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:11:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.099119 kernel: audit: type=1400 audit(1707801070.907:1672): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.099160 kernel: audit: type=1400 audit(1707801070.907:1673): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.099177 kernel: audit: type=1300 audit(1707801070.907:1673): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a9aab0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a9aab0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:11.221087 kernel: audit: type=1300 audit(1707801070.907:1672): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001737720 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001737720 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:11.343344 kernel: audit: type=1327 audit(1707801070.907:1673): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:11.439652 kernel: audit: type=1327 audit(1707801070.907:1672): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:11.534105 kernel: audit: type=1400 audit(1707801071.205:1674): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.625990 kernel: audit: type=1300 audit(1707801071.205:1674): arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ad288a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00ad288a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.725423 kernel: audit: type=1327 audit(1707801071.205:1674): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:11.819672 kernel: audit: type=1400 audit(1707801071.205:1675): avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00abc9f20 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008583420 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c00afa6f60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01021b660 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c008c6db30 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:11:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:11:21.766000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:11:21.794752 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 05:11:21.794811 kernel: audit: type=1400 audit(1707801081.766:1680): avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:11:21.766000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001775d20 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:11:21.988622 kernel: audit: type=1300 audit(1707801081.766:1680): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001775d20 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:11:21.988693 kernel: audit: type=1327 audit(1707801081.766:1680): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:11:21.766000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:11:24.376000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.376000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150c9e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:24.592062 kernel: audit: type=1400 audit(1707801084.376:1681): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.592095 kernel: audit: type=1300 audit(1707801084.376:1681): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150c9e0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:24.592113 kernel: audit: type=1327 audit(1707801084.376:1681): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:24.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:24.685297 kernel: audit: type=1400 audit(1707801084.376:1682): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.376000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.775422 kernel: audit: type=1300 audit(1707801084.376:1682): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013bc080 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:24.376000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013bc080 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:24.895680 kernel: audit: type=1327 audit(1707801084.376:1682): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:24.376000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:24.988626 kernel: audit: type=1400 audit(1707801084.380:1683): avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001737be0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:11:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bc0a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:11:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:11:26.973000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:11:27.017973 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:11:27.018051 kernel: audit: type=1400 audit(1707801086.973:1685): avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:11:26.973000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019e8460 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:11:27.208921 kernel: audit: type=1300 audit(1707801086.973:1685): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019e8460 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:11:27.208996 kernel: audit: type=1327 audit(1707801086.973:1685): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:11:26.973000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:12:07.594554 systemd[1]: Started sshd@24-139.178.90.239:22-139.178.68.195:41390.service. Feb 13 05:12:07.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.239:22-139.178.68.195:41390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:07.684452 kernel: audit: type=1130 audit(1707801127.594:1686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.239:22-139.178.68.195:41390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:07.716000 audit[8767]: USER_ACCT pid=8767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.716770 sshd[8767]: Accepted publickey for core from 139.178.68.195 port 41390 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:07.717418 sshd[8767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:07.719636 systemd-logind[1467]: New session 10 of user core. Feb 13 05:12:07.720296 systemd[1]: Started session-10.scope. Feb 13 05:12:07.716000 audit[8767]: CRED_ACQ pid=8767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.900547 kernel: audit: type=1101 audit(1707801127.716:1687): pid=8767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.900631 kernel: audit: type=1103 audit(1707801127.716:1688): pid=8767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.900649 kernel: audit: type=1006 audit(1707801127.716:1689): pid=8767 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 13 05:12:07.940992 sshd[8767]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:07.942197 systemd[1]: sshd@24-139.178.90.239:22-139.178.68.195:41390.service: Deactivated successfully. Feb 13 05:12:07.942655 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 05:12:07.942983 systemd-logind[1467]: Session 10 logged out. Waiting for processes to exit. Feb 13 05:12:07.943375 systemd-logind[1467]: Removed session 10. Feb 13 05:12:07.716000 audit[8767]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf9cfdf80 a2=3 a3=0 items=0 ppid=1 pid=8767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:08.052527 kernel: audit: type=1300 audit(1707801127.716:1689): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf9cfdf80 a2=3 a3=0 items=0 ppid=1 pid=8767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:08.052843 kernel: audit: type=1327 audit(1707801127.716:1689): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:07.716000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:07.722000 audit[8767]: USER_START pid=8767 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:08.178846 kernel: audit: type=1105 audit(1707801127.722:1690): pid=8767 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:08.178879 kernel: audit: type=1103 audit(1707801127.722:1691): pid=8772 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.722000 audit[8772]: CRED_ACQ pid=8772 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:08.268134 kernel: audit: type=1106 audit(1707801127.941:1692): pid=8767 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.941000 audit[8767]: USER_END pid=8767 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:08.363761 kernel: audit: type=1104 audit(1707801127.941:1693): pid=8767 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.941000 audit[8767]: CRED_DISP pid=8767 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:07.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.90.239:22-139.178.68.195:41390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d8b960 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:12:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002901410 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:12:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:12:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:12:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01027fee0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:12:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:12:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00ac7c780 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:12:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:12:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0068a6b40 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:12:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:12:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00b44a300 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:12:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:12:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009c4b1d0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:12:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:12:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c014de2020 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:12:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:12:12.950199 systemd[1]: Started sshd@25-139.178.90.239:22-139.178.68.195:41404.service. Feb 13 05:12:12.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.239:22-139.178.68.195:41404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:12.977462 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 05:12:12.977538 kernel: audit: type=1130 audit(1707801132.949:1703): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.239:22-139.178.68.195:41404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:13.099000 audit[8799]: USER_ACCT pid=8799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.099919 sshd[8799]: Accepted publickey for core from 139.178.68.195 port 41404 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:13.101745 sshd[8799]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:13.104212 systemd-logind[1467]: New session 11 of user core. Feb 13 05:12:13.104752 systemd[1]: Started session-11.scope. Feb 13 05:12:13.191507 kernel: audit: type=1101 audit(1707801133.099:1704): pid=8799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.191589 kernel: audit: type=1103 audit(1707801133.100:1705): pid=8799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.100000 audit[8799]: CRED_ACQ pid=8799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.193863 sshd[8799]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:13.195223 systemd[1]: sshd@25-139.178.90.239:22-139.178.68.195:41404.service: Deactivated successfully. Feb 13 05:12:13.195689 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 05:12:13.196110 systemd-logind[1467]: Session 11 logged out. Waiting for processes to exit. Feb 13 05:12:13.196746 systemd-logind[1467]: Removed session 11. Feb 13 05:12:13.340795 kernel: audit: type=1006 audit(1707801133.100:1706): pid=8799 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 13 05:12:13.340827 kernel: audit: type=1300 audit(1707801133.100:1706): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd37673a40 a2=3 a3=0 items=0 ppid=1 pid=8799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:13.100000 audit[8799]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd37673a40 a2=3 a3=0 items=0 ppid=1 pid=8799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:13.433445 kernel: audit: type=1327 audit(1707801133.100:1706): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:13.100000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:13.464219 kernel: audit: type=1105 audit(1707801133.105:1707): pid=8799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.105000 audit[8799]: USER_START pid=8799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.559381 kernel: audit: type=1103 audit(1707801133.106:1708): pid=8801 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.106000 audit[8801]: CRED_ACQ pid=8801 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.648608 kernel: audit: type=1106 audit(1707801133.194:1709): pid=8799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.194000 audit[8799]: USER_END pid=8799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.744065 kernel: audit: type=1104 audit(1707801133.194:1710): pid=8799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.194000 audit[8799]: CRED_DISP pid=8799 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:13.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.90.239:22-139.178.68.195:41404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:18.203861 systemd[1]: Started sshd@26-139.178.90.239:22-139.178.68.195:34752.service. Feb 13 05:12:18.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.239:22-139.178.68.195:34752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:18.230873 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:12:18.230922 kernel: audit: type=1130 audit(1707801138.202:1712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.239:22-139.178.68.195:34752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:18.352000 audit[8827]: USER_ACCT pid=8827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.354812 sshd[8827]: Accepted publickey for core from 139.178.68.195 port 34752 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:18.358799 sshd[8827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:18.364056 systemd-logind[1467]: New session 12 of user core. Feb 13 05:12:18.364682 systemd[1]: Started session-12.scope. Feb 13 05:12:18.445401 sshd[8827]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:18.446958 systemd[1]: sshd@26-139.178.90.239:22-139.178.68.195:34752.service: Deactivated successfully. Feb 13 05:12:18.447610 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 05:12:18.356000 audit[8827]: CRED_ACQ pid=8827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.448011 systemd-logind[1467]: Session 12 logged out. Waiting for processes to exit. Feb 13 05:12:18.448397 systemd-logind[1467]: Removed session 12. Feb 13 05:12:18.538432 kernel: audit: type=1101 audit(1707801138.352:1713): pid=8827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.538477 kernel: audit: type=1103 audit(1707801138.356:1714): pid=8827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.538495 kernel: audit: type=1006 audit(1707801138.356:1715): pid=8827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 13 05:12:18.596974 kernel: audit: type=1300 audit(1707801138.356:1715): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe52510490 a2=3 a3=0 items=0 ppid=1 pid=8827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:18.356000 audit[8827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe52510490 a2=3 a3=0 items=0 ppid=1 pid=8827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:18.688979 kernel: audit: type=1327 audit(1707801138.356:1715): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:18.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:18.719448 kernel: audit: type=1105 audit(1707801138.365:1716): pid=8827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.365000 audit[8827]: USER_START pid=8827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.813913 kernel: audit: type=1103 audit(1707801138.366:1717): pid=8829 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.366000 audit[8829]: CRED_ACQ pid=8829 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.903136 kernel: audit: type=1106 audit(1707801138.445:1718): pid=8827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.445000 audit[8827]: USER_END pid=8827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.445000 audit[8827]: CRED_DISP pid=8827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.999445 kernel: audit: type=1104 audit(1707801138.445:1719): pid=8827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:18.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.90.239:22-139.178.68.195:34752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:21.767000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:12:21.767000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ba4ce0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:12:21.767000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:12:23.457223 systemd[1]: Started sshd@27-139.178.90.239:22-139.178.68.195:34762.service. Feb 13 05:12:23.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.239:22-139.178.68.195:34762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:23.484913 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:12:23.484981 kernel: audit: type=1130 audit(1707801143.456:1722): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.239:22-139.178.68.195:34762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:23.605000 audit[8925]: USER_ACCT pid=8925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.606757 sshd[8925]: Accepted publickey for core from 139.178.68.195 port 34762 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:23.608211 sshd[8925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:23.610523 systemd-logind[1467]: New session 13 of user core. Feb 13 05:12:23.611147 systemd[1]: Started session-13.scope. Feb 13 05:12:23.689185 sshd[8925]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:23.690578 systemd[1]: sshd@27-139.178.90.239:22-139.178.68.195:34762.service: Deactivated successfully. Feb 13 05:12:23.691019 systemd[1]: session-13.scope: Deactivated successfully. Feb 13 05:12:23.691325 systemd-logind[1467]: Session 13 logged out. Waiting for processes to exit. Feb 13 05:12:23.691870 systemd-logind[1467]: Removed session 13. Feb 13 05:12:23.606000 audit[8925]: CRED_ACQ pid=8925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.788504 kernel: audit: type=1101 audit(1707801143.605:1723): pid=8925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.788549 kernel: audit: type=1103 audit(1707801143.606:1724): pid=8925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.788569 kernel: audit: type=1006 audit(1707801143.606:1725): pid=8925 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 13 05:12:23.847127 kernel: audit: type=1300 audit(1707801143.606:1725): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd93ad3c0 a2=3 a3=0 items=0 ppid=1 pid=8925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:23.606000 audit[8925]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd93ad3c0 a2=3 a3=0 items=0 ppid=1 pid=8925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:23.939058 kernel: audit: type=1327 audit(1707801143.606:1725): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:23.606000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:23.969525 kernel: audit: type=1105 audit(1707801143.611:1726): pid=8925 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.611000 audit[8925]: USER_START pid=8925 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:24.064012 kernel: audit: type=1103 audit(1707801143.612:1727): pid=8927 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.612000 audit[8927]: CRED_ACQ pid=8927 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:24.153278 kernel: audit: type=1106 audit(1707801143.688:1728): pid=8925 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.688000 audit[8925]: USER_END pid=8925 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:24.248712 kernel: audit: type=1104 audit(1707801143.688:1729): pid=8925 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.688000 audit[8925]: CRED_DISP pid=8925 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:23.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.90.239:22-139.178.68.195:34762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:24.377000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:24.377000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:24.377000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001622700 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:12:24.377000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:12:24.377000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0001ccfc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:12:24.377000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:12:24.381000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:24.381000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa8180 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:12:24.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:12:24.381000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:12:24.381000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c2e0c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:12:24.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:12:26.973000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:12:26.973000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bbd40 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:12:26.973000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:12:28.138287 systemd[1]: Started sshd@28-139.178.90.239:22-172.105.128.11:2438.service. Feb 13 05:12:28.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.239:22-172.105.128.11:2438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:28.692851 systemd[1]: Started sshd@29-139.178.90.239:22-139.178.68.195:47810.service. Feb 13 05:12:28.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.239:22-139.178.68.195:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:28.720252 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 13 05:12:28.720319 kernel: audit: type=1130 audit(1707801148.691:1737): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.239:22-139.178.68.195:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:28.842000 audit[8954]: USER_ACCT pid=8954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:28.842839 sshd[8954]: Accepted publickey for core from 139.178.68.195 port 47810 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:28.844744 sshd[8954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:28.847127 systemd-logind[1467]: New session 14 of user core. Feb 13 05:12:28.847863 systemd[1]: Started session-14.scope. Feb 13 05:12:28.926450 sshd[8954]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:28.927913 systemd[1]: sshd@29-139.178.90.239:22-139.178.68.195:47810.service: Deactivated successfully. Feb 13 05:12:28.928387 systemd[1]: session-14.scope: Deactivated successfully. Feb 13 05:12:28.928822 systemd-logind[1467]: Session 14 logged out. Waiting for processes to exit. Feb 13 05:12:28.929606 systemd-logind[1467]: Removed session 14. Feb 13 05:12:28.843000 audit[8954]: CRED_ACQ pid=8954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.024605 kernel: audit: type=1101 audit(1707801148.842:1738): pid=8954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.024652 kernel: audit: type=1103 audit(1707801148.843:1739): pid=8954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.024676 kernel: audit: type=1006 audit(1707801148.843:1740): pid=8954 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 13 05:12:29.083145 kernel: audit: type=1300 audit(1707801148.843:1740): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe64220040 a2=3 a3=0 items=0 ppid=1 pid=8954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:28.843000 audit[8954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe64220040 a2=3 a3=0 items=0 ppid=1 pid=8954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:29.175112 kernel: audit: type=1327 audit(1707801148.843:1740): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:28.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:28.848000 audit[8954]: USER_START pid=8954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.299875 kernel: audit: type=1105 audit(1707801148.848:1741): pid=8954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.299908 kernel: audit: type=1103 audit(1707801148.849:1742): pid=8956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:28.849000 audit[8956]: CRED_ACQ pid=8956 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.389022 kernel: audit: type=1106 audit(1707801148.925:1743): pid=8954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:28.925000 audit[8954]: USER_END pid=8954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:29.484372 kernel: audit: type=1104 audit(1707801148.925:1744): pid=8954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:28.925000 audit[8954]: CRED_DISP pid=8954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:28.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.90.239:22-139.178.68.195:47810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:30.259583 sshd[8952]: kex_exchange_identification: read: Connection reset by peer Feb 13 05:12:30.259583 sshd[8952]: Connection reset by 172.105.128.11 port 2438 Feb 13 05:12:30.261130 systemd[1]: sshd@28-139.178.90.239:22-172.105.128.11:2438.service: Deactivated successfully. Feb 13 05:12:30.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.90.239:22-172.105.128.11:2438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:30.346319 systemd[1]: Started sshd@30-139.178.90.239:22-172.105.128.11:47170.service. Feb 13 05:12:30.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.239:22-172.105.128.11:47170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:33.930531 systemd[1]: Started sshd@31-139.178.90.239:22-139.178.68.195:47816.service. Feb 13 05:12:33.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.239:22-139.178.68.195:47816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:33.957150 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:12:33.957195 kernel: audit: type=1130 audit(1707801153.929:1748): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.239:22-139.178.68.195:47816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:34.076000 audit[9017]: USER_ACCT pid=9017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.077480 sshd[9017]: Accepted publickey for core from 139.178.68.195 port 47816 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:34.078692 sshd[9017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:34.081102 systemd-logind[1467]: New session 15 of user core. Feb 13 05:12:34.081658 systemd[1]: Started session-15.scope. Feb 13 05:12:34.160502 sshd[9017]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:34.161983 systemd[1]: sshd@31-139.178.90.239:22-139.178.68.195:47816.service: Deactivated successfully. Feb 13 05:12:34.162436 systemd[1]: session-15.scope: Deactivated successfully. Feb 13 05:12:34.162826 systemd-logind[1467]: Session 15 logged out. Waiting for processes to exit. Feb 13 05:12:34.163305 systemd-logind[1467]: Removed session 15. Feb 13 05:12:34.077000 audit[9017]: CRED_ACQ pid=9017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.169522 kernel: audit: type=1101 audit(1707801154.076:1749): pid=9017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.169565 kernel: audit: type=1103 audit(1707801154.077:1750): pid=9017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.317516 kernel: audit: type=1006 audit(1707801154.077:1751): pid=9017 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 13 05:12:34.317555 kernel: audit: type=1300 audit(1707801154.077:1751): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5dc4feb0 a2=3 a3=0 items=0 ppid=1 pid=9017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:34.077000 audit[9017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5dc4feb0 a2=3 a3=0 items=0 ppid=1 pid=9017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:34.403436 sshd[8984]: kex_exchange_identification: read: Connection reset by peer Feb 13 05:12:34.403436 sshd[8984]: Connection reset by 172.105.128.11 port 47170 Feb 13 05:12:34.403740 systemd[1]: sshd@30-139.178.90.239:22-172.105.128.11:47170.service: Deactivated successfully. Feb 13 05:12:34.409265 kernel: audit: type=1327 audit(1707801154.077:1751): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:34.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:34.439746 kernel: audit: type=1105 audit(1707801154.082:1752): pid=9017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.082000 audit[9017]: USER_START pid=9017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.475839 systemd[1]: Started sshd@32-139.178.90.239:22-172.105.128.11:47180.service. Feb 13 05:12:34.533985 kernel: audit: type=1103 audit(1707801154.083:1753): pid=9027 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.083000 audit[9027]: CRED_ACQ pid=9027 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.622967 kernel: audit: type=1106 audit(1707801154.159:1754): pid=9017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.159000 audit[9017]: USER_END pid=9017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.159000 audit[9017]: CRED_DISP pid=9017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.807281 kernel: audit: type=1104 audit(1707801154.159:1755): pid=9017 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:34.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.90.239:22-139.178.68.195:47816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:34.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.90.239:22-172.105.128.11:47170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:34.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.239:22-172.105.128.11:47180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:35.633368 sshd[9053]: kex_exchange_identification: read: Connection reset by peer Feb 13 05:12:35.633368 sshd[9053]: Connection reset by 172.105.128.11 port 47180 Feb 13 05:12:35.634878 systemd[1]: sshd@32-139.178.90.239:22-172.105.128.11:47180.service: Deactivated successfully. Feb 13 05:12:35.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.90.239:22-172.105.128.11:47180 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:39.173335 systemd[1]: Started sshd@33-139.178.90.239:22-139.178.68.195:59452.service. Feb 13 05:12:39.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.239:22-139.178.68.195:59452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:39.200744 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:12:39.200826 kernel: audit: type=1130 audit(1707801159.172:1760): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.239:22-139.178.68.195:59452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:39.321000 audit[9057]: USER_ACCT pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.323447 sshd[9057]: Accepted publickey for core from 139.178.68.195 port 59452 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:39.324741 sshd[9057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:39.327120 systemd-logind[1467]: New session 16 of user core. Feb 13 05:12:39.327841 systemd[1]: Started session-16.scope. Feb 13 05:12:39.408922 sshd[9057]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:39.410357 systemd[1]: sshd@33-139.178.90.239:22-139.178.68.195:59452.service: Deactivated successfully. Feb 13 05:12:39.410890 systemd[1]: session-16.scope: Deactivated successfully. Feb 13 05:12:39.411223 systemd-logind[1467]: Session 16 logged out. Waiting for processes to exit. Feb 13 05:12:39.411657 systemd-logind[1467]: Removed session 16. Feb 13 05:12:39.323000 audit[9057]: CRED_ACQ pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.507172 kernel: audit: type=1101 audit(1707801159.321:1761): pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.507228 kernel: audit: type=1103 audit(1707801159.323:1762): pid=9057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.507249 kernel: audit: type=1006 audit(1707801159.323:1763): pid=9057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 13 05:12:39.323000 audit[9057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b781dd0 a2=3 a3=0 items=0 ppid=1 pid=9057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:39.657661 kernel: audit: type=1300 audit(1707801159.323:1763): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0b781dd0 a2=3 a3=0 items=0 ppid=1 pid=9057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:39.657697 kernel: audit: type=1327 audit(1707801159.323:1763): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:39.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:39.688148 kernel: audit: type=1105 audit(1707801159.328:1764): pid=9057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.328000 audit[9057]: USER_START pid=9057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.782625 kernel: audit: type=1103 audit(1707801159.329:1765): pid=9059 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.329000 audit[9059]: CRED_ACQ pid=9059 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.871763 kernel: audit: type=1106 audit(1707801159.408:1766): pid=9057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.408000 audit[9057]: USER_END pid=9057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.408000 audit[9057]: CRED_DISP pid=9057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:40.056376 kernel: audit: type=1104 audit(1707801159.408:1767): pid=9057 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:39.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.90.239:22-139.178.68.195:59452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:44.418737 systemd[1]: Started sshd@34-139.178.90.239:22-139.178.68.195:59458.service. Feb 13 05:12:44.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.239:22-139.178.68.195:59458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:44.445601 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:12:44.445689 kernel: audit: type=1130 audit(1707801164.417:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.239:22-139.178.68.195:59458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:44.566000 audit[9086]: USER_ACCT pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.568163 sshd[9086]: Accepted publickey for core from 139.178.68.195 port 59458 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:44.569994 sshd[9086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:44.572338 systemd-logind[1467]: New session 17 of user core. Feb 13 05:12:44.572833 systemd[1]: Started session-17.scope. Feb 13 05:12:44.651575 sshd[9086]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:44.653325 systemd[1]: sshd@34-139.178.90.239:22-139.178.68.195:59458.service: Deactivated successfully. Feb 13 05:12:44.653703 systemd[1]: session-17.scope: Deactivated successfully. Feb 13 05:12:44.654049 systemd-logind[1467]: Session 17 logged out. Waiting for processes to exit. Feb 13 05:12:44.654709 systemd[1]: Started sshd@35-139.178.90.239:22-139.178.68.195:59464.service. Feb 13 05:12:44.655157 systemd-logind[1467]: Removed session 17. Feb 13 05:12:44.568000 audit[9086]: CRED_ACQ pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.749937 kernel: audit: type=1101 audit(1707801164.566:1770): pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.749977 kernel: audit: type=1103 audit(1707801164.568:1771): pid=9086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.749995 kernel: audit: type=1006 audit(1707801164.568:1772): pid=9086 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 13 05:12:44.808498 kernel: audit: type=1300 audit(1707801164.568:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91f32900 a2=3 a3=0 items=0 ppid=1 pid=9086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:44.568000 audit[9086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe91f32900 a2=3 a3=0 items=0 ppid=1 pid=9086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:44.900515 kernel: audit: type=1327 audit(1707801164.568:1772): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:44.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:44.573000 audit[9086]: USER_START pid=9086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.932522 sshd[9112]: Accepted publickey for core from 139.178.68.195 port 59464 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:44.933762 sshd[9112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:44.936134 systemd-logind[1467]: New session 18 of user core. Feb 13 05:12:44.936682 systemd[1]: Started session-18.scope. Feb 13 05:12:45.025560 kernel: audit: type=1105 audit(1707801164.573:1773): pid=9086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.025652 kernel: audit: type=1103 audit(1707801164.574:1774): pid=9088 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.574000 audit[9088]: CRED_ACQ pid=9088 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.114876 kernel: audit: type=1106 audit(1707801164.650:1775): pid=9086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.650000 audit[9086]: USER_END pid=9086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.210503 kernel: audit: type=1104 audit(1707801164.650:1776): pid=9086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.650000 audit[9086]: CRED_DISP pid=9086 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.90.239:22-139.178.68.195:59458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:44.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.239:22-139.178.68.195:59464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:44.930000 audit[9112]: USER_ACCT pid=9112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.932000 audit[9112]: CRED_ACQ pid=9112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.932000 audit[9112]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9d5d8610 a2=3 a3=0 items=0 ppid=1 pid=9112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:44.932000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:44.937000 audit[9112]: USER_START pid=9112 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:44.938000 audit[9114]: CRED_ACQ pid=9114 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.451569 sshd[9112]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:45.450000 audit[9112]: USER_END pid=9112 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.450000 audit[9112]: CRED_DISP pid=9112 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.453593 systemd[1]: sshd@35-139.178.90.239:22-139.178.68.195:59464.service: Deactivated successfully. Feb 13 05:12:45.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.90.239:22-139.178.68.195:59464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:45.454066 systemd[1]: session-18.scope: Deactivated successfully. Feb 13 05:12:45.454405 systemd-logind[1467]: Session 18 logged out. Waiting for processes to exit. Feb 13 05:12:45.455162 systemd[1]: Started sshd@36-139.178.90.239:22-139.178.68.195:59468.service. Feb 13 05:12:45.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.239:22-139.178.68.195:59468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:45.455581 systemd-logind[1467]: Removed session 18. Feb 13 05:12:45.492000 audit[9137]: USER_ACCT pid=9137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.493645 sshd[9137]: Accepted publickey for core from 139.178.68.195 port 59468 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:45.492000 audit[9137]: CRED_ACQ pid=9137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.492000 audit[9137]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec6744920 a2=3 a3=0 items=0 ppid=1 pid=9137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:45.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:45.494316 sshd[9137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:45.496921 systemd-logind[1467]: New session 19 of user core. Feb 13 05:12:45.497503 systemd[1]: Started session-19.scope. Feb 13 05:12:45.499000 audit[9137]: USER_START pid=9137 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.499000 audit[9140]: CRED_ACQ pid=9140 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.623662 sshd[9137]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:45.622000 audit[9137]: USER_END pid=9137 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.623000 audit[9137]: CRED_DISP pid=9137 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:45.625104 systemd[1]: sshd@36-139.178.90.239:22-139.178.68.195:59468.service: Deactivated successfully. Feb 13 05:12:45.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.90.239:22-139.178.68.195:59468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:45.625563 systemd[1]: session-19.scope: Deactivated successfully. Feb 13 05:12:45.625985 systemd-logind[1467]: Session 19 logged out. Waiting for processes to exit. Feb 13 05:12:45.626428 systemd-logind[1467]: Removed session 19. Feb 13 05:12:50.633386 systemd[1]: Started sshd@37-139.178.90.239:22-139.178.68.195:47480.service. Feb 13 05:12:50.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.239:22-139.178.68.195:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:50.660255 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 13 05:12:50.660323 kernel: audit: type=1130 audit(1707801170.632:1796): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.239:22-139.178.68.195:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:50.781000 audit[9164]: USER_ACCT pid=9164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.783276 sshd[9164]: Accepted publickey for core from 139.178.68.195 port 47480 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:50.784494 sshd[9164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:50.787152 systemd-logind[1467]: New session 20 of user core. Feb 13 05:12:50.787618 systemd[1]: Started session-20.scope. Feb 13 05:12:50.868803 sshd[9164]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:50.870168 systemd[1]: sshd@37-139.178.90.239:22-139.178.68.195:47480.service: Deactivated successfully. Feb 13 05:12:50.870609 systemd[1]: session-20.scope: Deactivated successfully. Feb 13 05:12:50.870992 systemd-logind[1467]: Session 20 logged out. Waiting for processes to exit. Feb 13 05:12:50.871409 systemd-logind[1467]: Removed session 20. Feb 13 05:12:50.782000 audit[9164]: CRED_ACQ pid=9164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.966456 kernel: audit: type=1101 audit(1707801170.781:1797): pid=9164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.966499 kernel: audit: type=1103 audit(1707801170.782:1798): pid=9164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.966521 kernel: audit: type=1006 audit(1707801170.782:1799): pid=9164 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 13 05:12:51.025016 kernel: audit: type=1300 audit(1707801170.782:1799): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc99d641d0 a2=3 a3=0 items=0 ppid=1 pid=9164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:50.782000 audit[9164]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc99d641d0 a2=3 a3=0 items=0 ppid=1 pid=9164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:51.117009 kernel: audit: type=1327 audit(1707801170.782:1799): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:50.782000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:51.147515 kernel: audit: type=1105 audit(1707801170.788:1800): pid=9164 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.788000 audit[9164]: USER_START pid=9164 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:51.242088 kernel: audit: type=1103 audit(1707801170.789:1801): pid=9166 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.789000 audit[9166]: CRED_ACQ pid=9166 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.868000 audit[9164]: USER_END pid=9164 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:51.426839 kernel: audit: type=1106 audit(1707801170.868:1802): pid=9164 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:51.426903 kernel: audit: type=1104 audit(1707801170.868:1803): pid=9164 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.868000 audit[9164]: CRED_DISP pid=9164 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:50.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.90.239:22-139.178.68.195:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:53.911629 systemd[1]: Started sshd@38-139.178.90.239:22-218.92.0.112:34457.service. Feb 13 05:12:53.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.239:22-218.92.0.112:34457 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:54.958085 sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:12:54.956000 audit[9235]: USER_AUTH pid=9235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:12:55.878225 systemd[1]: Started sshd@39-139.178.90.239:22-139.178.68.195:47482.service. Feb 13 05:12:55.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.239:22-139.178.68.195:47482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:55.905334 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:12:55.905370 kernel: audit: type=1130 audit(1707801175.876:1807): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.239:22-139.178.68.195:47482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:56.025000 audit[9239]: USER_ACCT pid=9239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.027072 sshd[9239]: Accepted publickey for core from 139.178.68.195 port 47482 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:12:56.027755 sshd[9239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:12:56.030365 systemd-logind[1467]: New session 21 of user core. Feb 13 05:12:56.030872 systemd[1]: Started session-21.scope. Feb 13 05:12:56.110471 sshd[9239]: pam_unix(sshd:session): session closed for user core Feb 13 05:12:56.111934 systemd[1]: sshd@39-139.178.90.239:22-139.178.68.195:47482.service: Deactivated successfully. Feb 13 05:12:56.112391 systemd[1]: session-21.scope: Deactivated successfully. Feb 13 05:12:56.112811 systemd-logind[1467]: Session 21 logged out. Waiting for processes to exit. Feb 13 05:12:56.113372 systemd-logind[1467]: Removed session 21. Feb 13 05:12:56.026000 audit[9239]: CRED_ACQ pid=9239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.208829 kernel: audit: type=1101 audit(1707801176.025:1808): pid=9239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.208868 kernel: audit: type=1103 audit(1707801176.026:1809): pid=9239 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.208884 kernel: audit: type=1006 audit(1707801176.026:1810): pid=9239 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 13 05:12:56.267435 kernel: audit: type=1300 audit(1707801176.026:1810): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a5ee9d0 a2=3 a3=0 items=0 ppid=1 pid=9239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:56.026000 audit[9239]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a5ee9d0 a2=3 a3=0 items=0 ppid=1 pid=9239 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:12:56.360106 kernel: audit: type=1327 audit(1707801176.026:1810): proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:56.026000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:12:56.390644 kernel: audit: type=1105 audit(1707801176.031:1811): pid=9239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.031000 audit[9239]: USER_START pid=9239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.485134 kernel: audit: type=1103 audit(1707801176.032:1812): pid=9241 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.032000 audit[9241]: CRED_ACQ pid=9241 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.574315 kernel: audit: type=1106 audit(1707801176.109:1813): pid=9239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.109000 audit[9239]: USER_END pid=9239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.669794 kernel: audit: type=1104 audit(1707801176.109:1814): pid=9239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.109000 audit[9239]: CRED_DISP pid=9239 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:12:56.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.90.239:22-139.178.68.195:47482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:12:56.935698 sshd[9235]: Failed password for root from 218.92.0.112 port 34457 ssh2 Feb 13 05:12:58.159000 audit[9235]: USER_AUTH pid=9235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:00.353817 sshd[9235]: Failed password for root from 218.92.0.112 port 34457 ssh2 Feb 13 05:13:01.120587 systemd[1]: Started sshd@40-139.178.90.239:22-139.178.68.195:43134.service. Feb 13 05:13:01.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.239:22-139.178.68.195:43134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:01.147834 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 05:13:01.147900 kernel: audit: type=1130 audit(1707801181.119:1817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.239:22-139.178.68.195:43134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:01.269000 audit[9281]: USER_ACCT pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.271799 sshd[9281]: Accepted publickey for core from 139.178.68.195 port 43134 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:01.276895 sshd[9281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:01.279242 systemd-logind[1467]: New session 22 of user core. Feb 13 05:13:01.279837 systemd[1]: Started session-22.scope. Feb 13 05:13:01.358003 sshd[9281]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:01.359377 systemd[1]: sshd@40-139.178.90.239:22-139.178.68.195:43134.service: Deactivated successfully. Feb 13 05:13:01.359903 systemd[1]: session-22.scope: Deactivated successfully. Feb 13 05:13:01.360267 systemd-logind[1467]: Session 22 logged out. Waiting for processes to exit. Feb 13 05:13:01.360710 systemd-logind[1467]: Removed session 22. Feb 13 05:13:01.274000 audit[9281]: CRED_ACQ pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.453195 kernel: audit: type=1101 audit(1707801181.269:1818): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.453231 kernel: audit: type=1103 audit(1707801181.274:1819): pid=9281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.453249 kernel: audit: type=1006 audit(1707801181.274:1820): pid=9281 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 13 05:13:01.511717 kernel: audit: type=1300 audit(1707801181.274:1820): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3463d6e0 a2=3 a3=0 items=0 ppid=1 pid=9281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:01.274000 audit[9281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3463d6e0 a2=3 a3=0 items=0 ppid=1 pid=9281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:01.603645 kernel: audit: type=1327 audit(1707801181.274:1820): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:01.274000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:01.280000 audit[9281]: USER_START pid=9281 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.728737 kernel: audit: type=1105 audit(1707801181.280:1821): pid=9281 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.728771 kernel: audit: type=1103 audit(1707801181.281:1822): pid=9283 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.281000 audit[9283]: CRED_ACQ pid=9283 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.817933 kernel: audit: type=1106 audit(1707801181.357:1823): pid=9281 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.357000 audit[9281]: USER_END pid=9281 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.357000 audit[9281]: CRED_DISP pid=9281 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.913466 kernel: audit: type=1104 audit(1707801181.357:1824): pid=9281 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:01.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.90.239:22-139.178.68.195:43134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:01.359000 audit[9235]: USER_AUTH pid=9235 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:02.630610 sshd[9235]: Failed password for root from 218.92.0.112 port 34457 ssh2 Feb 13 05:13:03.825622 sshd[9235]: Received disconnect from 218.92.0.112 port 34457:11: [preauth] Feb 13 05:13:03.825622 sshd[9235]: Disconnected from authenticating user root 218.92.0.112 port 34457 [preauth] Feb 13 05:13:03.826162 sshd[9235]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:03.828310 systemd[1]: sshd@38-139.178.90.239:22-218.92.0.112:34457.service: Deactivated successfully. Feb 13 05:13:03.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.90.239:22-218.92.0.112:34457 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:04.001480 systemd[1]: Started sshd@41-139.178.90.239:22-218.92.0.112:42688.service. Feb 13 05:13:04.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.239:22-218.92.0.112:42688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:05.094366 sshd[9346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:05.093000 audit[9346]: USER_AUTH pid=9346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:06.367846 systemd[1]: Started sshd@42-139.178.90.239:22-139.178.68.195:34892.service. Feb 13 05:13:06.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.239:22-139.178.68.195:34892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:06.394874 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:13:06.394911 kernel: audit: type=1130 audit(1707801186.366:1830): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.239:22-139.178.68.195:34892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:06.515000 audit[9350]: USER_ACCT pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.517548 sshd[9350]: Accepted publickey for core from 139.178.68.195 port 34892 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:06.521896 sshd[9350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:06.526103 systemd-logind[1467]: New session 23 of user core. Feb 13 05:13:06.526684 systemd[1]: Started session-23.scope. Feb 13 05:13:06.607510 sshd[9350]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:06.519000 audit[9350]: CRED_ACQ pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.609041 systemd[1]: sshd@42-139.178.90.239:22-139.178.68.195:34892.service: Deactivated successfully. Feb 13 05:13:06.609504 systemd[1]: session-23.scope: Deactivated successfully. Feb 13 05:13:06.609875 systemd-logind[1467]: Session 23 logged out. Waiting for processes to exit. Feb 13 05:13:06.610300 systemd-logind[1467]: Removed session 23. Feb 13 05:13:06.699054 kernel: audit: type=1101 audit(1707801186.515:1831): pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.699104 kernel: audit: type=1103 audit(1707801186.519:1832): pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.699124 kernel: audit: type=1006 audit(1707801186.519:1833): pid=9350 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 13 05:13:06.757569 kernel: audit: type=1300 audit(1707801186.519:1833): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf256e180 a2=3 a3=0 items=0 ppid=1 pid=9350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:06.519000 audit[9350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf256e180 a2=3 a3=0 items=0 ppid=1 pid=9350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:06.849630 kernel: audit: type=1327 audit(1707801186.519:1833): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:06.519000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:06.880124 kernel: audit: type=1105 audit(1707801186.527:1834): pid=9350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.527000 audit[9350]: USER_START pid=9350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.974638 kernel: audit: type=1103 audit(1707801186.527:1835): pid=9352 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.527000 audit[9352]: CRED_ACQ pid=9352 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:07.063854 kernel: audit: type=1106 audit(1707801186.606:1836): pid=9350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.606000 audit[9350]: USER_END pid=9350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:07.159349 kernel: audit: type=1104 audit(1707801186.606:1837): pid=9350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.606000 audit[9350]: CRED_DISP pid=9350 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:06.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.90.239:22-139.178.68.195:34892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:07.248659 sshd[9346]: Failed password for root from 218.92.0.112 port 42688 ssh2 Feb 13 05:13:08.296000 audit[9346]: ANOM_LOGIN_FAILURES pid=9346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:08.296000 audit[9346]: USER_AUTH pid=9346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:08.298153 sshd[9346]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 05:13:09.864636 sshd[9346]: Failed password for root from 218.92.0.112 port 42688 ssh2 Feb 13 05:13:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c2fdc0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:13:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:13:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000569980 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:13:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:13:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0187f86c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:13:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:13:11.205000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:11.205000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0124430e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:13:11.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:13:11.206000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:11.206000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00ab4e4c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:13:11.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:13:11.215000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:11.215000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c017560780 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:13:11.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:13:11.215000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:11.215000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0187f8720 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:13:11.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:13:11.217000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:11.217000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00a8ac680 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:13:11.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:13:11.500000 audit[9346]: USER_AUTH pid=9346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:11.528587 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 05:13:11.528665 kernel: audit: type=1100 audit(1707801191.500:1849): pid=9346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:11.609997 systemd[1]: Started sshd@43-139.178.90.239:22-139.178.68.195:34906.service. Feb 13 05:13:11.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.239:22-139.178.68.195:34906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:11.708283 kernel: audit: type=1130 audit(1707801191.608:1850): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.239:22-139.178.68.195:34906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:11.740810 sshd[9375]: Accepted publickey for core from 139.178.68.195 port 34906 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:11.739000 audit[9375]: USER_ACCT pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.741735 sshd[9375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:11.744084 systemd-logind[1467]: New session 24 of user core. Feb 13 05:13:11.744600 systemd[1]: Started session-24.scope. Feb 13 05:13:11.740000 audit[9375]: CRED_ACQ pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.836842 sshd[9375]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:11.838171 systemd[1]: sshd@43-139.178.90.239:22-139.178.68.195:34906.service: Deactivated successfully. Feb 13 05:13:11.838633 systemd[1]: session-24.scope: Deactivated successfully. Feb 13 05:13:11.839080 systemd-logind[1467]: Session 24 logged out. Waiting for processes to exit. Feb 13 05:13:11.839590 systemd-logind[1467]: Removed session 24. Feb 13 05:13:11.923328 kernel: audit: type=1101 audit(1707801191.739:1851): pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.923389 kernel: audit: type=1103 audit(1707801191.740:1852): pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.923415 kernel: audit: type=1006 audit(1707801191.740:1853): pid=9375 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 13 05:13:11.740000 audit[9375]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd78700b30 a2=3 a3=0 items=0 ppid=1 pid=9375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:12.073963 kernel: audit: type=1300 audit(1707801191.740:1853): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd78700b30 a2=3 a3=0 items=0 ppid=1 pid=9375 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:11.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:12.104516 kernel: audit: type=1327 audit(1707801191.740:1853): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:12.104557 kernel: audit: type=1105 audit(1707801191.745:1854): pid=9375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.745000 audit[9375]: USER_START pid=9375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.746000 audit[9377]: CRED_ACQ pid=9377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:12.200511 kernel: audit: type=1103 audit(1707801191.746:1855): pid=9377 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.836000 audit[9375]: USER_END pid=9375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:12.384765 kernel: audit: type=1106 audit(1707801191.836:1856): pid=9375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.836000 audit[9375]: CRED_DISP pid=9375 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:11.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.90.239:22-139.178.68.195:34906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:13.479826 sshd[9346]: Failed password for root from 218.92.0.112 port 42688 ssh2 Feb 13 05:13:14.707098 sshd[9346]: Received disconnect from 218.92.0.112 port 42688:11: [preauth] Feb 13 05:13:14.707098 sshd[9346]: Disconnected from authenticating user root 218.92.0.112 port 42688 [preauth] Feb 13 05:13:14.707669 sshd[9346]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:14.709875 systemd[1]: sshd@41-139.178.90.239:22-218.92.0.112:42688.service: Deactivated successfully. Feb 13 05:13:14.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.90.239:22-218.92.0.112:42688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:14.883501 systemd[1]: Started sshd@44-139.178.90.239:22-218.92.0.112:54579.service. Feb 13 05:13:14.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.239:22-218.92.0.112:54579 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:16.845930 systemd[1]: Started sshd@45-139.178.90.239:22-139.178.68.195:57046.service. Feb 13 05:13:16.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.239:22-139.178.68.195:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:16.872395 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:13:16.872443 kernel: audit: type=1130 audit(1707801196.844:1861): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.239:22-139.178.68.195:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:16.898039 sshd[9401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:16.896000 audit[9401]: USER_AUTH pid=9401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:16.963490 kernel: audit: type=1100 audit(1707801196.896:1862): pid=9401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:16.995209 sshd[9407]: Accepted publickey for core from 139.178.68.195 port 57046 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:16.997145 sshd[9407]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:16.999461 systemd-logind[1467]: New session 25 of user core. Feb 13 05:13:17.000172 systemd[1]: Started session-25.scope. Feb 13 05:13:16.993000 audit[9407]: USER_ACCT pid=9407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.079308 sshd[9407]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:17.080731 systemd[1]: sshd@45-139.178.90.239:22-139.178.68.195:57046.service: Deactivated successfully. Feb 13 05:13:17.081192 systemd[1]: session-25.scope: Deactivated successfully. Feb 13 05:13:17.081482 systemd-logind[1467]: Session 25 logged out. Waiting for processes to exit. Feb 13 05:13:17.081959 systemd-logind[1467]: Removed session 25. Feb 13 05:13:17.145812 kernel: audit: type=1101 audit(1707801196.993:1863): pid=9407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.145852 kernel: audit: type=1103 audit(1707801196.995:1864): pid=9407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:16.995000 audit[9407]: CRED_ACQ pid=9407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.236803 kernel: audit: type=1006 audit(1707801196.995:1865): pid=9407 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 13 05:13:16.995000 audit[9407]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaffd4900 a2=3 a3=0 items=0 ppid=1 pid=9407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:17.388221 kernel: audit: type=1300 audit(1707801196.995:1865): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaffd4900 a2=3 a3=0 items=0 ppid=1 pid=9407 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:17.388254 kernel: audit: type=1327 audit(1707801196.995:1865): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:16.995000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:17.418902 kernel: audit: type=1105 audit(1707801197.000:1866): pid=9407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.000000 audit[9407]: USER_START pid=9407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.514775 kernel: audit: type=1103 audit(1707801197.001:1867): pid=9409 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.001000 audit[9409]: CRED_ACQ pid=9409 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.604590 kernel: audit: type=1106 audit(1707801197.078:1868): pid=9407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.078000 audit[9407]: USER_END pid=9407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.078000 audit[9407]: CRED_DISP pid=9407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:17.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.90.239:22-139.178.68.195:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:18.896077 sshd[9401]: Failed password for root from 218.92.0.112 port 54579 ssh2 Feb 13 05:13:20.517000 audit[9401]: USER_AUTH pid=9401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:21.767000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:13:21.767000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001cd0780 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:13:21.767000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:13:22.065535 sshd[9401]: Failed password for root from 218.92.0.112 port 54579 ssh2 Feb 13 05:13:22.088960 systemd[1]: Started sshd@46-139.178.90.239:22-139.178.68.195:57060.service. Feb 13 05:13:22.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.239:22-139.178.68.195:57060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:22.116410 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 13 05:13:22.116494 kernel: audit: type=1130 audit(1707801202.087:1873): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.239:22-139.178.68.195:57060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:22.238000 audit[9470]: USER_ACCT pid=9470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.239934 sshd[9470]: Accepted publickey for core from 139.178.68.195 port 57060 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:22.240740 sshd[9470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:22.242979 systemd-logind[1467]: New session 26 of user core. Feb 13 05:13:22.243529 systemd[1]: Started session-26.scope. Feb 13 05:13:22.323599 sshd[9470]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:22.325114 systemd[1]: sshd@46-139.178.90.239:22-139.178.68.195:57060.service: Deactivated successfully. Feb 13 05:13:22.325647 systemd[1]: session-26.scope: Deactivated successfully. Feb 13 05:13:22.326064 systemd-logind[1467]: Session 26 logged out. Waiting for processes to exit. Feb 13 05:13:22.326435 systemd-logind[1467]: Removed session 26. Feb 13 05:13:22.239000 audit[9470]: CRED_ACQ pid=9470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.425019 kernel: audit: type=1101 audit(1707801202.238:1874): pid=9470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.425070 kernel: audit: type=1103 audit(1707801202.239:1875): pid=9470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.425089 kernel: audit: type=1006 audit(1707801202.239:1876): pid=9470 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 13 05:13:22.484310 kernel: audit: type=1300 audit(1707801202.239:1876): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0ea6330 a2=3 a3=0 items=0 ppid=1 pid=9470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:22.239000 audit[9470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0ea6330 a2=3 a3=0 items=0 ppid=1 pid=9470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:22.577277 kernel: audit: type=1327 audit(1707801202.239:1876): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:22.239000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:22.608111 kernel: audit: type=1105 audit(1707801202.244:1877): pid=9470 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.244000 audit[9470]: USER_START pid=9470 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.703630 kernel: audit: type=1103 audit(1707801202.245:1878): pid=9472 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.245000 audit[9472]: CRED_ACQ pid=9472 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.793370 kernel: audit: type=1106 audit(1707801202.322:1879): pid=9470 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.322000 audit[9470]: USER_END pid=9470 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.889433 kernel: audit: type=1104 audit(1707801202.322:1880): pid=9470 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.322000 audit[9470]: CRED_DISP pid=9470 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:22.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.90.239:22-139.178.68.195:57060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:23.723000 audit[9401]: USER_AUTH pid=9401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.112 addr=218.92.0.112 terminal=ssh res=failed' Feb 13 05:13:24.378000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:24.378000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000772540 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:13:24.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:13:24.378000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:24.378000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001736ba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:13:24.378000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:13:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150db60 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:13:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:13:24.381000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:13:24.381000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150dba0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:13:24.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:13:26.018332 sshd[9401]: Failed password for root from 218.92.0.112 port 54579 ssh2 Feb 13 05:13:26.932735 sshd[9401]: Received disconnect from 218.92.0.112 port 54579:11: [preauth] Feb 13 05:13:26.932735 sshd[9401]: Disconnected from authenticating user root 218.92.0.112 port 54579 [preauth] Feb 13 05:13:26.933273 sshd[9401]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.112 user=root Feb 13 05:13:26.935496 systemd[1]: sshd@44-139.178.90.239:22-218.92.0.112:54579.service: Deactivated successfully. Feb 13 05:13:26.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.90.239:22-218.92.0.112:54579 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:26.974000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:13:26.974000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fb06c0 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:13:26.974000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:13:27.333157 systemd[1]: Started sshd@47-139.178.90.239:22-139.178.68.195:35394.service. Feb 13 05:13:27.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.239:22-139.178.68.195:35394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:27.359991 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 13 05:13:27.360115 kernel: audit: type=1130 audit(1707801207.331:1889): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.239:22-139.178.68.195:35394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:27.481871 sshd[9524]: Accepted publickey for core from 139.178.68.195 port 35394 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:27.480000 audit[9524]: USER_ACCT pid=9524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.482759 sshd[9524]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:27.485014 systemd-logind[1467]: New session 27 of user core. Feb 13 05:13:27.485711 systemd[1]: Started session-27.scope. Feb 13 05:13:27.567298 sshd[9524]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:27.568848 systemd[1]: sshd@47-139.178.90.239:22-139.178.68.195:35394.service: Deactivated successfully. Feb 13 05:13:27.569296 systemd[1]: session-27.scope: Deactivated successfully. Feb 13 05:13:27.569733 systemd-logind[1467]: Session 27 logged out. Waiting for processes to exit. Feb 13 05:13:27.570255 systemd-logind[1467]: Removed session 27. Feb 13 05:13:27.481000 audit[9524]: CRED_ACQ pid=9524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.665754 kernel: audit: type=1101 audit(1707801207.480:1890): pid=9524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.665802 kernel: audit: type=1103 audit(1707801207.481:1891): pid=9524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.665821 kernel: audit: type=1006 audit(1707801207.481:1892): pid=9524 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 13 05:13:27.724676 kernel: audit: type=1300 audit(1707801207.481:1892): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01d39900 a2=3 a3=0 items=0 ppid=1 pid=9524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:27.481000 audit[9524]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe01d39900 a2=3 a3=0 items=0 ppid=1 pid=9524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:27.817144 kernel: audit: type=1327 audit(1707801207.481:1892): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:27.481000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:27.847814 kernel: audit: type=1105 audit(1707801207.486:1893): pid=9524 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.486000 audit[9524]: USER_START pid=9524 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.942792 kernel: audit: type=1103 audit(1707801207.487:1894): pid=9526 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.487000 audit[9526]: CRED_ACQ pid=9526 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.566000 audit[9524]: USER_END pid=9524 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:28.127406 kernel: audit: type=1106 audit(1707801207.566:1895): pid=9524 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:28.127449 kernel: audit: type=1104 audit(1707801207.566:1896): pid=9524 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.566000 audit[9524]: CRED_DISP pid=9524 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:27.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.90.239:22-139.178.68.195:35394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:32.576170 systemd[1]: Started sshd@48-139.178.90.239:22-139.178.68.195:35406.service. Feb 13 05:13:32.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.239:22-139.178.68.195:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:32.603338 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:13:32.603410 kernel: audit: type=1130 audit(1707801212.574:1898): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.239:22-139.178.68.195:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:32.724000 audit[9551]: USER_ACCT pid=9551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.726069 sshd[9551]: Accepted publickey for core from 139.178.68.195 port 35406 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:32.726763 sshd[9551]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:32.729449 systemd-logind[1467]: New session 28 of user core. Feb 13 05:13:32.730575 systemd[1]: Started session-28.scope. Feb 13 05:13:32.810401 sshd[9551]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:32.812120 systemd[1]: sshd@48-139.178.90.239:22-139.178.68.195:35406.service: Deactivated successfully. Feb 13 05:13:32.812919 systemd[1]: session-28.scope: Deactivated successfully. Feb 13 05:13:32.813421 systemd-logind[1467]: Session 28 logged out. Waiting for processes to exit. Feb 13 05:13:32.814026 systemd-logind[1467]: Removed session 28. Feb 13 05:13:32.725000 audit[9551]: CRED_ACQ pid=9551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.907871 kernel: audit: type=1101 audit(1707801212.724:1899): pid=9551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.907929 kernel: audit: type=1103 audit(1707801212.725:1900): pid=9551 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.907946 kernel: audit: type=1006 audit(1707801212.725:1901): pid=9551 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 13 05:13:32.966433 kernel: audit: type=1300 audit(1707801212.725:1901): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1b9e8240 a2=3 a3=0 items=0 ppid=1 pid=9551 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:32.725000 audit[9551]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1b9e8240 a2=3 a3=0 items=0 ppid=1 pid=9551 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:33.058401 kernel: audit: type=1327 audit(1707801212.725:1901): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:32.725000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:32.731000 audit[9551]: USER_START pid=9551 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:33.183436 kernel: audit: type=1105 audit(1707801212.731:1902): pid=9551 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:33.183518 kernel: audit: type=1103 audit(1707801212.732:1903): pid=9553 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.732000 audit[9553]: CRED_ACQ pid=9553 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.809000 audit[9551]: USER_END pid=9551 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:33.368229 kernel: audit: type=1106 audit(1707801212.809:1904): pid=9551 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:33.368284 kernel: audit: type=1104 audit(1707801212.809:1905): pid=9551 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.809000 audit[9551]: CRED_DISP pid=9551 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:32.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.90.239:22-139.178.68.195:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:37.820634 systemd[1]: Started sshd@49-139.178.90.239:22-139.178.68.195:53546.service. Feb 13 05:13:37.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.239:22-139.178.68.195:53546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:37.847564 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:13:37.847649 kernel: audit: type=1130 audit(1707801217.819:1907): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.239:22-139.178.68.195:53546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:37.970000 audit[9616]: USER_ACCT pid=9616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:37.971826 sshd[9616]: Accepted publickey for core from 139.178.68.195 port 53546 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:37.973715 sshd[9616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:37.975960 systemd-logind[1467]: New session 29 of user core. Feb 13 05:13:37.976495 systemd[1]: Started session-29.scope. Feb 13 05:13:38.055509 sshd[9616]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:38.057045 systemd[1]: sshd@49-139.178.90.239:22-139.178.68.195:53546.service: Deactivated successfully. Feb 13 05:13:38.057701 systemd[1]: session-29.scope: Deactivated successfully. Feb 13 05:13:38.058129 systemd-logind[1467]: Session 29 logged out. Waiting for processes to exit. Feb 13 05:13:38.058545 systemd-logind[1467]: Removed session 29. Feb 13 05:13:37.972000 audit[9616]: CRED_ACQ pid=9616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.153523 kernel: audit: type=1101 audit(1707801217.970:1908): pid=9616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.153579 kernel: audit: type=1103 audit(1707801217.972:1909): pid=9616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.153602 kernel: audit: type=1006 audit(1707801217.972:1910): pid=9616 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 13 05:13:38.212129 kernel: audit: type=1300 audit(1707801217.972:1910): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd725ea350 a2=3 a3=0 items=0 ppid=1 pid=9616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:37.972000 audit[9616]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd725ea350 a2=3 a3=0 items=0 ppid=1 pid=9616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:38.304066 kernel: audit: type=1327 audit(1707801217.972:1910): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:37.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:38.334519 kernel: audit: type=1105 audit(1707801217.977:1911): pid=9616 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:37.977000 audit[9616]: USER_START pid=9616 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.429029 kernel: audit: type=1103 audit(1707801217.977:1912): pid=9618 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:37.977000 audit[9618]: CRED_ACQ pid=9618 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.054000 audit[9616]: USER_END pid=9616 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.613590 kernel: audit: type=1106 audit(1707801218.054:1913): pid=9616 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.613694 kernel: audit: type=1104 audit(1707801218.054:1914): pid=9616 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.054000 audit[9616]: CRED_DISP pid=9616 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:38.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.90.239:22-139.178.68.195:53546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:43.065377 systemd[1]: Started sshd@50-139.178.90.239:22-139.178.68.195:53562.service. Feb 13 05:13:43.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.239:22-139.178.68.195:53562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:43.092417 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:13:43.092496 kernel: audit: type=1130 audit(1707801223.064:1916): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.239:22-139.178.68.195:53562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:43.212000 audit[9641]: USER_ACCT pid=9641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.214529 sshd[9641]: Accepted publickey for core from 139.178.68.195 port 53562 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:43.215774 sshd[9641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:43.218172 systemd-logind[1467]: New session 30 of user core. Feb 13 05:13:43.218663 systemd[1]: Started session-30.scope. Feb 13 05:13:43.297795 sshd[9641]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:43.299163 systemd[1]: sshd@50-139.178.90.239:22-139.178.68.195:53562.service: Deactivated successfully. Feb 13 05:13:43.299615 systemd[1]: session-30.scope: Deactivated successfully. Feb 13 05:13:43.299898 systemd-logind[1467]: Session 30 logged out. Waiting for processes to exit. Feb 13 05:13:43.300238 systemd-logind[1467]: Removed session 30. Feb 13 05:13:43.214000 audit[9641]: CRED_ACQ pid=9641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.396130 kernel: audit: type=1101 audit(1707801223.212:1917): pid=9641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.396172 kernel: audit: type=1103 audit(1707801223.214:1918): pid=9641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.396190 kernel: audit: type=1006 audit(1707801223.214:1919): pid=9641 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 13 05:13:43.454696 kernel: audit: type=1300 audit(1707801223.214:1919): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d691790 a2=3 a3=0 items=0 ppid=1 pid=9641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:43.214000 audit[9641]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2d691790 a2=3 a3=0 items=0 ppid=1 pid=9641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:43.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:43.577055 kernel: audit: type=1327 audit(1707801223.214:1919): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:43.577090 kernel: audit: type=1105 audit(1707801223.219:1920): pid=9641 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.219000 audit[9641]: USER_START pid=9641 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.671521 kernel: audit: type=1103 audit(1707801223.220:1921): pid=9643 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.220000 audit[9643]: CRED_ACQ pid=9643 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.760691 kernel: audit: type=1106 audit(1707801223.297:1922): pid=9641 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.297000 audit[9641]: USER_END pid=9641 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.856150 kernel: audit: type=1104 audit(1707801223.297:1923): pid=9641 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.297000 audit[9641]: CRED_DISP pid=9641 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:43.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.90.239:22-139.178.68.195:53562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:48.307158 systemd[1]: Started sshd@51-139.178.90.239:22-139.178.68.195:54368.service. Feb 13 05:13:48.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.239:22-139.178.68.195:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:48.334259 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:13:48.334329 kernel: audit: type=1130 audit(1707801228.305:1925): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.239:22-139.178.68.195:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:48.455000 audit[9667]: USER_ACCT pid=9667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.457305 sshd[9667]: Accepted publickey for core from 139.178.68.195 port 54368 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:48.458397 sshd[9667]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:48.460767 systemd-logind[1467]: New session 31 of user core. Feb 13 05:13:48.461316 systemd[1]: Started session-31.scope. Feb 13 05:13:48.544075 sshd[9667]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:48.545461 systemd[1]: sshd@51-139.178.90.239:22-139.178.68.195:54368.service: Deactivated successfully. Feb 13 05:13:48.545930 systemd[1]: session-31.scope: Deactivated successfully. Feb 13 05:13:48.546270 systemd-logind[1467]: Session 31 logged out. Waiting for processes to exit. Feb 13 05:13:48.546771 systemd-logind[1467]: Removed session 31. Feb 13 05:13:48.456000 audit[9667]: CRED_ACQ pid=9667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.639167 kernel: audit: type=1101 audit(1707801228.455:1926): pid=9667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.639213 kernel: audit: type=1103 audit(1707801228.456:1927): pid=9667 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.639229 kernel: audit: type=1006 audit(1707801228.456:1928): pid=9667 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 13 05:13:48.697761 kernel: audit: type=1300 audit(1707801228.456:1928): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa928cfb0 a2=3 a3=0 items=0 ppid=1 pid=9667 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:48.456000 audit[9667]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa928cfb0 a2=3 a3=0 items=0 ppid=1 pid=9667 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:48.789776 kernel: audit: type=1327 audit(1707801228.456:1928): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:48.456000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:48.820283 kernel: audit: type=1105 audit(1707801228.462:1929): pid=9667 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.462000 audit[9667]: USER_START pid=9667 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.914830 kernel: audit: type=1103 audit(1707801228.462:1930): pid=9669 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.462000 audit[9669]: CRED_ACQ pid=9669 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:49.004206 kernel: audit: type=1106 audit(1707801228.543:1931): pid=9667 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.543000 audit[9667]: USER_END pid=9667 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:49.099799 kernel: audit: type=1104 audit(1707801228.543:1932): pid=9667 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.543000 audit[9667]: CRED_DISP pid=9667 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:48.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.90.239:22-139.178.68.195:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:53.553662 systemd[1]: Started sshd@52-139.178.90.239:22-139.178.68.195:54380.service. Feb 13 05:13:53.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.239:22-139.178.68.195:54380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:53.580545 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:13:53.580615 kernel: audit: type=1130 audit(1707801233.552:1934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.239:22-139.178.68.195:54380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:53.701000 audit[9735]: USER_ACCT pid=9735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.702788 sshd[9735]: Accepted publickey for core from 139.178.68.195 port 54380 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:53.704790 sshd[9735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:53.707058 systemd-logind[1467]: New session 32 of user core. Feb 13 05:13:53.707782 systemd[1]: Started session-32.scope. Feb 13 05:13:53.787529 sshd[9735]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:53.789019 systemd[1]: sshd@52-139.178.90.239:22-139.178.68.195:54380.service: Deactivated successfully. Feb 13 05:13:53.789505 systemd[1]: session-32.scope: Deactivated successfully. Feb 13 05:13:53.789868 systemd-logind[1467]: Session 32 logged out. Waiting for processes to exit. Feb 13 05:13:53.790264 systemd-logind[1467]: Removed session 32. Feb 13 05:13:53.703000 audit[9735]: CRED_ACQ pid=9735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.795506 kernel: audit: type=1101 audit(1707801233.701:1935): pid=9735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.795541 kernel: audit: type=1103 audit(1707801233.703:1936): pid=9735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.885454 kernel: audit: type=1006 audit(1707801233.703:1937): pid=9735 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 13 05:13:53.703000 audit[9735]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd87586e50 a2=3 a3=0 items=0 ppid=1 pid=9735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:54.035987 kernel: audit: type=1300 audit(1707801233.703:1937): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd87586e50 a2=3 a3=0 items=0 ppid=1 pid=9735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:54.036017 kernel: audit: type=1327 audit(1707801233.703:1937): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:53.703000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:54.066521 kernel: audit: type=1105 audit(1707801233.709:1938): pid=9735 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.709000 audit[9735]: USER_START pid=9735 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.709000 audit[9737]: CRED_ACQ pid=9737 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:54.161494 kernel: audit: type=1103 audit(1707801233.709:1939): pid=9737 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.786000 audit[9735]: USER_END pid=9735 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:54.345914 kernel: audit: type=1106 audit(1707801233.786:1940): pid=9735 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:54.345944 kernel: audit: type=1104 audit(1707801233.786:1941): pid=9735 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.786000 audit[9735]: CRED_DISP pid=9735 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:53.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.90.239:22-139.178.68.195:54380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:58.797880 systemd[1]: Started sshd@53-139.178.90.239:22-139.178.68.195:44876.service. Feb 13 05:13:58.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.239:22-139.178.68.195:44876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:58.824929 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:13:58.825009 kernel: audit: type=1130 audit(1707801238.796:1943): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.239:22-139.178.68.195:44876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:13:58.946000 audit[9762]: USER_ACCT pid=9762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:58.947985 sshd[9762]: Accepted publickey for core from 139.178.68.195 port 44876 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:13:58.949744 sshd[9762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:13:58.952074 systemd-logind[1467]: New session 33 of user core. Feb 13 05:13:58.952792 systemd[1]: Started session-33.scope. Feb 13 05:13:59.032353 sshd[9762]: pam_unix(sshd:session): session closed for user core Feb 13 05:13:59.033849 systemd[1]: sshd@53-139.178.90.239:22-139.178.68.195:44876.service: Deactivated successfully. Feb 13 05:13:59.034328 systemd[1]: session-33.scope: Deactivated successfully. Feb 13 05:13:59.034665 systemd-logind[1467]: Session 33 logged out. Waiting for processes to exit. Feb 13 05:13:59.035081 systemd-logind[1467]: Removed session 33. Feb 13 05:13:58.948000 audit[9762]: CRED_ACQ pid=9762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.129813 kernel: audit: type=1101 audit(1707801238.946:1944): pid=9762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.129850 kernel: audit: type=1103 audit(1707801238.948:1945): pid=9762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.129867 kernel: audit: type=1006 audit(1707801238.948:1946): pid=9762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 13 05:13:59.188357 kernel: audit: type=1300 audit(1707801238.948:1946): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6a1d3110 a2=3 a3=0 items=0 ppid=1 pid=9762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:58.948000 audit[9762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6a1d3110 a2=3 a3=0 items=0 ppid=1 pid=9762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:13:59.280342 kernel: audit: type=1327 audit(1707801238.948:1946): proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:58.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:13:59.310826 kernel: audit: type=1105 audit(1707801238.953:1947): pid=9762 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:58.953000 audit[9762]: USER_START pid=9762 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.405346 kernel: audit: type=1103 audit(1707801238.954:1948): pid=9764 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:58.954000 audit[9764]: CRED_ACQ pid=9764 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.494687 kernel: audit: type=1106 audit(1707801239.031:1949): pid=9762 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.031000 audit[9762]: USER_END pid=9762 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.590159 kernel: audit: type=1104 audit(1707801239.031:1950): pid=9762 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.031000 audit[9762]: CRED_DISP pid=9762 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:13:59.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.90.239:22-139.178.68.195:44876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:04.046036 systemd[1]: Started sshd@54-139.178.90.239:22-139.178.68.195:44884.service. Feb 13 05:14:04.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.239:22-139.178.68.195:44884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:04.073120 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:14:04.073165 kernel: audit: type=1130 audit(1707801244.045:1952): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.239:22-139.178.68.195:44884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:04.193000 audit[9826]: USER_ACCT pid=9826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.195451 sshd[9826]: Accepted publickey for core from 139.178.68.195 port 44884 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:04.196730 sshd[9826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:04.199137 systemd-logind[1467]: New session 34 of user core. Feb 13 05:14:04.199602 systemd[1]: Started session-34.scope. Feb 13 05:14:04.286193 sshd[9826]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:04.195000 audit[9826]: CRED_ACQ pid=9826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.287643 systemd[1]: sshd@54-139.178.90.239:22-139.178.68.195:44884.service: Deactivated successfully. Feb 13 05:14:04.288093 systemd[1]: session-34.scope: Deactivated successfully. Feb 13 05:14:04.288384 systemd-logind[1467]: Session 34 logged out. Waiting for processes to exit. Feb 13 05:14:04.289001 systemd-logind[1467]: Removed session 34. Feb 13 05:14:04.378117 kernel: audit: type=1101 audit(1707801244.193:1953): pid=9826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.378157 kernel: audit: type=1103 audit(1707801244.195:1954): pid=9826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.378175 kernel: audit: type=1006 audit(1707801244.195:1955): pid=9826 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 13 05:14:04.195000 audit[9826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc56bd36e0 a2=3 a3=0 items=0 ppid=1 pid=9826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:04.528559 kernel: audit: type=1300 audit(1707801244.195:1955): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc56bd36e0 a2=3 a3=0 items=0 ppid=1 pid=9826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:04.528594 kernel: audit: type=1327 audit(1707801244.195:1955): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:04.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:04.559084 kernel: audit: type=1105 audit(1707801244.200:1956): pid=9826 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.200000 audit[9826]: USER_START pid=9826 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.200000 audit[9828]: CRED_ACQ pid=9828 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.654521 kernel: audit: type=1103 audit(1707801244.200:1957): pid=9828 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.285000 audit[9826]: USER_END pid=9826 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.838221 kernel: audit: type=1106 audit(1707801244.285:1958): pid=9826 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.838274 kernel: audit: type=1104 audit(1707801244.285:1959): pid=9826 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.285000 audit[9826]: CRED_DISP pid=9826 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:04.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.90.239:22-139.178.68.195:44884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:09.298002 systemd[1]: Started sshd@55-139.178.90.239:22-139.178.68.195:46496.service. Feb 13 05:14:09.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.239:22-139.178.68.195:46496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:09.325982 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:14:09.326069 kernel: audit: type=1130 audit(1707801249.297:1961): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.239:22-139.178.68.195:46496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:09.447748 sshd[9851]: Accepted publickey for core from 139.178.68.195 port 46496 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:09.446000 audit[9851]: USER_ACCT pid=9851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.448753 sshd[9851]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:09.451130 systemd-logind[1467]: New session 35 of user core. Feb 13 05:14:09.451599 systemd[1]: Started session-35.scope. Feb 13 05:14:09.532598 sshd[9851]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:09.533976 systemd[1]: sshd@55-139.178.90.239:22-139.178.68.195:46496.service: Deactivated successfully. Feb 13 05:14:09.534411 systemd[1]: session-35.scope: Deactivated successfully. Feb 13 05:14:09.534816 systemd-logind[1467]: Session 35 logged out. Waiting for processes to exit. Feb 13 05:14:09.535278 systemd-logind[1467]: Removed session 35. Feb 13 05:14:09.447000 audit[9851]: CRED_ACQ pid=9851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.632112 kernel: audit: type=1101 audit(1707801249.446:1962): pid=9851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.632162 kernel: audit: type=1103 audit(1707801249.447:1963): pid=9851 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.632182 kernel: audit: type=1006 audit(1707801249.447:1964): pid=9851 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 13 05:14:09.690668 kernel: audit: type=1300 audit(1707801249.447:1964): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad1c1310 a2=3 a3=0 items=0 ppid=1 pid=9851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:09.447000 audit[9851]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad1c1310 a2=3 a3=0 items=0 ppid=1 pid=9851 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:09.782723 kernel: audit: type=1327 audit(1707801249.447:1964): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:09.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:09.813205 kernel: audit: type=1105 audit(1707801249.452:1965): pid=9851 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.452000 audit[9851]: USER_START pid=9851 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.907683 kernel: audit: type=1103 audit(1707801249.453:1966): pid=9853 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.453000 audit[9853]: CRED_ACQ pid=9853 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.996896 kernel: audit: type=1106 audit(1707801249.531:1967): pid=9851 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.531000 audit[9851]: USER_END pid=9851 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:10.092380 kernel: audit: type=1104 audit(1707801249.531:1968): pid=9851 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.531000 audit[9851]: CRED_DISP pid=9851 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:09.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.90.239:22-139.178.68.195:46496 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:10.907000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:10.907000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bcac0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:14:10.907000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:14:10.908000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:10.908000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000b6c8d0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:14:10.908000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:14:11.206000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:11.206000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c017694620 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:14:11.206000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:14:11.207000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:11.207000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007487920 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:14:11.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:14:11.207000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:11.207000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00a12c510 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:14:11.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:14:11.215000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:11.215000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c006e21e90 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:14:11.215000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:14:11.216000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:11.216000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c006e21ec0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:14:11.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:14:11.217000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:11.217000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c017694640 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:14:11.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:14:14.542150 systemd[1]: Started sshd@56-139.178.90.239:22-139.178.68.195:46500.service. Feb 13 05:14:14.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.239:22-139.178.68.195:46500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:14.569290 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 05:14:14.569351 kernel: audit: type=1130 audit(1707801254.540:1978): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.239:22-139.178.68.195:46500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:14.691000 audit[9876]: USER_ACCT pid=9876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:14.691915 sshd[9876]: Accepted publickey for core from 139.178.68.195 port 46500 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:14.693754 sshd[9876]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:14.696118 systemd-logind[1467]: New session 36 of user core. Feb 13 05:14:14.696657 systemd[1]: Started session-36.scope. Feb 13 05:14:14.692000 audit[9876]: CRED_ACQ pid=9876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:14.873760 kernel: audit: type=1101 audit(1707801254.691:1979): pid=9876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:14.873801 kernel: audit: type=1103 audit(1707801254.692:1980): pid=9876 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:14.873822 kernel: audit: type=1006 audit(1707801254.692:1981): pid=9876 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 13 05:14:14.932342 kernel: audit: type=1300 audit(1707801254.692:1981): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9b19b50 a2=3 a3=0 items=0 ppid=1 pid=9876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:14.692000 audit[9876]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9b19b50 a2=3 a3=0 items=0 ppid=1 pid=9876 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:15.024325 kernel: audit: type=1327 audit(1707801254.692:1981): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:14.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:15.024529 sshd[9876]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:15.026005 systemd[1]: sshd@56-139.178.90.239:22-139.178.68.195:46500.service: Deactivated successfully. Feb 13 05:14:15.026461 systemd[1]: session-36.scope: Deactivated successfully. Feb 13 05:14:15.026836 systemd-logind[1467]: Session 36 logged out. Waiting for processes to exit. Feb 13 05:14:15.027325 systemd-logind[1467]: Removed session 36. Feb 13 05:14:15.054872 kernel: audit: type=1105 audit(1707801254.697:1982): pid=9876 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:14.697000 audit[9876]: USER_START pid=9876 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:15.149347 kernel: audit: type=1103 audit(1707801254.698:1983): pid=9878 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:14.698000 audit[9878]: CRED_ACQ pid=9878 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:15.023000 audit[9876]: USER_END pid=9876 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:15.334022 kernel: audit: type=1106 audit(1707801255.023:1984): pid=9876 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:15.334052 kernel: audit: type=1104 audit(1707801255.023:1985): pid=9876 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:15.023000 audit[9876]: CRED_DISP pid=9876 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:15.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.90.239:22-139.178.68.195:46500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:19.975833 systemd[1]: Started sshd@57-139.178.90.239:22-139.178.68.195:57880.service. Feb 13 05:14:19.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.239:22-139.178.68.195:57880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:20.002864 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:14:20.002954 kernel: audit: type=1130 audit(1707801259.974:1987): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.239:22-139.178.68.195:57880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:20.123000 audit[9904]: USER_ACCT pid=9904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.124280 sshd[9904]: Accepted publickey for core from 139.178.68.195 port 57880 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:20.125751 sshd[9904]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:20.128060 systemd-logind[1467]: New session 37 of user core. Feb 13 05:14:20.128627 systemd[1]: Started session-37.scope. Feb 13 05:14:20.209622 sshd[9904]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:20.211091 systemd[1]: sshd@57-139.178.90.239:22-139.178.68.195:57880.service: Deactivated successfully. Feb 13 05:14:20.211579 systemd[1]: session-37.scope: Deactivated successfully. Feb 13 05:14:20.212100 systemd-logind[1467]: Session 37 logged out. Waiting for processes to exit. Feb 13 05:14:20.212553 systemd-logind[1467]: Removed session 37. Feb 13 05:14:20.124000 audit[9904]: CRED_ACQ pid=9904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.308683 kernel: audit: type=1101 audit(1707801260.123:1988): pid=9904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.308718 kernel: audit: type=1103 audit(1707801260.124:1989): pid=9904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.308735 kernel: audit: type=1006 audit(1707801260.124:1990): pid=9904 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 13 05:14:20.124000 audit[9904]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb7cd3070 a2=3 a3=0 items=0 ppid=1 pid=9904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:20.459258 kernel: audit: type=1300 audit(1707801260.124:1990): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb7cd3070 a2=3 a3=0 items=0 ppid=1 pid=9904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:20.459291 kernel: audit: type=1327 audit(1707801260.124:1990): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:20.124000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:20.489762 kernel: audit: type=1105 audit(1707801260.129:1991): pid=9904 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.129000 audit[9904]: USER_START pid=9904 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.584318 kernel: audit: type=1103 audit(1707801260.130:1992): pid=9906 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.130000 audit[9906]: CRED_ACQ pid=9906 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.673529 kernel: audit: type=1106 audit(1707801260.208:1993): pid=9904 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.208000 audit[9904]: USER_END pid=9904 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.769011 kernel: audit: type=1104 audit(1707801260.208:1994): pid=9904 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.208000 audit[9904]: CRED_DISP pid=9904 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:20.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.90.239:22-139.178.68.195:57880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:21.767000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:14:21.767000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001177b40 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:14:21.767000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:14:24.379000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:24.379000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000627c60 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:14:24.379000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:14:24.379000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:24.379000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e05460 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:14:24.379000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:14:24.382000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:24.382000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f1c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:14:24.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:14:24.382000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:14:24.382000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001e05480 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:14:24.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:14:25.219678 systemd[1]: Started sshd@58-139.178.90.239:22-139.178.68.195:57896.service. Feb 13 05:14:25.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.239:22-139.178.68.195:57896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:25.247082 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 05:14:25.247168 kernel: audit: type=1130 audit(1707801265.218:2001): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.239:22-139.178.68.195:57896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:25.368000 audit[9995]: USER_ACCT pid=9995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.369298 sshd[9995]: Accepted publickey for core from 139.178.68.195 port 57896 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:25.370562 sshd[9995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:25.372643 systemd-logind[1467]: New session 38 of user core. Feb 13 05:14:25.373119 systemd[1]: Started session-38.scope. Feb 13 05:14:25.368000 audit[9995]: CRED_ACQ pid=9995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.555137 kernel: audit: type=1101 audit(1707801265.368:2002): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.555190 kernel: audit: type=1103 audit(1707801265.368:2003): pid=9995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.555207 kernel: audit: type=1006 audit(1707801265.368:2004): pid=9995 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 13 05:14:25.613680 kernel: audit: type=1300 audit(1707801265.368:2004): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb477e530 a2=3 a3=0 items=0 ppid=1 pid=9995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:25.368000 audit[9995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb477e530 a2=3 a3=0 items=0 ppid=1 pid=9995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:25.705672 kernel: audit: type=1327 audit(1707801265.368:2004): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:25.368000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:25.705911 sshd[9995]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:25.707389 systemd[1]: sshd@58-139.178.90.239:22-139.178.68.195:57896.service: Deactivated successfully. Feb 13 05:14:25.707875 systemd[1]: session-38.scope: Deactivated successfully. Feb 13 05:14:25.708218 systemd-logind[1467]: Session 38 logged out. Waiting for processes to exit. Feb 13 05:14:25.708625 systemd-logind[1467]: Removed session 38. Feb 13 05:14:25.736191 kernel: audit: type=1105 audit(1707801265.373:2005): pid=9995 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.373000 audit[9995]: USER_START pid=9995 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.830654 kernel: audit: type=1103 audit(1707801265.374:2006): pid=9997 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.374000 audit[9997]: CRED_ACQ pid=9997 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.919856 kernel: audit: type=1106 audit(1707801265.706:2007): pid=9995 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.706000 audit[9995]: USER_END pid=9995 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.706000 audit[9995]: CRED_DISP pid=9995 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:26.104516 kernel: audit: type=1104 audit(1707801265.706:2008): pid=9995 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:25.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.90.239:22-139.178.68.195:57896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:26.975000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:14:26.975000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001fb1b60 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:14:26.975000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:14:30.658473 systemd[1]: Started sshd@59-139.178.90.239:22-139.178.68.195:38078.service. Feb 13 05:14:30.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.239:22-139.178.68.195:38078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:30.685674 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:14:30.685730 kernel: audit: type=1130 audit(1707801270.658:2011): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.239:22-139.178.68.195:38078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:30.807000 audit[10023]: USER_ACCT pid=10023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.807740 sshd[10023]: Accepted publickey for core from 139.178.68.195 port 38078 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:30.809040 sshd[10023]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:30.811374 systemd-logind[1467]: New session 39 of user core. Feb 13 05:14:30.812068 systemd[1]: Started session-39.scope. Feb 13 05:14:30.893805 sshd[10023]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:30.895176 systemd[1]: sshd@59-139.178.90.239:22-139.178.68.195:38078.service: Deactivated successfully. Feb 13 05:14:30.895625 systemd[1]: session-39.scope: Deactivated successfully. Feb 13 05:14:30.895997 systemd-logind[1467]: Session 39 logged out. Waiting for processes to exit. Feb 13 05:14:30.896410 systemd-logind[1467]: Removed session 39. Feb 13 05:14:30.808000 audit[10023]: CRED_ACQ pid=10023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.989861 kernel: audit: type=1101 audit(1707801270.807:2012): pid=10023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.989900 kernel: audit: type=1103 audit(1707801270.808:2013): pid=10023 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.989919 kernel: audit: type=1006 audit(1707801270.808:2014): pid=10023 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 13 05:14:31.048513 kernel: audit: type=1300 audit(1707801270.808:2014): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8d736b0 a2=3 a3=0 items=0 ppid=1 pid=10023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:30.808000 audit[10023]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce8d736b0 a2=3 a3=0 items=0 ppid=1 pid=10023 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:31.140585 kernel: audit: type=1327 audit(1707801270.808:2014): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:30.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:31.171097 kernel: audit: type=1105 audit(1707801270.814:2015): pid=10023 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.814000 audit[10023]: USER_START pid=10023 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.814000 audit[10025]: CRED_ACQ pid=10025 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:31.354997 kernel: audit: type=1103 audit(1707801270.814:2016): pid=10025 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:31.355030 kernel: audit: type=1106 audit(1707801270.894:2017): pid=10023 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.894000 audit[10023]: USER_END pid=10023 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:31.450582 kernel: audit: type=1104 audit(1707801270.894:2018): pid=10023 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.894000 audit[10023]: CRED_DISP pid=10023 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:30.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.90.239:22-139.178.68.195:38078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:35.903579 systemd[1]: Started sshd@60-139.178.90.239:22-139.178.68.195:38080.service. Feb 13 05:14:35.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.239:22-139.178.68.195:38080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:35.930448 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:14:35.930545 kernel: audit: type=1130 audit(1707801275.903:2020): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.239:22-139.178.68.195:38080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:36.053000 audit[10102]: USER_ACCT pid=10102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.054071 sshd[10102]: Accepted publickey for core from 139.178.68.195 port 38080 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:36.057882 sshd[10102]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:36.062694 systemd-logind[1467]: New session 40 of user core. Feb 13 05:14:36.063174 systemd[1]: Started session-40.scope. Feb 13 05:14:36.144013 sshd[10102]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:36.056000 audit[10102]: CRED_ACQ pid=10102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.145212 systemd[1]: sshd@60-139.178.90.239:22-139.178.68.195:38080.service: Deactivated successfully. Feb 13 05:14:36.145662 systemd[1]: session-40.scope: Deactivated successfully. Feb 13 05:14:36.146077 systemd-logind[1467]: Session 40 logged out. Waiting for processes to exit. Feb 13 05:14:36.146622 systemd-logind[1467]: Removed session 40. Feb 13 05:14:36.235829 kernel: audit: type=1101 audit(1707801276.053:2021): pid=10102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.235874 kernel: audit: type=1103 audit(1707801276.056:2022): pid=10102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.235893 kernel: audit: type=1006 audit(1707801276.056:2023): pid=10102 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 13 05:14:36.294467 kernel: audit: type=1300 audit(1707801276.056:2023): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe8da40f0 a2=3 a3=0 items=0 ppid=1 pid=10102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:36.056000 audit[10102]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe8da40f0 a2=3 a3=0 items=0 ppid=1 pid=10102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:36.386519 kernel: audit: type=1327 audit(1707801276.056:2023): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:36.056000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:36.417033 kernel: audit: type=1105 audit(1707801276.064:2024): pid=10102 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.064000 audit[10102]: USER_START pid=10102 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.511584 kernel: audit: type=1103 audit(1707801276.065:2025): pid=10104 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.065000 audit[10104]: CRED_ACQ pid=10104 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.600877 kernel: audit: type=1106 audit(1707801276.144:2026): pid=10102 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.144000 audit[10102]: USER_END pid=10102 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.144000 audit[10102]: CRED_DISP pid=10102 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.785753 kernel: audit: type=1104 audit(1707801276.144:2027): pid=10102 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:36.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.90.239:22-139.178.68.195:38080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:41.153810 systemd[1]: Started sshd@61-139.178.90.239:22-139.178.68.195:56060.service. Feb 13 05:14:41.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.239:22-139.178.68.195:56060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:41.181025 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:14:41.181075 kernel: audit: type=1130 audit(1707801281.153:2029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.239:22-139.178.68.195:56060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:41.303000 audit[10127]: USER_ACCT pid=10127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.304066 sshd[10127]: Accepted publickey for core from 139.178.68.195 port 56060 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:41.305773 sshd[10127]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:41.308267 systemd-logind[1467]: New session 41 of user core. Feb 13 05:14:41.308792 systemd[1]: Started session-41.scope. Feb 13 05:14:41.388076 sshd[10127]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:41.389494 systemd[1]: sshd@61-139.178.90.239:22-139.178.68.195:56060.service: Deactivated successfully. Feb 13 05:14:41.389941 systemd[1]: session-41.scope: Deactivated successfully. Feb 13 05:14:41.390302 systemd-logind[1467]: Session 41 logged out. Waiting for processes to exit. Feb 13 05:14:41.390950 systemd-logind[1467]: Removed session 41. Feb 13 05:14:41.305000 audit[10127]: CRED_ACQ pid=10127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.485950 kernel: audit: type=1101 audit(1707801281.303:2030): pid=10127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.486018 kernel: audit: type=1103 audit(1707801281.305:2031): pid=10127 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.486045 kernel: audit: type=1006 audit(1707801281.305:2032): pid=10127 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 13 05:14:41.305000 audit[10127]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8537f5c0 a2=3 a3=0 items=0 ppid=1 pid=10127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:41.636686 kernel: audit: type=1300 audit(1707801281.305:2032): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8537f5c0 a2=3 a3=0 items=0 ppid=1 pid=10127 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:41.636730 kernel: audit: type=1327 audit(1707801281.305:2032): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:41.305000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:41.310000 audit[10127]: USER_START pid=10127 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.667445 kernel: audit: type=1105 audit(1707801281.310:2033): pid=10127 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.310000 audit[10129]: CRED_ACQ pid=10129 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.850873 kernel: audit: type=1103 audit(1707801281.310:2034): pid=10129 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.850911 kernel: audit: type=1106 audit(1707801281.388:2035): pid=10127 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.388000 audit[10127]: USER_END pid=10127 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.388000 audit[10127]: CRED_DISP pid=10127 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:42.035789 kernel: audit: type=1104 audit(1707801281.388:2036): pid=10127 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:41.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.90.239:22-139.178.68.195:56060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:46.399340 systemd[1]: Started sshd@62-139.178.90.239:22-139.178.68.195:53658.service. Feb 13 05:14:46.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.239:22-139.178.68.195:53658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:46.426605 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:14:46.426708 kernel: audit: type=1130 audit(1707801286.399:2038): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.239:22-139.178.68.195:53658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:46.548000 audit[10152]: USER_ACCT pid=10152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.549121 sshd[10152]: Accepted publickey for core from 139.178.68.195 port 53658 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:46.549698 sshd[10152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:46.552011 systemd-logind[1467]: New session 42 of user core. Feb 13 05:14:46.552525 systemd[1]: Started session-42.scope. Feb 13 05:14:46.633796 sshd[10152]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:46.635234 systemd[1]: sshd@62-139.178.90.239:22-139.178.68.195:53658.service: Deactivated successfully. Feb 13 05:14:46.635726 systemd[1]: session-42.scope: Deactivated successfully. Feb 13 05:14:46.636206 systemd-logind[1467]: Session 42 logged out. Waiting for processes to exit. Feb 13 05:14:46.636730 systemd-logind[1467]: Removed session 42. Feb 13 05:14:46.549000 audit[10152]: CRED_ACQ pid=10152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.733374 kernel: audit: type=1101 audit(1707801286.548:2039): pid=10152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.733416 kernel: audit: type=1103 audit(1707801286.549:2040): pid=10152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.733432 kernel: audit: type=1006 audit(1707801286.549:2041): pid=10152 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 13 05:14:46.792021 kernel: audit: type=1300 audit(1707801286.549:2041): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0533fa30 a2=3 a3=0 items=0 ppid=1 pid=10152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:46.549000 audit[10152]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0533fa30 a2=3 a3=0 items=0 ppid=1 pid=10152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:46.884077 kernel: audit: type=1327 audit(1707801286.549:2041): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:46.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:46.554000 audit[10152]: USER_START pid=10152 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:47.009010 kernel: audit: type=1105 audit(1707801286.554:2042): pid=10152 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:47.009044 kernel: audit: type=1103 audit(1707801286.555:2043): pid=10154 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.555000 audit[10154]: CRED_ACQ pid=10154 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:47.098248 kernel: audit: type=1106 audit(1707801286.634:2044): pid=10152 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.634000 audit[10152]: USER_END pid=10152 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:47.193765 kernel: audit: type=1104 audit(1707801286.634:2045): pid=10152 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.634000 audit[10152]: CRED_DISP pid=10152 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:46.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.90.239:22-139.178.68.195:53658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:47.952475 systemd[1]: Started sshd@63-139.178.90.239:22-218.92.0.34:23526.service. Feb 13 05:14:47.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.239:22-218.92.0.34:23526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:49.023517 sshd[10180]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:14:49.023000 audit[10180]: USER_AUTH pid=10180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:51.121701 sshd[10180]: Failed password for root from 218.92.0.34 port 23526 ssh2 Feb 13 05:14:51.645063 systemd[1]: Started sshd@64-139.178.90.239:22-139.178.68.195:53662.service. Feb 13 05:14:51.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.239:22-139.178.68.195:53662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:51.672683 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:14:51.672742 kernel: audit: type=1130 audit(1707801291.645:2049): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.239:22-139.178.68.195:53662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:51.795000 audit[10204]: USER_ACCT pid=10204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.795949 sshd[10204]: Accepted publickey for core from 139.178.68.195 port 53662 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:51.796725 sshd[10204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:51.799188 systemd-logind[1467]: New session 43 of user core. Feb 13 05:14:51.799691 systemd[1]: Started session-43.scope. Feb 13 05:14:51.879242 sshd[10204]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:51.880686 systemd[1]: sshd@64-139.178.90.239:22-139.178.68.195:53662.service: Deactivated successfully. Feb 13 05:14:51.881143 systemd[1]: session-43.scope: Deactivated successfully. Feb 13 05:14:51.881415 systemd-logind[1467]: Session 43 logged out. Waiting for processes to exit. Feb 13 05:14:51.881907 systemd-logind[1467]: Removed session 43. Feb 13 05:14:51.796000 audit[10204]: CRED_ACQ pid=10204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.888448 kernel: audit: type=1101 audit(1707801291.795:2050): pid=10204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.888482 kernel: audit: type=1103 audit(1707801291.796:2051): pid=10204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:52.037402 kernel: audit: type=1006 audit(1707801291.796:2052): pid=10204 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 13 05:14:52.037435 kernel: audit: type=1300 audit(1707801291.796:2052): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe852e0e80 a2=3 a3=0 items=0 ppid=1 pid=10204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:51.796000 audit[10204]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe852e0e80 a2=3 a3=0 items=0 ppid=1 pid=10204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:52.129524 kernel: audit: type=1327 audit(1707801291.796:2052): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:51.796000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:52.160003 kernel: audit: type=1105 audit(1707801291.801:2053): pid=10204 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.801000 audit[10204]: USER_START pid=10204 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:52.254679 kernel: audit: type=1103 audit(1707801291.801:2054): pid=10206 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.801000 audit[10206]: CRED_ACQ pid=10206 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:52.343941 kernel: audit: type=1106 audit(1707801291.879:2055): pid=10204 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.879000 audit[10204]: USER_END pid=10204 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:52.439436 kernel: audit: type=1104 audit(1707801291.879:2056): pid=10204 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.879000 audit[10204]: CRED_DISP pid=10204 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:51.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.90.239:22-139.178.68.195:53662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:52.227000 audit[10180]: USER_AUTH pid=10180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:54.069820 sshd[10180]: Failed password for root from 218.92.0.34 port 23526 ssh2 Feb 13 05:14:55.433000 audit[10180]: USER_AUTH pid=10180 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:14:56.890871 systemd[1]: Started sshd@65-139.178.90.239:22-139.178.68.195:46612.service. Feb 13 05:14:56.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.239:22-139.178.68.195:46612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:56.918386 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:14:56.918430 kernel: audit: type=1130 audit(1707801296.890:2060): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.239:22-139.178.68.195:46612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:57.039000 audit[10255]: USER_ACCT pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.040188 sshd[10255]: Accepted publickey for core from 139.178.68.195 port 46612 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:14:57.043749 sshd[10255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:14:57.053568 systemd-logind[1467]: New session 44 of user core. Feb 13 05:14:57.055903 systemd[1]: Started session-44.scope. Feb 13 05:14:57.042000 audit[10255]: CRED_ACQ pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.133456 kernel: audit: type=1101 audit(1707801297.039:2061): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.133531 kernel: audit: type=1103 audit(1707801297.042:2062): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.147543 sshd[10255]: pam_unix(sshd:session): session closed for user core Feb 13 05:14:57.148992 systemd[1]: sshd@65-139.178.90.239:22-139.178.68.195:46612.service: Deactivated successfully. Feb 13 05:14:57.149438 systemd[1]: session-44.scope: Deactivated successfully. Feb 13 05:14:57.149847 systemd-logind[1467]: Session 44 logged out. Waiting for processes to exit. Feb 13 05:14:57.150343 systemd-logind[1467]: Removed session 44. Feb 13 05:14:57.282353 kernel: audit: type=1006 audit(1707801297.042:2063): pid=10255 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 13 05:14:57.282423 kernel: audit: type=1300 audit(1707801297.042:2063): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda234a380 a2=3 a3=0 items=0 ppid=1 pid=10255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:57.042000 audit[10255]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda234a380 a2=3 a3=0 items=0 ppid=1 pid=10255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:14:57.042000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:57.404912 kernel: audit: type=1327 audit(1707801297.042:2063): proctitle=737368643A20636F7265205B707269765D Feb 13 05:14:57.404981 kernel: audit: type=1105 audit(1707801297.067:2064): pid=10255 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.067000 audit[10255]: USER_START pid=10255 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.068000 audit[10257]: CRED_ACQ pid=10257 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.588742 kernel: audit: type=1103 audit(1707801297.068:2065): pid=10257 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.588801 kernel: audit: type=1106 audit(1707801297.147:2066): pid=10255 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.147000 audit[10255]: USER_END pid=10255 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.147000 audit[10255]: CRED_DISP pid=10255 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.773576 kernel: audit: type=1104 audit(1707801297.147:2067): pid=10255 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:14:57.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.90.239:22-139.178.68.195:46612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:58.022792 sshd[10180]: Failed password for root from 218.92.0.34 port 23526 ssh2 Feb 13 05:14:58.638602 sshd[10180]: Received disconnect from 218.92.0.34 port 23526:11: [preauth] Feb 13 05:14:58.638602 sshd[10180]: Disconnected from authenticating user root 218.92.0.34 port 23526 [preauth] Feb 13 05:14:58.639368 sshd[10180]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:14:58.641419 systemd[1]: sshd@63-139.178.90.239:22-218.92.0.34:23526.service: Deactivated successfully. Feb 13 05:14:58.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.90.239:22-218.92.0.34:23526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:58.786322 systemd[1]: Started sshd@66-139.178.90.239:22-218.92.0.34:39283.service. Feb 13 05:14:58.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.239:22-218.92.0.34:39283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:14:59.809962 sshd[10281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:14:59.809000 audit[10281]: USER_AUTH pid=10281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:01.946617 sshd[10281]: Failed password for root from 218.92.0.34 port 39283 ssh2 Feb 13 05:15:02.157168 systemd[1]: Started sshd@67-139.178.90.239:22-139.178.68.195:46624.service. Feb 13 05:15:02.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.239:22-139.178.68.195:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:02.183689 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:15:02.183753 kernel: audit: type=1130 audit(1707801302.156:2072): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.239:22-139.178.68.195:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:02.306000 audit[10287]: USER_ACCT pid=10287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.306962 sshd[10287]: Accepted publickey for core from 139.178.68.195 port 46624 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:02.308081 sshd[10287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:02.310402 systemd-logind[1467]: New session 45 of user core. Feb 13 05:15:02.310946 systemd[1]: Started session-45.scope. Feb 13 05:15:02.390855 sshd[10287]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:02.392152 systemd[1]: sshd@67-139.178.90.239:22-139.178.68.195:46624.service: Deactivated successfully. Feb 13 05:15:02.392676 systemd[1]: session-45.scope: Deactivated successfully. Feb 13 05:15:02.393040 systemd-logind[1467]: Session 45 logged out. Waiting for processes to exit. Feb 13 05:15:02.393407 systemd-logind[1467]: Removed session 45. Feb 13 05:15:02.307000 audit[10287]: CRED_ACQ pid=10287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.489274 kernel: audit: type=1101 audit(1707801302.306:2073): pid=10287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.489343 kernel: audit: type=1103 audit(1707801302.307:2074): pid=10287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.489383 kernel: audit: type=1006 audit(1707801302.307:2075): pid=10287 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 13 05:15:02.307000 audit[10287]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9fd9dc10 a2=3 a3=0 items=0 ppid=1 pid=10287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:02.640033 kernel: audit: type=1300 audit(1707801302.307:2075): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9fd9dc10 a2=3 a3=0 items=0 ppid=1 pid=10287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:02.640087 kernel: audit: type=1327 audit(1707801302.307:2075): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:02.307000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:02.312000 audit[10287]: USER_START pid=10287 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.765120 kernel: audit: type=1105 audit(1707801302.312:2076): pid=10287 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.765167 kernel: audit: type=1103 audit(1707801302.312:2077): pid=10289 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.312000 audit[10289]: CRED_ACQ pid=10289 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.391000 audit[10287]: USER_END pid=10287 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.950115 kernel: audit: type=1106 audit(1707801302.391:2078): pid=10287 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.950170 kernel: audit: type=1104 audit(1707801302.391:2079): pid=10287 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.391000 audit[10287]: CRED_DISP pid=10287 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:02.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.90.239:22-139.178.68.195:46624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:03.005000 audit[10281]: USER_AUTH pid=10281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:04.692836 sshd[10281]: Failed password for root from 218.92.0.34 port 39283 ssh2 Feb 13 05:15:06.203000 audit[10281]: USER_AUTH pid=10281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:07.400550 systemd[1]: Started sshd@68-139.178.90.239:22-139.178.68.195:40864.service. Feb 13 05:15:07.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.239:22-139.178.68.195:40864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:07.427528 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:15:07.427736 kernel: audit: type=1130 audit(1707801307.400:2083): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.239:22-139.178.68.195:40864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:07.550676 sshd[10350]: Accepted publickey for core from 139.178.68.195 port 40864 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:07.550000 audit[10350]: USER_ACCT pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.552732 sshd[10350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:07.555121 systemd-logind[1467]: New session 46 of user core. Feb 13 05:15:07.555638 systemd[1]: Started session-46.scope. Feb 13 05:15:07.635820 sshd[10350]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:07.637199 systemd[1]: sshd@68-139.178.90.239:22-139.178.68.195:40864.service: Deactivated successfully. Feb 13 05:15:07.637650 systemd[1]: session-46.scope: Deactivated successfully. Feb 13 05:15:07.637964 systemd-logind[1467]: Session 46 logged out. Waiting for processes to exit. Feb 13 05:15:07.638354 systemd-logind[1467]: Removed session 46. Feb 13 05:15:07.552000 audit[10350]: CRED_ACQ pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.732710 kernel: audit: type=1101 audit(1707801307.550:2084): pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.732792 kernel: audit: type=1103 audit(1707801307.552:2085): pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.732835 kernel: audit: type=1006 audit(1707801307.552:2086): pid=10350 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=46 res=1 Feb 13 05:15:07.552000 audit[10350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38574620 a2=3 a3=0 items=0 ppid=1 pid=10350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:07.883517 kernel: audit: type=1300 audit(1707801307.552:2086): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38574620 a2=3 a3=0 items=0 ppid=1 pid=10350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:07.883569 kernel: audit: type=1327 audit(1707801307.552:2086): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:07.552000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:07.557000 audit[10350]: USER_START pid=10350 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:08.008581 kernel: audit: type=1105 audit(1707801307.557:2087): pid=10350 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:08.008654 kernel: audit: type=1103 audit(1707801307.557:2088): pid=10352 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.557000 audit[10352]: CRED_ACQ pid=10352 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.636000 audit[10350]: USER_END pid=10350 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:08.193523 kernel: audit: type=1106 audit(1707801307.636:2089): pid=10350 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:08.193620 kernel: audit: type=1104 audit(1707801307.636:2090): pid=10350 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.636000 audit[10350]: CRED_DISP pid=10350 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:07.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.90.239:22-139.178.68.195:40864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:08.301525 sshd[10281]: Failed password for root from 218.92.0.34 port 39283 ssh2 Feb 13 05:15:09.401183 sshd[10281]: Received disconnect from 218.92.0.34 port 39283:11: [preauth] Feb 13 05:15:09.401183 sshd[10281]: Disconnected from authenticating user root 218.92.0.34 port 39283 [preauth] Feb 13 05:15:09.401766 sshd[10281]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:09.403809 systemd[1]: sshd@66-139.178.90.239:22-218.92.0.34:39283.service: Deactivated successfully. Feb 13 05:15:09.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.90.239:22-218.92.0.34:39283 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:09.581810 systemd[1]: Started sshd@69-139.178.90.239:22-218.92.0.34:54026.service. Feb 13 05:15:09.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.239:22-218.92.0.34:54026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:10.659483 sshd[10375]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:10.659000 audit[10375]: USER_AUTH pid=10375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:10.909000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:10.909000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027e8000 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:15:10.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:15:10.909000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:10.909000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001aa9e40 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:15:10.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:15:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c006e20900 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:15:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:15:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0052613a0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:15:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:15:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c012aaf860 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:15:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:15:11.218000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:11.218000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009d0cff0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:15:11.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:15:11.218000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:11.218000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c007a2c5d0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:15:11.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:15:11.218000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:11.218000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e237fa0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:15:11.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:15:12.641684 sshd[10375]: Failed password for root from 218.92.0.34 port 54026 ssh2 Feb 13 05:15:12.645466 systemd[1]: Started sshd@70-139.178.90.239:22-139.178.68.195:40866.service. Feb 13 05:15:12.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.239:22-139.178.68.195:40866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:12.672591 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 13 05:15:12.672676 kernel: audit: type=1130 audit(1707801312.645:2103): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.239:22-139.178.68.195:40866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:12.795000 audit[10379]: USER_ACCT pid=10379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:12.796001 sshd[10379]: Accepted publickey for core from 139.178.68.195 port 40866 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:12.796578 sshd[10379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:12.798967 systemd-logind[1467]: New session 47 of user core. Feb 13 05:15:12.799518 systemd[1]: Started session-47.scope. Feb 13 05:15:12.795000 audit[10379]: CRED_ACQ pid=10379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:12.978660 kernel: audit: type=1101 audit(1707801312.795:2104): pid=10379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:12.978709 kernel: audit: type=1103 audit(1707801312.795:2105): pid=10379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:12.978726 kernel: audit: type=1006 audit(1707801312.795:2106): pid=10379 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=47 res=1 Feb 13 05:15:13.037307 kernel: audit: type=1300 audit(1707801312.795:2106): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92ca1c60 a2=3 a3=0 items=0 ppid=1 pid=10379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:12.795000 audit[10379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92ca1c60 a2=3 a3=0 items=0 ppid=1 pid=10379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:13.072167 sshd[10379]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:13.073677 systemd[1]: sshd@70-139.178.90.239:22-139.178.68.195:40866.service: Deactivated successfully. Feb 13 05:15:13.074121 systemd[1]: session-47.scope: Deactivated successfully. Feb 13 05:15:13.074396 systemd-logind[1467]: Session 47 logged out. Waiting for processes to exit. Feb 13 05:15:13.074984 systemd-logind[1467]: Removed session 47. Feb 13 05:15:12.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:13.159910 kernel: audit: type=1327 audit(1707801312.795:2106): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:13.159944 kernel: audit: type=1105 audit(1707801312.801:2107): pid=10379 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:12.801000 audit[10379]: USER_START pid=10379 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:12.802000 audit[10381]: CRED_ACQ pid=10381 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:13.343763 kernel: audit: type=1103 audit(1707801312.802:2108): pid=10381 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:13.343802 kernel: audit: type=1106 audit(1707801313.068:2109): pid=10379 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:13.068000 audit[10379]: USER_END pid=10379 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:13.439339 kernel: audit: type=1104 audit(1707801313.068:2110): pid=10379 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:13.068000 audit[10379]: CRED_DISP pid=10379 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:13.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.90.239:22-139.178.68.195:40866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:13.868000 audit[10375]: USER_AUTH pid=10375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:16.262796 sshd[10375]: Failed password for root from 218.92.0.34 port 54026 ssh2 Feb 13 05:15:17.077000 audit[10375]: USER_AUTH pid=10375 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.34 addr=218.92.0.34 terminal=ssh res=failed' Feb 13 05:15:18.085392 systemd[1]: Started sshd@71-139.178.90.239:22-139.178.68.195:48932.service. Feb 13 05:15:18.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.239:22-139.178.68.195:48932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:18.113123 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 05:15:18.113231 kernel: audit: type=1130 audit(1707801318.085:2114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.239:22-139.178.68.195:48932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:18.235000 audit[10406]: USER_ACCT pid=10406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.236526 sshd[10406]: Accepted publickey for core from 139.178.68.195 port 48932 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:18.237772 sshd[10406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:18.240530 systemd-logind[1467]: New session 48 of user core. Feb 13 05:15:18.241703 systemd[1]: Started session-48.scope. Feb 13 05:15:18.322913 sshd[10406]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:18.324466 systemd[1]: sshd@71-139.178.90.239:22-139.178.68.195:48932.service: Deactivated successfully. Feb 13 05:15:18.325239 systemd[1]: session-48.scope: Deactivated successfully. Feb 13 05:15:18.325796 systemd-logind[1467]: Session 48 logged out. Waiting for processes to exit. Feb 13 05:15:18.326295 systemd-logind[1467]: Removed session 48. Feb 13 05:15:18.237000 audit[10406]: CRED_ACQ pid=10406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.418516 kernel: audit: type=1101 audit(1707801318.235:2115): pid=10406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.418553 kernel: audit: type=1103 audit(1707801318.237:2116): pid=10406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.418577 kernel: audit: type=1006 audit(1707801318.237:2117): pid=10406 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 13 05:15:18.237000 audit[10406]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7d0a340 a2=3 a3=0 items=0 ppid=1 pid=10406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:18.569279 kernel: audit: type=1300 audit(1707801318.237:2117): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7d0a340 a2=3 a3=0 items=0 ppid=1 pid=10406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:18.569311 kernel: audit: type=1327 audit(1707801318.237:2117): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:18.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:18.599784 kernel: audit: type=1105 audit(1707801318.244:2118): pid=10406 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.244000 audit[10406]: USER_START pid=10406 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.694371 kernel: audit: type=1103 audit(1707801318.244:2119): pid=10408 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.244000 audit[10408]: CRED_ACQ pid=10408 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.783655 kernel: audit: type=1106 audit(1707801318.323:2120): pid=10406 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.323000 audit[10406]: USER_END pid=10406 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.879207 kernel: audit: type=1104 audit(1707801318.323:2121): pid=10406 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.323000 audit[10406]: CRED_DISP pid=10406 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:18.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.90.239:22-139.178.68.195:48932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:19.020486 sshd[10375]: Failed password for root from 218.92.0.34 port 54026 ssh2 Feb 13 05:15:20.285289 sshd[10375]: Received disconnect from 218.92.0.34 port 54026:11: [preauth] Feb 13 05:15:20.285289 sshd[10375]: Disconnected from authenticating user root 218.92.0.34 port 54026 [preauth] Feb 13 05:15:20.285501 sshd[10375]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.34 user=root Feb 13 05:15:20.286223 systemd[1]: sshd@69-139.178.90.239:22-218.92.0.34:54026.service: Deactivated successfully. Feb 13 05:15:20.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.90.239:22-218.92.0.34:54026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:21.769000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:15:21.769000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001bc9880 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:15:21.769000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:15:23.332070 systemd[1]: Started sshd@72-139.178.90.239:22-139.178.68.195:48934.service. Feb 13 05:15:23.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.239:22-139.178.68.195:48934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:23.359202 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 05:15:23.359247 kernel: audit: type=1130 audit(1707801323.331:2125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.239:22-139.178.68.195:48934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:23.482000 audit[10505]: USER_ACCT pid=10505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.483511 sshd[10505]: Accepted publickey for core from 139.178.68.195 port 48934 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:23.487299 sshd[10505]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:23.497966 systemd-logind[1467]: New session 49 of user core. Feb 13 05:15:23.500514 systemd[1]: Started session-49.scope. Feb 13 05:15:23.485000 audit[10505]: CRED_ACQ pid=10505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.588591 sshd[10505]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:23.589885 systemd[1]: sshd@72-139.178.90.239:22-139.178.68.195:48934.service: Deactivated successfully. Feb 13 05:15:23.590329 systemd[1]: session-49.scope: Deactivated successfully. Feb 13 05:15:23.590725 systemd-logind[1467]: Session 49 logged out. Waiting for processes to exit. Feb 13 05:15:23.591281 systemd-logind[1467]: Removed session 49. Feb 13 05:15:23.665465 kernel: audit: type=1101 audit(1707801323.482:2126): pid=10505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.665504 kernel: audit: type=1103 audit(1707801323.485:2127): pid=10505 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.665518 kernel: audit: type=1006 audit(1707801323.486:2128): pid=10505 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 13 05:15:23.724086 kernel: audit: type=1300 audit(1707801323.486:2128): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee687d5b0 a2=3 a3=0 items=0 ppid=1 pid=10505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:23.486000 audit[10505]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee687d5b0 a2=3 a3=0 items=0 ppid=1 pid=10505 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:23.816108 kernel: audit: type=1327 audit(1707801323.486:2128): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:23.486000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:23.846612 kernel: audit: type=1105 audit(1707801323.510:2129): pid=10505 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.510000 audit[10505]: USER_START pid=10505 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.941121 kernel: audit: type=1103 audit(1707801323.511:2130): pid=10507 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.511000 audit[10507]: CRED_ACQ pid=10507 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:24.030351 kernel: audit: type=1106 audit(1707801323.588:2131): pid=10505 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.588000 audit[10505]: USER_END pid=10505 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.588000 audit[10505]: CRED_DISP pid=10505 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:24.215231 kernel: audit: type=1104 audit(1707801323.588:2132): pid=10505 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:23.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.90.239:22-139.178.68.195:48934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d76880 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:15:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:15:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009fee20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:15:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:15:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011cc680 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:15:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:15:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:15:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001622640 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:15:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:15:26.977000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:15:26.977000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d25b20 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:15:26.977000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:15:28.598165 systemd[1]: Started sshd@73-139.178.90.239:22-139.178.68.195:42392.service. Feb 13 05:15:28.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.239:22-139.178.68.195:42392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:28.625072 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 05:15:28.625178 kernel: audit: type=1130 audit(1707801328.597:2139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.239:22-139.178.68.195:42392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:28.747000 audit[10530]: USER_ACCT pid=10530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.748743 sshd[10530]: Accepted publickey for core from 139.178.68.195 port 42392 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:28.753073 sshd[10530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:28.757366 systemd-logind[1467]: New session 50 of user core. Feb 13 05:15:28.757967 systemd[1]: Started session-50.scope. Feb 13 05:15:28.838296 sshd[10530]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:28.839813 systemd[1]: sshd@73-139.178.90.239:22-139.178.68.195:42392.service: Deactivated successfully. Feb 13 05:15:28.840260 systemd[1]: session-50.scope: Deactivated successfully. Feb 13 05:15:28.840743 systemd-logind[1467]: Session 50 logged out. Waiting for processes to exit. Feb 13 05:15:28.841258 systemd-logind[1467]: Removed session 50. Feb 13 05:15:28.751000 audit[10530]: CRED_ACQ pid=10530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.932714 kernel: audit: type=1101 audit(1707801328.747:2140): pid=10530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.932752 kernel: audit: type=1103 audit(1707801328.751:2141): pid=10530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.932771 kernel: audit: type=1006 audit(1707801328.751:2142): pid=10530 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 13 05:15:28.991321 kernel: audit: type=1300 audit(1707801328.751:2142): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffead440b70 a2=3 a3=0 items=0 ppid=1 pid=10530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:28.751000 audit[10530]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffead440b70 a2=3 a3=0 items=0 ppid=1 pid=10530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:29.083379 kernel: audit: type=1327 audit(1707801328.751:2142): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:28.751000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:29.113843 kernel: audit: type=1105 audit(1707801328.759:2143): pid=10530 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.759000 audit[10530]: USER_START pid=10530 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:29.208329 kernel: audit: type=1103 audit(1707801328.760:2144): pid=10532 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.760000 audit[10532]: CRED_ACQ pid=10532 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:29.297596 kernel: audit: type=1106 audit(1707801328.838:2145): pid=10530 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.838000 audit[10530]: USER_END pid=10530 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:29.393166 kernel: audit: type=1104 audit(1707801328.838:2146): pid=10530 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.838000 audit[10530]: CRED_DISP pid=10530 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:28.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.90.239:22-139.178.68.195:42392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:33.850103 systemd[1]: Started sshd@74-139.178.90.239:22-139.178.68.195:42404.service. Feb 13 05:15:33.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.239:22-139.178.68.195:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:33.877631 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:15:33.877728 kernel: audit: type=1130 audit(1707801333.850:2148): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.239:22-139.178.68.195:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:33.999403 sshd[10557]: Accepted publickey for core from 139.178.68.195 port 42404 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:33.998000 audit[10557]: USER_ACCT pid=10557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.000722 sshd[10557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:34.002975 systemd-logind[1467]: New session 51 of user core. Feb 13 05:15:34.003596 systemd[1]: Started session-51.scope. Feb 13 05:15:34.083860 sshd[10557]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:34.085142 systemd[1]: sshd@74-139.178.90.239:22-139.178.68.195:42404.service: Deactivated successfully. Feb 13 05:15:34.085601 systemd[1]: session-51.scope: Deactivated successfully. Feb 13 05:15:34.086045 systemd-logind[1467]: Session 51 logged out. Waiting for processes to exit. Feb 13 05:15:34.086482 systemd-logind[1467]: Removed session 51. Feb 13 05:15:34.000000 audit[10557]: CRED_ACQ pid=10557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.181273 kernel: audit: type=1101 audit(1707801333.998:2149): pid=10557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.181342 kernel: audit: type=1103 audit(1707801334.000:2150): pid=10557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.181382 kernel: audit: type=1006 audit(1707801334.000:2151): pid=10557 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 13 05:15:34.000000 audit[10557]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12b480a0 a2=3 a3=0 items=0 ppid=1 pid=10557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:34.331899 kernel: audit: type=1300 audit(1707801334.000:2151): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12b480a0 a2=3 a3=0 items=0 ppid=1 pid=10557 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:34.331948 kernel: audit: type=1327 audit(1707801334.000:2151): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:34.000000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:34.005000 audit[10557]: USER_START pid=10557 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.456861 kernel: audit: type=1105 audit(1707801334.005:2152): pid=10557 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.456916 kernel: audit: type=1103 audit(1707801334.006:2153): pid=10597 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.006000 audit[10597]: CRED_ACQ pid=10597 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.083000 audit[10557]: USER_END pid=10557 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.641591 kernel: audit: type=1106 audit(1707801334.083:2154): pid=10557 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.641653 kernel: audit: type=1104 audit(1707801334.084:2155): pid=10557 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.084000 audit[10557]: CRED_DISP pid=10557 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:34.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.90.239:22-139.178.68.195:42404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:39.087385 systemd[1]: Started sshd@75-139.178.90.239:22-139.178.68.195:39894.service. Feb 13 05:15:39.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.239:22-139.178.68.195:39894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:39.113665 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:15:39.113796 kernel: audit: type=1130 audit(1707801339.087:2157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.239:22-139.178.68.195:39894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:39.234000 audit[10619]: USER_ACCT pid=10619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.234979 sshd[10619]: Accepted publickey for core from 139.178.68.195 port 39894 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:39.235737 sshd[10619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:39.238089 systemd-logind[1467]: New session 52 of user core. Feb 13 05:15:39.238847 systemd[1]: Started session-52.scope. Feb 13 05:15:39.317732 sshd[10619]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:39.319121 systemd[1]: sshd@75-139.178.90.239:22-139.178.68.195:39894.service: Deactivated successfully. Feb 13 05:15:39.319612 systemd[1]: session-52.scope: Deactivated successfully. Feb 13 05:15:39.319989 systemd-logind[1467]: Session 52 logged out. Waiting for processes to exit. Feb 13 05:15:39.320400 systemd-logind[1467]: Removed session 52. Feb 13 05:15:39.235000 audit[10619]: CRED_ACQ pid=10619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.416685 kernel: audit: type=1101 audit(1707801339.234:2158): pid=10619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.416727 kernel: audit: type=1103 audit(1707801339.235:2159): pid=10619 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.416746 kernel: audit: type=1006 audit(1707801339.235:2160): pid=10619 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 13 05:15:39.475278 kernel: audit: type=1300 audit(1707801339.235:2160): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea4567e10 a2=3 a3=0 items=0 ppid=1 pid=10619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:39.235000 audit[10619]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea4567e10 a2=3 a3=0 items=0 ppid=1 pid=10619 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:39.567256 kernel: audit: type=1327 audit(1707801339.235:2160): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:39.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:39.597724 kernel: audit: type=1105 audit(1707801339.240:2161): pid=10619 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.240000 audit[10619]: USER_START pid=10619 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.692180 kernel: audit: type=1103 audit(1707801339.241:2162): pid=10621 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.241000 audit[10621]: CRED_ACQ pid=10621 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.781368 kernel: audit: type=1106 audit(1707801339.317:2163): pid=10619 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.317000 audit[10619]: USER_END pid=10619 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.876812 kernel: audit: type=1104 audit(1707801339.317:2164): pid=10619 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.317000 audit[10619]: CRED_DISP pid=10619 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:39.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.90.239:22-139.178.68.195:39894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:44.328093 systemd[1]: Started sshd@76-139.178.90.239:22-139.178.68.195:39900.service. Feb 13 05:15:44.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.239:22-139.178.68.195:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:44.355569 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:15:44.355722 kernel: audit: type=1130 audit(1707801344.327:2166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.239:22-139.178.68.195:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:44.477866 sshd[10647]: Accepted publickey for core from 139.178.68.195 port 39900 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:44.477000 audit[10647]: USER_ACCT pid=10647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.478732 sshd[10647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:44.481065 systemd-logind[1467]: New session 53 of user core. Feb 13 05:15:44.481776 systemd[1]: Started session-53.scope. Feb 13 05:15:44.562816 sshd[10647]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:44.564105 systemd[1]: sshd@76-139.178.90.239:22-139.178.68.195:39900.service: Deactivated successfully. Feb 13 05:15:44.564565 systemd[1]: session-53.scope: Deactivated successfully. Feb 13 05:15:44.564997 systemd-logind[1467]: Session 53 logged out. Waiting for processes to exit. Feb 13 05:15:44.565422 systemd-logind[1467]: Removed session 53. Feb 13 05:15:44.478000 audit[10647]: CRED_ACQ pid=10647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.661265 kernel: audit: type=1101 audit(1707801344.477:2167): pid=10647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.661326 kernel: audit: type=1103 audit(1707801344.478:2168): pid=10647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.661369 kernel: audit: type=1006 audit(1707801344.478:2169): pid=10647 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 13 05:15:44.478000 audit[10647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc412ab2b0 a2=3 a3=0 items=0 ppid=1 pid=10647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:44.811884 kernel: audit: type=1300 audit(1707801344.478:2169): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc412ab2b0 a2=3 a3=0 items=0 ppid=1 pid=10647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:44.811946 kernel: audit: type=1327 audit(1707801344.478:2169): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:44.478000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:44.483000 audit[10647]: USER_START pid=10647 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.842446 kernel: audit: type=1105 audit(1707801344.483:2170): pid=10647 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.484000 audit[10649]: CRED_ACQ pid=10649 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:45.026154 kernel: audit: type=1103 audit(1707801344.484:2171): pid=10649 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:45.026185 kernel: audit: type=1106 audit(1707801344.562:2172): pid=10647 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.562000 audit[10647]: USER_END pid=10647 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:45.121668 kernel: audit: type=1104 audit(1707801344.563:2173): pid=10647 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.563000 audit[10647]: CRED_DISP pid=10647 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:44.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.90.239:22-139.178.68.195:39900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:49.572962 systemd[1]: Started sshd@77-139.178.90.239:22-139.178.68.195:48926.service. Feb 13 05:15:49.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.239:22-139.178.68.195:48926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:49.599511 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:15:49.599604 kernel: audit: type=1130 audit(1707801349.572:2175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.239:22-139.178.68.195:48926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:49.720000 audit[10672]: USER_ACCT pid=10672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.720940 sshd[10672]: Accepted publickey for core from 139.178.68.195 port 48926 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:49.721760 sshd[10672]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:49.723960 systemd-logind[1467]: New session 54 of user core. Feb 13 05:15:49.724693 systemd[1]: Started session-54.scope. Feb 13 05:15:49.810076 sshd[10672]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:49.812324 systemd[1]: sshd@77-139.178.90.239:22-139.178.68.195:48926.service: Deactivated successfully. Feb 13 05:15:49.812766 systemd[1]: session-54.scope: Deactivated successfully. Feb 13 05:15:49.813164 systemd-logind[1467]: Session 54 logged out. Waiting for processes to exit. Feb 13 05:15:49.813891 systemd[1]: Started sshd@78-139.178.90.239:22-139.178.68.195:48930.service. Feb 13 05:15:49.814313 systemd-logind[1467]: Removed session 54. Feb 13 05:15:49.721000 audit[10672]: CRED_ACQ pid=10672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.905369 kernel: audit: type=1101 audit(1707801349.720:2176): pid=10672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.905422 kernel: audit: type=1103 audit(1707801349.721:2177): pid=10672 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.905449 kernel: audit: type=1006 audit(1707801349.721:2178): pid=10672 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 13 05:15:49.964024 kernel: audit: type=1300 audit(1707801349.721:2178): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad0f6540 a2=3 a3=0 items=0 ppid=1 pid=10672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:49.721000 audit[10672]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdad0f6540 a2=3 a3=0 items=0 ppid=1 pid=10672 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:49.996288 sshd[10697]: Accepted publickey for core from 139.178.68.195 port 48930 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:49.997865 sshd[10697]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:50.000058 systemd-logind[1467]: New session 55 of user core. Feb 13 05:15:50.000505 systemd[1]: Started session-55.scope. Feb 13 05:15:49.721000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:50.086612 kernel: audit: type=1327 audit(1707801349.721:2178): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:50.086670 kernel: audit: type=1105 audit(1707801349.726:2179): pid=10672 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.726000 audit[10672]: USER_START pid=10672 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.181132 kernel: audit: type=1103 audit(1707801349.727:2180): pid=10674 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.727000 audit[10674]: CRED_ACQ pid=10674 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.270382 kernel: audit: type=1106 audit(1707801349.810:2181): pid=10672 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.810000 audit[10672]: USER_END pid=10672 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.365975 kernel: audit: type=1104 audit(1707801349.810:2182): pid=10672 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.810000 audit[10672]: CRED_DISP pid=10672 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.90.239:22-139.178.68.195:48926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:49.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.239:22-139.178.68.195:48930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:49.995000 audit[10697]: USER_ACCT pid=10697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.997000 audit[10697]: CRED_ACQ pid=10697 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:49.997000 audit[10697]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3f0975f0 a2=3 a3=0 items=0 ppid=1 pid=10697 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:49.997000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:50.002000 audit[10697]: USER_START pid=10697 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.002000 audit[10699]: CRED_ACQ pid=10699 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.857997 sshd[10697]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:50.859000 audit[10697]: USER_END pid=10697 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.860000 audit[10697]: CRED_DISP pid=10697 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.863618 systemd[1]: sshd@78-139.178.90.239:22-139.178.68.195:48930.service: Deactivated successfully. Feb 13 05:15:50.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.90.239:22-139.178.68.195:48930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:50.864119 systemd[1]: session-55.scope: Deactivated successfully. Feb 13 05:15:50.864556 systemd-logind[1467]: Session 55 logged out. Waiting for processes to exit. Feb 13 05:15:50.865281 systemd[1]: Started sshd@79-139.178.90.239:22-139.178.68.195:48936.service. Feb 13 05:15:50.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.239:22-139.178.68.195:48936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:50.865850 systemd-logind[1467]: Removed session 55. Feb 13 05:15:50.903000 audit[10719]: USER_ACCT pid=10719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.903798 sshd[10719]: Accepted publickey for core from 139.178.68.195 port 48936 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:50.904000 audit[10719]: CRED_ACQ pid=10719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.904000 audit[10719]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee5ccb690 a2=3 a3=0 items=0 ppid=1 pid=10719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:50.904000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:50.904853 sshd[10719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:50.908678 systemd-logind[1467]: New session 56 of user core. Feb 13 05:15:50.910126 systemd[1]: Started session-56.scope. Feb 13 05:15:50.915000 audit[10719]: USER_START pid=10719 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:50.916000 audit[10721]: CRED_ACQ pid=10721 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.499000 audit[10762]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=10762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 05:15:51.499000 audit[10762]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fffd484aa60 a2=0 a3=7fffd484aa4c items=0 ppid=2861 pid=10762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:51.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 05:15:51.505274 sshd[10719]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:51.505000 audit[10719]: USER_END pid=10719 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.505000 audit[10719]: CRED_DISP pid=10719 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.507184 systemd[1]: sshd@79-139.178.90.239:22-139.178.68.195:48936.service: Deactivated successfully. Feb 13 05:15:51.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.90.239:22-139.178.68.195:48936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:51.507549 systemd[1]: session-56.scope: Deactivated successfully. Feb 13 05:15:51.507912 systemd-logind[1467]: Session 56 logged out. Waiting for processes to exit. Feb 13 05:15:51.508544 systemd[1]: Started sshd@80-139.178.90.239:22-139.178.68.195:48942.service. Feb 13 05:15:51.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.239:22-139.178.68.195:48942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:51.508987 systemd-logind[1467]: Removed session 56. Feb 13 05:15:51.510000 audit[10762]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=10762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 05:15:51.510000 audit[10762]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fffd484aa60 a2=0 a3=31030 items=0 ppid=2861 pid=10762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:51.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 05:15:51.522000 audit[10769]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=10769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 05:15:51.522000 audit[10769]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffecb78c880 a2=0 a3=7ffecb78c86c items=0 ppid=2861 pid=10769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:51.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 05:15:51.535000 audit[10769]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=10769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 05:15:51.535000 audit[10769]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffecb78c880 a2=0 a3=31030 items=0 ppid=2861 pid=10769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:51.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 05:15:51.546000 audit[10766]: USER_ACCT pid=10766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.546556 sshd[10766]: Accepted publickey for core from 139.178.68.195 port 48942 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:51.546000 audit[10766]: CRED_ACQ pid=10766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.546000 audit[10766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe390887a0 a2=3 a3=0 items=0 ppid=1 pid=10766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:51.546000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:51.547408 sshd[10766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:51.549799 systemd-logind[1467]: New session 57 of user core. Feb 13 05:15:51.550467 systemd[1]: Started session-57.scope. Feb 13 05:15:51.552000 audit[10766]: USER_START pid=10766 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.553000 audit[10770]: CRED_ACQ pid=10770 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.798224 sshd[10766]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:51.798000 audit[10766]: USER_END pid=10766 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.798000 audit[10766]: CRED_DISP pid=10766 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.800110 systemd[1]: sshd@80-139.178.90.239:22-139.178.68.195:48942.service: Deactivated successfully. Feb 13 05:15:51.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.90.239:22-139.178.68.195:48942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:51.800597 systemd[1]: session-57.scope: Deactivated successfully. Feb 13 05:15:51.801052 systemd-logind[1467]: Session 57 logged out. Waiting for processes to exit. Feb 13 05:15:51.801779 systemd[1]: Started sshd@81-139.178.90.239:22-139.178.68.195:48954.service. Feb 13 05:15:51.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.239:22-139.178.68.195:48954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:51.802184 systemd-logind[1467]: Removed session 57. Feb 13 05:15:51.839000 audit[10791]: USER_ACCT pid=10791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.840798 sshd[10791]: Accepted publickey for core from 139.178.68.195 port 48954 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:51.842000 audit[10791]: CRED_ACQ pid=10791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.842000 audit[10791]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0bb66730 a2=3 a3=0 items=0 ppid=1 pid=10791 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:51.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:51.843982 sshd[10791]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:51.854820 systemd-logind[1467]: New session 58 of user core. Feb 13 05:15:51.858062 systemd[1]: Started session-58.scope. Feb 13 05:15:51.872000 audit[10791]: USER_START pid=10791 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.875000 audit[10794]: CRED_ACQ pid=10794 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.992997 sshd[10791]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:51.993000 audit[10791]: USER_END pid=10791 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.993000 audit[10791]: CRED_DISP pid=10791 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:51.994380 systemd[1]: sshd@81-139.178.90.239:22-139.178.68.195:48954.service: Deactivated successfully. Feb 13 05:15:51.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.90.239:22-139.178.68.195:48954 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:51.994827 systemd[1]: session-58.scope: Deactivated successfully. Feb 13 05:15:51.995217 systemd-logind[1467]: Session 58 logged out. Waiting for processes to exit. Feb 13 05:15:51.995774 systemd-logind[1467]: Removed session 58. Feb 13 05:15:57.003030 systemd[1]: Started sshd@82-139.178.90.239:22-139.178.68.195:35512.service. Feb 13 05:15:57.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.239:22-139.178.68.195:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:57.030097 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 13 05:15:57.030173 kernel: audit: type=1130 audit(1707801357.001:2224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.239:22-139.178.68.195:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:15:57.152000 audit[10845]: USER_ACCT pid=10845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.153863 sshd[10845]: Accepted publickey for core from 139.178.68.195 port 35512 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:15:57.156200 sshd[10845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:15:57.161248 systemd-logind[1467]: New session 59 of user core. Feb 13 05:15:57.162310 systemd[1]: Started session-59.scope. Feb 13 05:15:57.154000 audit[10845]: CRED_ACQ pid=10845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.253886 sshd[10845]: pam_unix(sshd:session): session closed for user core Feb 13 05:15:57.255511 systemd[1]: sshd@82-139.178.90.239:22-139.178.68.195:35512.service: Deactivated successfully. Feb 13 05:15:57.255951 systemd[1]: session-59.scope: Deactivated successfully. Feb 13 05:15:57.256268 systemd-logind[1467]: Session 59 logged out. Waiting for processes to exit. Feb 13 05:15:57.256737 systemd-logind[1467]: Removed session 59. Feb 13 05:15:57.336391 kernel: audit: type=1101 audit(1707801357.152:2225): pid=10845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.336432 kernel: audit: type=1103 audit(1707801357.154:2226): pid=10845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.336454 kernel: audit: type=1006 audit(1707801357.154:2227): pid=10845 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 13 05:15:57.395008 kernel: audit: type=1300 audit(1707801357.154:2227): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85f48a70 a2=3 a3=0 items=0 ppid=1 pid=10845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:57.154000 audit[10845]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85f48a70 a2=3 a3=0 items=0 ppid=1 pid=10845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:15:57.487055 kernel: audit: type=1327 audit(1707801357.154:2227): proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:57.154000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:15:57.517526 kernel: audit: type=1105 audit(1707801357.163:2228): pid=10845 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.163000 audit[10845]: USER_START pid=10845 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.612029 kernel: audit: type=1103 audit(1707801357.163:2229): pid=10847 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.163000 audit[10847]: CRED_ACQ pid=10847 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.701253 kernel: audit: type=1106 audit(1707801357.253:2230): pid=10845 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.253000 audit[10845]: USER_END pid=10845 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.796735 kernel: audit: type=1104 audit(1707801357.253:2231): pid=10845 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.253000 audit[10845]: CRED_DISP pid=10845 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:15:57.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.90.239:22-139.178.68.195:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:02.263871 systemd[1]: Started sshd@83-139.178.90.239:22-139.178.68.195:35514.service. Feb 13 05:16:02.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.239:22-139.178.68.195:35514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:02.290831 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:02.290906 kernel: audit: type=1130 audit(1707801362.262:2233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.239:22-139.178.68.195:35514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:02.412000 audit[10872]: USER_ACCT pid=10872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.413948 sshd[10872]: Accepted publickey for core from 139.178.68.195 port 35514 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:02.415771 sshd[10872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:02.418432 systemd-logind[1467]: New session 60 of user core. Feb 13 05:16:02.419654 systemd[1]: Started session-60.scope. Feb 13 05:16:02.498005 sshd[10872]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:02.499693 systemd[1]: sshd@83-139.178.90.239:22-139.178.68.195:35514.service: Deactivated successfully. Feb 13 05:16:02.500480 systemd[1]: session-60.scope: Deactivated successfully. Feb 13 05:16:02.501111 systemd-logind[1467]: Session 60 logged out. Waiting for processes to exit. Feb 13 05:16:02.501685 systemd-logind[1467]: Removed session 60. Feb 13 05:16:02.414000 audit[10872]: CRED_ACQ pid=10872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.596044 kernel: audit: type=1101 audit(1707801362.412:2234): pid=10872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.596093 kernel: audit: type=1103 audit(1707801362.414:2235): pid=10872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.596113 kernel: audit: type=1006 audit(1707801362.414:2236): pid=10872 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 13 05:16:02.654665 kernel: audit: type=1300 audit(1707801362.414:2236): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe61c25350 a2=3 a3=0 items=0 ppid=1 pid=10872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:02.414000 audit[10872]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe61c25350 a2=3 a3=0 items=0 ppid=1 pid=10872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:02.746640 kernel: audit: type=1327 audit(1707801362.414:2236): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:02.414000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:02.777117 kernel: audit: type=1105 audit(1707801362.420:2237): pid=10872 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.420000 audit[10872]: USER_START pid=10872 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.421000 audit[10874]: CRED_ACQ pid=10874 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.960867 kernel: audit: type=1103 audit(1707801362.421:2238): pid=10874 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.960900 kernel: audit: type=1106 audit(1707801362.497:2239): pid=10872 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.497000 audit[10872]: USER_END pid=10872 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:03.056329 kernel: audit: type=1104 audit(1707801362.497:2240): pid=10872 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.497000 audit[10872]: CRED_DISP pid=10872 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:02.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.90.239:22-139.178.68.195:35514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:07.508113 systemd[1]: Started sshd@84-139.178.90.239:22-139.178.68.195:40118.service. Feb 13 05:16:07.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.239:22-139.178.68.195:40118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:07.535270 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:07.535317 kernel: audit: type=1130 audit(1707801367.506:2242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.239:22-139.178.68.195:40118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:07.656000 audit[10937]: USER_ACCT pid=10937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.658256 sshd[10937]: Accepted publickey for core from 139.178.68.195 port 40118 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:07.659729 sshd[10937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:07.662189 systemd-logind[1467]: New session 61 of user core. Feb 13 05:16:07.662660 systemd[1]: Started session-61.scope. Feb 13 05:16:07.745674 sshd[10937]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:07.747425 systemd[1]: sshd@84-139.178.90.239:22-139.178.68.195:40118.service: Deactivated successfully. Feb 13 05:16:07.748287 systemd[1]: session-61.scope: Deactivated successfully. Feb 13 05:16:07.748887 systemd-logind[1467]: Session 61 logged out. Waiting for processes to exit. Feb 13 05:16:07.749383 systemd-logind[1467]: Removed session 61. Feb 13 05:16:07.658000 audit[10937]: CRED_ACQ pid=10937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.842435 kernel: audit: type=1101 audit(1707801367.656:2243): pid=10937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.842478 kernel: audit: type=1103 audit(1707801367.658:2244): pid=10937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.842499 kernel: audit: type=1006 audit(1707801367.658:2245): pid=10937 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Feb 13 05:16:07.901073 kernel: audit: type=1300 audit(1707801367.658:2245): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7e8f8480 a2=3 a3=0 items=0 ppid=1 pid=10937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:07.658000 audit[10937]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7e8f8480 a2=3 a3=0 items=0 ppid=1 pid=10937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:07.658000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:08.023524 kernel: audit: type=1327 audit(1707801367.658:2245): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:08.023554 kernel: audit: type=1105 audit(1707801367.663:2246): pid=10937 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.663000 audit[10937]: USER_START pid=10937 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:08.117997 kernel: audit: type=1103 audit(1707801367.663:2247): pid=10939 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.663000 audit[10939]: CRED_ACQ pid=10939 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:08.207217 kernel: audit: type=1106 audit(1707801367.744:2248): pid=10937 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.744000 audit[10937]: USER_END pid=10937 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:08.302722 kernel: audit: type=1104 audit(1707801367.745:2249): pid=10937 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.745000 audit[10937]: CRED_DISP pid=10937 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:07.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.90.239:22-139.178.68.195:40118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:10.910000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:10.910000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013bdb80 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:16:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:16:10.910000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:10.910000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013b5590 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:16:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:16:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c009249f80 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:16:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:16:11.208000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:11.208000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c010825650 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:16:11.208000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:16:11.209000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:11.209000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00dfe96e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:16:11.209000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:16:11.217000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:11.217000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00c694bd0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:16:11.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:16:11.218000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:11.218000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00dfe9700 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:16:11.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:16:11.218000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:11.218000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0108256e0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:16:11.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:16:12.750334 systemd[1]: Started sshd@85-139.178.90.239:22-139.178.68.195:40134.service. Feb 13 05:16:12.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.239:22-139.178.68.195:40134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:12.777298 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 05:16:12.777370 kernel: audit: type=1130 audit(1707801372.749:2259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.239:22-139.178.68.195:40134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:12.899000 audit[10976]: USER_ACCT pid=10976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:12.901205 sshd[10976]: Accepted publickey for core from 139.178.68.195 port 40134 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:12.905019 sshd[10976]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:12.910140 systemd-logind[1467]: New session 62 of user core. Feb 13 05:16:12.910595 systemd[1]: Started session-62.scope. Feb 13 05:16:12.988102 sshd[10976]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:12.989525 systemd[1]: sshd@85-139.178.90.239:22-139.178.68.195:40134.service: Deactivated successfully. Feb 13 05:16:12.989973 systemd[1]: session-62.scope: Deactivated successfully. Feb 13 05:16:12.990280 systemd-logind[1467]: Session 62 logged out. Waiting for processes to exit. Feb 13 05:16:12.990869 systemd-logind[1467]: Removed session 62. Feb 13 05:16:12.902000 audit[10976]: CRED_ACQ pid=10976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:13.083458 kernel: audit: type=1101 audit(1707801372.899:2260): pid=10976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:13.083502 kernel: audit: type=1103 audit(1707801372.902:2261): pid=10976 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:13.083521 kernel: audit: type=1006 audit(1707801372.902:2262): pid=10976 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 13 05:16:13.142159 kernel: audit: type=1300 audit(1707801372.902:2262): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff177bf9b0 a2=3 a3=0 items=0 ppid=1 pid=10976 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:12.902000 audit[10976]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff177bf9b0 a2=3 a3=0 items=0 ppid=1 pid=10976 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:13.234321 kernel: audit: type=1327 audit(1707801372.902:2262): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:12.902000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:13.264836 kernel: audit: type=1105 audit(1707801372.911:2263): pid=10976 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:12.911000 audit[10976]: USER_START pid=10976 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:13.359373 kernel: audit: type=1103 audit(1707801372.912:2264): pid=10978 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:12.912000 audit[10978]: CRED_ACQ pid=10978 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:13.448632 kernel: audit: type=1106 audit(1707801372.987:2265): pid=10976 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:12.987000 audit[10976]: USER_END pid=10976 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:13.544178 kernel: audit: type=1104 audit(1707801372.987:2266): pid=10976 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:12.987000 audit[10976]: CRED_DISP pid=10976 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:12.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.90.239:22-139.178.68.195:40134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:17.996930 systemd[1]: Started sshd@86-139.178.90.239:22-139.178.68.195:41462.service. Feb 13 05:16:17.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.239:22-139.178.68.195:41462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:18.023518 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:18.023588 kernel: audit: type=1130 audit(1707801377.995:2268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.239:22-139.178.68.195:41462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:18.144000 audit[11004]: USER_ACCT pid=11004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.146914 sshd[11004]: Accepted publickey for core from 139.178.68.195 port 41462 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:18.150873 sshd[11004]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:18.154521 systemd-logind[1467]: New session 63 of user core. Feb 13 05:16:18.155141 systemd[1]: Started session-63.scope. Feb 13 05:16:18.234615 sshd[11004]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:18.236183 systemd[1]: sshd@86-139.178.90.239:22-139.178.68.195:41462.service: Deactivated successfully. Feb 13 05:16:18.236690 systemd[1]: session-63.scope: Deactivated successfully. Feb 13 05:16:18.237092 systemd-logind[1467]: Session 63 logged out. Waiting for processes to exit. Feb 13 05:16:18.237605 systemd-logind[1467]: Removed session 63. Feb 13 05:16:18.148000 audit[11004]: CRED_ACQ pid=11004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.330822 kernel: audit: type=1101 audit(1707801378.144:2269): pid=11004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.330897 kernel: audit: type=1103 audit(1707801378.148:2270): pid=11004 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.330914 kernel: audit: type=1006 audit(1707801378.148:2271): pid=11004 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 13 05:16:18.389526 kernel: audit: type=1300 audit(1707801378.148:2271): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8e2268a0 a2=3 a3=0 items=0 ppid=1 pid=11004 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:18.148000 audit[11004]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8e2268a0 a2=3 a3=0 items=0 ppid=1 pid=11004 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:18.481592 kernel: audit: type=1327 audit(1707801378.148:2271): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:18.148000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:18.512094 kernel: audit: type=1105 audit(1707801378.155:2272): pid=11004 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.155000 audit[11004]: USER_START pid=11004 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.606634 kernel: audit: type=1103 audit(1707801378.156:2273): pid=11006 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.156000 audit[11006]: CRED_ACQ pid=11006 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.695903 kernel: audit: type=1106 audit(1707801378.233:2274): pid=11004 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.233000 audit[11004]: USER_END pid=11004 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.791414 kernel: audit: type=1104 audit(1707801378.233:2275): pid=11004 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.233000 audit[11004]: CRED_DISP pid=11004 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:18.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.90.239:22-139.178.68.195:41462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:21.769000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:16:21.769000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ba4480 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:16:21.769000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:16:23.245007 systemd[1]: Started sshd@87-139.178.90.239:22-139.178.68.195:41470.service. Feb 13 05:16:23.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.239:22-139.178.68.195:41470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:23.271618 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:16:23.271712 kernel: audit: type=1130 audit(1707801383.243:2278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.239:22-139.178.68.195:41470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:23.392000 audit[11093]: USER_ACCT pid=11093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.394475 sshd[11093]: Accepted publickey for core from 139.178.68.195 port 41470 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:23.398707 sshd[11093]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:23.403164 systemd-logind[1467]: New session 64 of user core. Feb 13 05:16:23.403740 systemd[1]: Started session-64.scope. Feb 13 05:16:23.482344 sshd[11093]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:23.483725 systemd[1]: sshd@87-139.178.90.239:22-139.178.68.195:41470.service: Deactivated successfully. Feb 13 05:16:23.484176 systemd[1]: session-64.scope: Deactivated successfully. Feb 13 05:16:23.484507 systemd-logind[1467]: Session 64 logged out. Waiting for processes to exit. Feb 13 05:16:23.485043 systemd-logind[1467]: Removed session 64. Feb 13 05:16:23.396000 audit[11093]: CRED_ACQ pid=11093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.576808 kernel: audit: type=1101 audit(1707801383.392:2279): pid=11093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.576846 kernel: audit: type=1103 audit(1707801383.396:2280): pid=11093 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.576862 kernel: audit: type=1006 audit(1707801383.396:2281): pid=11093 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=64 res=1 Feb 13 05:16:23.635468 kernel: audit: type=1300 audit(1707801383.396:2281): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9011bc40 a2=3 a3=0 items=0 ppid=1 pid=11093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:23.396000 audit[11093]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9011bc40 a2=3 a3=0 items=0 ppid=1 pid=11093 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:23.727521 kernel: audit: type=1327 audit(1707801383.396:2281): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:23.396000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:23.758028 kernel: audit: type=1105 audit(1707801383.404:2282): pid=11093 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.404000 audit[11093]: USER_START pid=11093 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.852607 kernel: audit: type=1103 audit(1707801383.405:2283): pid=11095 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.405000 audit[11095]: CRED_ACQ pid=11095 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.941829 kernel: audit: type=1106 audit(1707801383.481:2284): pid=11093 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.481000 audit[11093]: USER_END pid=11093 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:24.037336 kernel: audit: type=1104 audit(1707801383.481:2285): pid=11093 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.481000 audit[11093]: CRED_DISP pid=11093 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:23.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.90.239:22-139.178.68.195:41470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00116dae0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:16:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:16:24.380000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:24.380000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018113c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:16:24.380000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:16:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475220 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:16:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:16:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:16:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001475260 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:16:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:16:26.976000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:16:26.976000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ec7180 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:16:26.976000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:16:28.492061 systemd[1]: Started sshd@88-139.178.90.239:22-139.178.68.195:54246.service. Feb 13 05:16:28.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.239:22-139.178.68.195:54246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:28.519118 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 05:16:28.519180 kernel: audit: type=1130 audit(1707801388.490:2292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.239:22-139.178.68.195:54246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:28.639000 audit[11119]: USER_ACCT pid=11119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.641329 sshd[11119]: Accepted publickey for core from 139.178.68.195 port 54246 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:28.645592 sshd[11119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:28.650186 systemd-logind[1467]: New session 65 of user core. Feb 13 05:16:28.650718 systemd[1]: Started session-65.scope. Feb 13 05:16:28.734906 sshd[11119]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:28.643000 audit[11119]: CRED_ACQ pid=11119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.736159 systemd[1]: sshd@88-139.178.90.239:22-139.178.68.195:54246.service: Deactivated successfully. Feb 13 05:16:28.736656 systemd[1]: session-65.scope: Deactivated successfully. Feb 13 05:16:28.737088 systemd-logind[1467]: Session 65 logged out. Waiting for processes to exit. Feb 13 05:16:28.737557 systemd-logind[1467]: Removed session 65. Feb 13 05:16:28.825619 kernel: audit: type=1101 audit(1707801388.639:2293): pid=11119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.825669 kernel: audit: type=1103 audit(1707801388.643:2294): pid=11119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.825689 kernel: audit: type=1006 audit(1707801388.643:2295): pid=11119 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 13 05:16:28.643000 audit[11119]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34c12530 a2=3 a3=0 items=0 ppid=1 pid=11119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:28.884451 kernel: audit: type=1300 audit(1707801388.643:2295): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc34c12530 a2=3 a3=0 items=0 ppid=1 pid=11119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:28.643000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:29.006955 kernel: audit: type=1327 audit(1707801388.643:2295): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:29.006989 kernel: audit: type=1105 audit(1707801388.651:2296): pid=11119 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.651000 audit[11119]: USER_START pid=11119 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:29.101525 kernel: audit: type=1103 audit(1707801388.651:2297): pid=11121 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.651000 audit[11121]: CRED_ACQ pid=11121 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:29.190776 kernel: audit: type=1106 audit(1707801388.733:2298): pid=11119 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.733000 audit[11119]: USER_END pid=11119 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.733000 audit[11119]: CRED_DISP pid=11119 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:29.286465 kernel: audit: type=1104 audit(1707801388.733:2299): pid=11119 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:28.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.90.239:22-139.178.68.195:54246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:33.744928 systemd[1]: Started sshd@89-139.178.90.239:22-139.178.68.195:54248.service. Feb 13 05:16:33.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.239:22-139.178.68.195:54248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:33.771963 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:33.772058 kernel: audit: type=1130 audit(1707801393.743:2301): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.239:22-139.178.68.195:54248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:33.893000 audit[11146]: USER_ACCT pid=11146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.895336 sshd[11146]: Accepted publickey for core from 139.178.68.195 port 54248 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:33.899190 sshd[11146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:33.904139 systemd-logind[1467]: New session 66 of user core. Feb 13 05:16:33.904946 systemd[1]: Started session-66.scope. Feb 13 05:16:33.896000 audit[11146]: CRED_ACQ pid=11146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.989235 sshd[11146]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:33.990706 systemd[1]: sshd@89-139.178.90.239:22-139.178.68.195:54248.service: Deactivated successfully. Feb 13 05:16:33.991176 systemd[1]: session-66.scope: Deactivated successfully. Feb 13 05:16:33.991494 systemd-logind[1467]: Session 66 logged out. Waiting for processes to exit. Feb 13 05:16:33.992096 systemd-logind[1467]: Removed session 66. Feb 13 05:16:34.076749 kernel: audit: type=1101 audit(1707801393.893:2302): pid=11146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:34.076828 kernel: audit: type=1103 audit(1707801393.896:2303): pid=11146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:34.076845 kernel: audit: type=1006 audit(1707801393.896:2304): pid=11146 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 13 05:16:34.135428 kernel: audit: type=1300 audit(1707801393.896:2304): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e82aca0 a2=3 a3=0 items=0 ppid=1 pid=11146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:33.896000 audit[11146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e82aca0 a2=3 a3=0 items=0 ppid=1 pid=11146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:34.227519 kernel: audit: type=1327 audit(1707801393.896:2304): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:33.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:34.258033 kernel: audit: type=1105 audit(1707801393.910:2305): pid=11146 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.910000 audit[11146]: USER_START pid=11146 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.911000 audit[11165]: CRED_ACQ pid=11165 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:34.441778 kernel: audit: type=1103 audit(1707801393.911:2306): pid=11165 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:34.441819 kernel: audit: type=1106 audit(1707801393.988:2307): pid=11146 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.988000 audit[11146]: USER_END pid=11146 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:34.537297 kernel: audit: type=1104 audit(1707801393.988:2308): pid=11146 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.988000 audit[11146]: CRED_DISP pid=11146 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:33.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.90.239:22-139.178.68.195:54248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:39.001353 systemd[1]: Started sshd@90-139.178.90.239:22-139.178.68.195:41874.service. Feb 13 05:16:39.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.239:22-139.178.68.195:41874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:39.043795 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:39.043882 kernel: audit: type=1130 audit(1707801399.000:2310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.239:22-139.178.68.195:41874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:39.163000 audit[11209]: USER_ACCT pid=11209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.164906 sshd[11209]: Accepted publickey for core from 139.178.68.195 port 41874 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:39.167033 sshd[11209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:39.169330 systemd-logind[1467]: New session 67 of user core. Feb 13 05:16:39.170065 systemd[1]: Started session-67.scope. Feb 13 05:16:39.249810 sshd[11209]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:39.251190 systemd[1]: sshd@90-139.178.90.239:22-139.178.68.195:41874.service: Deactivated successfully. Feb 13 05:16:39.251649 systemd[1]: session-67.scope: Deactivated successfully. Feb 13 05:16:39.252073 systemd-logind[1467]: Session 67 logged out. Waiting for processes to exit. Feb 13 05:16:39.252516 systemd-logind[1467]: Removed session 67. Feb 13 05:16:39.165000 audit[11209]: CRED_ACQ pid=11209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.349303 kernel: audit: type=1101 audit(1707801399.163:2311): pid=11209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.349357 kernel: audit: type=1103 audit(1707801399.165:2312): pid=11209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.349381 kernel: audit: type=1006 audit(1707801399.165:2313): pid=11209 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 13 05:16:39.165000 audit[11209]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebd8ddf30 a2=3 a3=0 items=0 ppid=1 pid=11209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:39.500104 kernel: audit: type=1300 audit(1707801399.165:2313): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebd8ddf30 a2=3 a3=0 items=0 ppid=1 pid=11209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:39.500140 kernel: audit: type=1327 audit(1707801399.165:2313): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:39.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:39.170000 audit[11209]: USER_START pid=11209 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.625273 kernel: audit: type=1105 audit(1707801399.170:2314): pid=11209 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.625339 kernel: audit: type=1103 audit(1707801399.171:2315): pid=11211 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.171000 audit[11211]: CRED_ACQ pid=11211 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.714622 kernel: audit: type=1106 audit(1707801399.249:2316): pid=11209 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.249000 audit[11209]: USER_END pid=11209 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.810377 kernel: audit: type=1104 audit(1707801399.249:2317): pid=11209 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.249000 audit[11209]: CRED_DISP pid=11209 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:39.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.90.239:22-139.178.68.195:41874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:44.261608 systemd[1]: Started sshd@91-139.178.90.239:22-139.178.68.195:41882.service. Feb 13 05:16:44.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.239:22-139.178.68.195:41882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:44.289265 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:44.289340 kernel: audit: type=1130 audit(1707801404.260:2319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.239:22-139.178.68.195:41882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:44.409000 audit[11234]: USER_ACCT pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.411255 sshd[11234]: Accepted publickey for core from 139.178.68.195 port 41882 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:44.412689 sshd[11234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:44.415118 systemd-logind[1467]: New session 68 of user core. Feb 13 05:16:44.415554 systemd[1]: Started session-68.scope. Feb 13 05:16:44.493816 sshd[11234]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:44.495198 systemd[1]: sshd@91-139.178.90.239:22-139.178.68.195:41882.service: Deactivated successfully. Feb 13 05:16:44.495666 systemd[1]: session-68.scope: Deactivated successfully. Feb 13 05:16:44.496025 systemd-logind[1467]: Session 68 logged out. Waiting for processes to exit. Feb 13 05:16:44.496396 systemd-logind[1467]: Removed session 68. Feb 13 05:16:44.411000 audit[11234]: CRED_ACQ pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.593230 kernel: audit: type=1101 audit(1707801404.409:2320): pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.593266 kernel: audit: type=1103 audit(1707801404.411:2321): pid=11234 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.593285 kernel: audit: type=1006 audit(1707801404.411:2322): pid=11234 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 13 05:16:44.651915 kernel: audit: type=1300 audit(1707801404.411:2322): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9874d830 a2=3 a3=0 items=0 ppid=1 pid=11234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:44.411000 audit[11234]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9874d830 a2=3 a3=0 items=0 ppid=1 pid=11234 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:44.744009 kernel: audit: type=1327 audit(1707801404.411:2322): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:44.411000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:44.774521 kernel: audit: type=1105 audit(1707801404.416:2323): pid=11234 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.416000 audit[11234]: USER_START pid=11234 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.869178 kernel: audit: type=1103 audit(1707801404.416:2324): pid=11236 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.416000 audit[11236]: CRED_ACQ pid=11236 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.958516 kernel: audit: type=1106 audit(1707801404.493:2325): pid=11234 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.493000 audit[11234]: USER_END pid=11234 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:45.054147 kernel: audit: type=1104 audit(1707801404.493:2326): pid=11234 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.493000 audit[11234]: CRED_DISP pid=11234 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:44.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.90.239:22-139.178.68.195:41882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:49.504183 systemd[1]: Started sshd@92-139.178.90.239:22-139.178.68.195:56702.service. Feb 13 05:16:49.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.239:22-139.178.68.195:56702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:49.531282 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:49.531320 kernel: audit: type=1130 audit(1707801409.502:2328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.239:22-139.178.68.195:56702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:49.652000 audit[11260]: USER_ACCT pid=11260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.653920 sshd[11260]: Accepted publickey for core from 139.178.68.195 port 56702 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:49.655733 sshd[11260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:49.658140 systemd-logind[1467]: New session 69 of user core. Feb 13 05:16:49.658709 systemd[1]: Started session-69.scope. Feb 13 05:16:49.738730 sshd[11260]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:49.740119 systemd[1]: sshd@92-139.178.90.239:22-139.178.68.195:56702.service: Deactivated successfully. Feb 13 05:16:49.740613 systemd[1]: session-69.scope: Deactivated successfully. Feb 13 05:16:49.741071 systemd-logind[1467]: Session 69 logged out. Waiting for processes to exit. Feb 13 05:16:49.741658 systemd-logind[1467]: Removed session 69. Feb 13 05:16:49.654000 audit[11260]: CRED_ACQ pid=11260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.748498 kernel: audit: type=1101 audit(1707801409.652:2329): pid=11260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.748536 kernel: audit: type=1103 audit(1707801409.654:2330): pid=11260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.896994 kernel: audit: type=1006 audit(1707801409.654:2331): pid=11260 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 13 05:16:49.897029 kernel: audit: type=1300 audit(1707801409.654:2331): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0891f210 a2=3 a3=0 items=0 ppid=1 pid=11260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:49.654000 audit[11260]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0891f210 a2=3 a3=0 items=0 ppid=1 pid=11260 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:49.989082 kernel: audit: type=1327 audit(1707801409.654:2331): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:49.654000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:50.019521 kernel: audit: type=1105 audit(1707801409.659:2332): pid=11260 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.659000 audit[11260]: USER_START pid=11260 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.659000 audit[11262]: CRED_ACQ pid=11262 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:50.114517 kernel: audit: type=1103 audit(1707801409.659:2333): pid=11262 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.737000 audit[11260]: USER_END pid=11260 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:50.298912 kernel: audit: type=1106 audit(1707801409.737:2334): pid=11260 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:50.298945 kernel: audit: type=1104 audit(1707801409.737:2335): pid=11260 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.737000 audit[11260]: CRED_DISP pid=11260 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:49.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.90.239:22-139.178.68.195:56702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:54.747912 systemd[1]: Started sshd@93-139.178.90.239:22-139.178.68.195:56706.service. Feb 13 05:16:54.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.239:22-139.178.68.195:56706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:54.774933 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:16:54.775038 kernel: audit: type=1130 audit(1707801414.746:2337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.239:22-139.178.68.195:56706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:54.896000 audit[11327]: USER_ACCT pid=11327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:54.897709 sshd[11327]: Accepted publickey for core from 139.178.68.195 port 56706 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:16:54.898748 sshd[11327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:16:54.901156 systemd-logind[1467]: New session 70 of user core. Feb 13 05:16:54.901737 systemd[1]: Started session-70.scope. Feb 13 05:16:54.980435 sshd[11327]: pam_unix(sshd:session): session closed for user core Feb 13 05:16:54.981835 systemd[1]: sshd@93-139.178.90.239:22-139.178.68.195:56706.service: Deactivated successfully. Feb 13 05:16:54.982273 systemd[1]: session-70.scope: Deactivated successfully. Feb 13 05:16:54.982625 systemd-logind[1467]: Session 70 logged out. Waiting for processes to exit. Feb 13 05:16:54.983129 systemd-logind[1467]: Removed session 70. Feb 13 05:16:54.897000 audit[11327]: CRED_ACQ pid=11327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:55.079547 kernel: audit: type=1101 audit(1707801414.896:2338): pid=11327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:55.079594 kernel: audit: type=1103 audit(1707801414.897:2339): pid=11327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:55.079613 kernel: audit: type=1006 audit(1707801414.897:2340): pid=11327 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 13 05:16:55.138188 kernel: audit: type=1300 audit(1707801414.897:2340): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e188a50 a2=3 a3=0 items=0 ppid=1 pid=11327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:54.897000 audit[11327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e188a50 a2=3 a3=0 items=0 ppid=1 pid=11327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:16:55.230210 kernel: audit: type=1327 audit(1707801414.897:2340): proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:54.897000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:16:55.260707 kernel: audit: type=1105 audit(1707801414.902:2341): pid=11327 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:54.902000 audit[11327]: USER_START pid=11327 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:55.355215 kernel: audit: type=1103 audit(1707801414.903:2342): pid=11329 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:54.903000 audit[11329]: CRED_ACQ pid=11329 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:55.444429 kernel: audit: type=1106 audit(1707801414.979:2343): pid=11327 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:54.979000 audit[11327]: USER_END pid=11327 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:55.539922 kernel: audit: type=1104 audit(1707801414.979:2344): pid=11327 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:54.979000 audit[11327]: CRED_DISP pid=11327 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:16:54.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.90.239:22-139.178.68.195:56706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:16:59.984150 systemd[1]: Started sshd@94-139.178.90.239:22-139.178.68.195:39210.service. Feb 13 05:16:59.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.239:22-139.178.68.195:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:00.011249 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:00.011316 kernel: audit: type=1130 audit(1707801419.982:2346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.239:22-139.178.68.195:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:00.130000 audit[11355]: USER_ACCT pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.132281 sshd[11355]: Accepted publickey for core from 139.178.68.195 port 39210 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:00.133746 sshd[11355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:00.136067 systemd-logind[1467]: New session 71 of user core. Feb 13 05:17:00.136540 systemd[1]: Started session-71.scope. Feb 13 05:17:00.214766 sshd[11355]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:00.216149 systemd[1]: sshd@94-139.178.90.239:22-139.178.68.195:39210.service: Deactivated successfully. Feb 13 05:17:00.216599 systemd[1]: session-71.scope: Deactivated successfully. Feb 13 05:17:00.217038 systemd-logind[1467]: Session 71 logged out. Waiting for processes to exit. Feb 13 05:17:00.217450 systemd-logind[1467]: Removed session 71. Feb 13 05:17:00.132000 audit[11355]: CRED_ACQ pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.314216 kernel: audit: type=1101 audit(1707801420.130:2347): pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.314265 kernel: audit: type=1103 audit(1707801420.132:2348): pid=11355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.314281 kernel: audit: type=1006 audit(1707801420.132:2349): pid=11355 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 13 05:17:00.372862 kernel: audit: type=1300 audit(1707801420.132:2349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffba43aa0 a2=3 a3=0 items=0 ppid=1 pid=11355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:00.132000 audit[11355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffba43aa0 a2=3 a3=0 items=0 ppid=1 pid=11355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:00.464895 kernel: audit: type=1327 audit(1707801420.132:2349): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:00.132000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:00.495354 kernel: audit: type=1105 audit(1707801420.137:2350): pid=11355 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.137000 audit[11355]: USER_START pid=11355 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.589863 kernel: audit: type=1103 audit(1707801420.137:2351): pid=11357 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.137000 audit[11357]: CRED_ACQ pid=11357 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.679089 kernel: audit: type=1106 audit(1707801420.214:2352): pid=11355 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.214000 audit[11355]: USER_END pid=11355 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.774605 kernel: audit: type=1104 audit(1707801420.214:2353): pid=11355 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.214000 audit[11355]: CRED_DISP pid=11355 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:00.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.90.239:22-139.178.68.195:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:05.223928 systemd[1]: Started sshd@95-139.178.90.239:22-139.178.68.195:39218.service. Feb 13 05:17:05.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.239:22-139.178.68.195:39218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:05.250943 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:05.251045 kernel: audit: type=1130 audit(1707801425.222:2355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.239:22-139.178.68.195:39218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:05.372000 audit[11419]: USER_ACCT pid=11419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.373936 sshd[11419]: Accepted publickey for core from 139.178.68.195 port 39218 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:05.375503 sshd[11419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:05.377866 systemd-logind[1467]: New session 72 of user core. Feb 13 05:17:05.378303 systemd[1]: Started session-72.scope. Feb 13 05:17:05.373000 audit[11419]: CRED_ACQ pid=11419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.467232 sshd[11419]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:05.468644 systemd[1]: sshd@95-139.178.90.239:22-139.178.68.195:39218.service: Deactivated successfully. Feb 13 05:17:05.469108 systemd[1]: session-72.scope: Deactivated successfully. Feb 13 05:17:05.469394 systemd-logind[1467]: Session 72 logged out. Waiting for processes to exit. Feb 13 05:17:05.469917 systemd-logind[1467]: Removed session 72. Feb 13 05:17:05.555902 kernel: audit: type=1101 audit(1707801425.372:2356): pid=11419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.555948 kernel: audit: type=1103 audit(1707801425.373:2357): pid=11419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.555967 kernel: audit: type=1006 audit(1707801425.373:2358): pid=11419 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 13 05:17:05.614570 kernel: audit: type=1300 audit(1707801425.373:2358): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf44161b0 a2=3 a3=0 items=0 ppid=1 pid=11419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:05.373000 audit[11419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf44161b0 a2=3 a3=0 items=0 ppid=1 pid=11419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:05.706662 kernel: audit: type=1327 audit(1707801425.373:2358): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:05.373000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:05.737140 kernel: audit: type=1105 audit(1707801425.379:2359): pid=11419 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.379000 audit[11419]: USER_START pid=11419 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.831643 kernel: audit: type=1103 audit(1707801425.380:2360): pid=11421 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.380000 audit[11421]: CRED_ACQ pid=11421 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.920898 kernel: audit: type=1106 audit(1707801425.466:2361): pid=11419 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.466000 audit[11419]: USER_END pid=11419 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:06.016437 kernel: audit: type=1104 audit(1707801425.466:2362): pid=11419 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.466000 audit[11419]: CRED_DISP pid=11419 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:05.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.90.239:22-139.178.68.195:39218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.476660 systemd[1]: Started sshd@96-139.178.90.239:22-139.178.68.195:33408.service. Feb 13 05:17:10.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.239:22-139.178.68.195:33408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.504012 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:10.504120 kernel: audit: type=1130 audit(1707801430.475:2364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.239:22-139.178.68.195:33408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.624000 audit[11443]: USER_ACCT pid=11443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.626401 sshd[11443]: Accepted publickey for core from 139.178.68.195 port 33408 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:10.631653 sshd[11443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:10.635756 systemd-logind[1467]: New session 73 of user core. Feb 13 05:17:10.636219 systemd[1]: Started session-73.scope. Feb 13 05:17:10.629000 audit[11443]: CRED_ACQ pid=11443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.719737 sshd[11443]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:10.721147 systemd[1]: sshd@96-139.178.90.239:22-139.178.68.195:33408.service: Deactivated successfully. Feb 13 05:17:10.721607 systemd[1]: session-73.scope: Deactivated successfully. Feb 13 05:17:10.722042 systemd-logind[1467]: Session 73 logged out. Waiting for processes to exit. Feb 13 05:17:10.722529 systemd-logind[1467]: Removed session 73. Feb 13 05:17:10.808136 kernel: audit: type=1101 audit(1707801430.624:2365): pid=11443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.808189 kernel: audit: type=1103 audit(1707801430.629:2366): pid=11443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.808210 kernel: audit: type=1006 audit(1707801430.629:2367): pid=11443 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 13 05:17:10.866808 kernel: audit: type=1300 audit(1707801430.629:2367): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff05f3a880 a2=3 a3=0 items=0 ppid=1 pid=11443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:10.629000 audit[11443]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff05f3a880 a2=3 a3=0 items=0 ppid=1 pid=11443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:10.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:10.989357 kernel: audit: type=1327 audit(1707801430.629:2367): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:10.989400 kernel: audit: type=1105 audit(1707801430.636:2368): pid=11443 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.636000 audit[11443]: USER_START pid=11443 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:11.083904 kernel: audit: type=1103 audit(1707801430.637:2369): pid=11445 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.637000 audit[11445]: CRED_ACQ pid=11445 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:11.173176 kernel: audit: type=1106 audit(1707801430.718:2370): pid=11443 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.718000 audit[11443]: USER_END pid=11443 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:11.268854 kernel: audit: type=1104 audit(1707801430.719:2371): pid=11443 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.719000 audit[11443]: CRED_DISP pid=11443 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:10.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.90.239:22-139.178.68.195:33408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:10.910000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:10.910000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013e9f50 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:17:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:17:10.910000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:10.910000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001d8a940 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:17:10.910000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:17:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00a89a9c0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:17:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:17:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01012d000 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:17:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:17:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e405b60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:17:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:17:11.219000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:11.219000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00407a3f0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:17:11.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:17:11.219000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:11.219000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c003f38000 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:17:11.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:17:11.219000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:11.219000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c00e236120 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:17:11.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:17:15.729745 systemd[1]: Started sshd@97-139.178.90.239:22-139.178.68.195:33420.service. Feb 13 05:17:15.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.239:22-139.178.68.195:33420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:15.756862 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 05:17:15.756935 kernel: audit: type=1130 audit(1707801435.728:2381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.239:22-139.178.68.195:33420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:15.878000 audit[11472]: USER_ACCT pid=11472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:15.880670 sshd[11472]: Accepted publickey for core from 139.178.68.195 port 33420 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:15.884884 sshd[11472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:15.889711 systemd-logind[1467]: New session 74 of user core. Feb 13 05:17:15.890267 systemd[1]: Started session-74.scope. Feb 13 05:17:15.882000 audit[11472]: CRED_ACQ pid=11472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.062311 kernel: audit: type=1101 audit(1707801435.878:2382): pid=11472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.062350 kernel: audit: type=1103 audit(1707801435.882:2383): pid=11472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.062369 kernel: audit: type=1006 audit(1707801435.882:2384): pid=11472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 13 05:17:16.120999 kernel: audit: type=1300 audit(1707801435.882:2384): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe343a32b0 a2=3 a3=0 items=0 ppid=1 pid=11472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:15.882000 audit[11472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe343a32b0 a2=3 a3=0 items=0 ppid=1 pid=11472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:16.213142 kernel: audit: type=1327 audit(1707801435.882:2384): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:15.882000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:16.213383 sshd[11472]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:16.214879 systemd[1]: sshd@97-139.178.90.239:22-139.178.68.195:33420.service: Deactivated successfully. Feb 13 05:17:16.215331 systemd[1]: session-74.scope: Deactivated successfully. Feb 13 05:17:16.215728 systemd-logind[1467]: Session 74 logged out. Waiting for processes to exit. Feb 13 05:17:16.216295 systemd-logind[1467]: Removed session 74. Feb 13 05:17:16.243662 kernel: audit: type=1105 audit(1707801435.890:2385): pid=11472 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:15.890000 audit[11472]: USER_START pid=11472 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:15.891000 audit[11474]: CRED_ACQ pid=11474 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.427504 kernel: audit: type=1103 audit(1707801435.891:2386): pid=11474 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.427540 kernel: audit: type=1106 audit(1707801436.212:2387): pid=11472 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.212000 audit[11472]: USER_END pid=11472 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.212000 audit[11472]: CRED_DISP pid=11472 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.612271 kernel: audit: type=1104 audit(1707801436.212:2388): pid=11472 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:16.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.90.239:22-139.178.68.195:33420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:21.166374 systemd[1]: Started sshd@98-139.178.90.239:22-139.178.68.195:41530.service. Feb 13 05:17:21.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.239:22-139.178.68.195:41530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:21.193473 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:21.193531 kernel: audit: type=1130 audit(1707801441.165:2390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.239:22-139.178.68.195:41530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:21.313000 audit[11496]: USER_ACCT pid=11496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.315310 sshd[11496]: Accepted publickey for core from 139.178.68.195 port 41530 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:21.316765 sshd[11496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:21.319159 systemd-logind[1467]: New session 75 of user core. Feb 13 05:17:21.319689 systemd[1]: Started session-75.scope. Feb 13 05:17:21.399048 sshd[11496]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:21.400464 systemd[1]: sshd@98-139.178.90.239:22-139.178.68.195:41530.service: Deactivated successfully. Feb 13 05:17:21.400921 systemd[1]: session-75.scope: Deactivated successfully. Feb 13 05:17:21.401311 systemd-logind[1467]: Session 75 logged out. Waiting for processes to exit. Feb 13 05:17:21.401934 systemd-logind[1467]: Removed session 75. Feb 13 05:17:21.315000 audit[11496]: CRED_ACQ pid=11496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.497160 kernel: audit: type=1101 audit(1707801441.313:2391): pid=11496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.497216 kernel: audit: type=1103 audit(1707801441.315:2392): pid=11496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.497239 kernel: audit: type=1006 audit(1707801441.315:2393): pid=11496 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 13 05:17:21.555913 kernel: audit: type=1300 audit(1707801441.315:2393): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6a4e9b30 a2=3 a3=0 items=0 ppid=1 pid=11496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:21.315000 audit[11496]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6a4e9b30 a2=3 a3=0 items=0 ppid=1 pid=11496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:21.647873 kernel: audit: type=1327 audit(1707801441.315:2393): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:21.315000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:21.678351 kernel: audit: type=1105 audit(1707801441.320:2394): pid=11496 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.320000 audit[11496]: USER_START pid=11496 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.772860 kernel: audit: type=1103 audit(1707801441.321:2395): pid=11501 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.321000 audit[11501]: CRED_ACQ pid=11501 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.398000 audit[11496]: USER_END pid=11496 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.862510 kernel: audit: type=1106 audit(1707801441.398:2396): pid=11496 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.398000 audit[11496]: CRED_DISP pid=11496 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.958508 kernel: audit: type=1104 audit(1707801441.398:2397): pid=11496 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:21.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.90.239:22-139.178.68.195:41530 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:21.771000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:17:21.771000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001ad98e0 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:17:21.771000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:17:24.381000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:24.381000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007729a0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:17:24.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:17:24.381000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:24.381000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001d8b180 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:17:24.381000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:17:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000626c20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:17:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:17:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:17:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c02000 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:17:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:17:26.409030 systemd[1]: Started sshd@99-139.178.90.239:22-139.178.68.195:51460.service. Feb 13 05:17:26.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.239:22-139.178.68.195:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:26.436245 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 05:17:26.436337 kernel: audit: type=1130 audit(1707801446.407:2404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.239:22-139.178.68.195:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:26.558705 sshd[11590]: Accepted publickey for core from 139.178.68.195 port 51460 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:26.557000 audit[11590]: USER_ACCT pid=11590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.560766 sshd[11590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:26.563122 systemd-logind[1467]: New session 76 of user core. Feb 13 05:17:26.563620 systemd[1]: Started session-76.scope. Feb 13 05:17:26.642161 sshd[11590]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:26.643612 systemd[1]: sshd@99-139.178.90.239:22-139.178.68.195:51460.service: Deactivated successfully. Feb 13 05:17:26.644065 systemd[1]: session-76.scope: Deactivated successfully. Feb 13 05:17:26.644356 systemd-logind[1467]: Session 76 logged out. Waiting for processes to exit. Feb 13 05:17:26.644850 systemd-logind[1467]: Removed session 76. Feb 13 05:17:26.559000 audit[11590]: CRED_ACQ pid=11590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.740634 kernel: audit: type=1101 audit(1707801446.557:2405): pid=11590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.740704 kernel: audit: type=1103 audit(1707801446.559:2406): pid=11590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.740740 kernel: audit: type=1006 audit(1707801446.559:2407): pid=11590 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 13 05:17:26.559000 audit[11590]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbac36c20 a2=3 a3=0 items=0 ppid=1 pid=11590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:26.891354 kernel: audit: type=1300 audit(1707801446.559:2407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbac36c20 a2=3 a3=0 items=0 ppid=1 pid=11590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:26.891413 kernel: audit: type=1327 audit(1707801446.559:2407): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:26.559000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:26.564000 audit[11590]: USER_START pid=11590 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:27.016304 kernel: audit: type=1105 audit(1707801446.564:2408): pid=11590 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:27.016373 kernel: audit: type=1103 audit(1707801446.564:2409): pid=11592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.564000 audit[11592]: CRED_ACQ pid=11592 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.641000 audit[11590]: USER_END pid=11590 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:27.201115 kernel: audit: type=1106 audit(1707801446.641:2410): pid=11590 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:27.201177 kernel: audit: type=1104 audit(1707801446.641:2411): pid=11590 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.641000 audit[11590]: CRED_DISP pid=11590 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:26.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.90.239:22-139.178.68.195:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:26.977000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:17:26.977000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f07e80 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:17:26.977000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:17:31.651867 systemd[1]: Started sshd@100-139.178.90.239:22-139.178.68.195:51462.service. Feb 13 05:17:31.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.239:22-139.178.68.195:51462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:31.679038 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:17:31.679122 kernel: audit: type=1130 audit(1707801451.650:2414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.239:22-139.178.68.195:51462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:31.800000 audit[11616]: USER_ACCT pid=11616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.801940 sshd[11616]: Accepted publickey for core from 139.178.68.195 port 51462 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:31.802739 sshd[11616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:31.805053 systemd-logind[1467]: New session 77 of user core. Feb 13 05:17:31.805551 systemd[1]: Started session-77.scope. Feb 13 05:17:31.883942 sshd[11616]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:31.885293 systemd[1]: sshd@100-139.178.90.239:22-139.178.68.195:51462.service: Deactivated successfully. Feb 13 05:17:31.885803 systemd[1]: session-77.scope: Deactivated successfully. Feb 13 05:17:31.886161 systemd-logind[1467]: Session 77 logged out. Waiting for processes to exit. Feb 13 05:17:31.886675 systemd-logind[1467]: Removed session 77. Feb 13 05:17:31.801000 audit[11616]: CRED_ACQ pid=11616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.983778 kernel: audit: type=1101 audit(1707801451.800:2415): pid=11616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.983822 kernel: audit: type=1103 audit(1707801451.801:2416): pid=11616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.983841 kernel: audit: type=1006 audit(1707801451.801:2417): pid=11616 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 13 05:17:32.042376 kernel: audit: type=1300 audit(1707801451.801:2417): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7aace790 a2=3 a3=0 items=0 ppid=1 pid=11616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:31.801000 audit[11616]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7aace790 a2=3 a3=0 items=0 ppid=1 pid=11616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:32.134354 kernel: audit: type=1327 audit(1707801451.801:2417): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:31.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:32.164819 kernel: audit: type=1105 audit(1707801451.806:2418): pid=11616 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.806000 audit[11616]: USER_START pid=11616 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:32.259320 kernel: audit: type=1103 audit(1707801451.806:2419): pid=11618 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.806000 audit[11618]: CRED_ACQ pid=11618 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:32.348467 kernel: audit: type=1106 audit(1707801451.883:2420): pid=11616 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.883000 audit[11616]: USER_END pid=11616 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:32.443886 kernel: audit: type=1104 audit(1707801451.883:2421): pid=11616 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.883000 audit[11616]: CRED_DISP pid=11616 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:31.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.90.239:22-139.178.68.195:51462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:36.894009 systemd[1]: Started sshd@101-139.178.90.239:22-139.178.68.195:55266.service. Feb 13 05:17:36.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.239:22-139.178.68.195:55266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:36.920731 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:36.920903 kernel: audit: type=1130 audit(1707801456.892:2423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.239:22-139.178.68.195:55266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:37.041404 sshd[11680]: Accepted publickey for core from 139.178.68.195 port 55266 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:37.039000 audit[11680]: USER_ACCT pid=11680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.042030 sshd[11680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:37.044315 systemd-logind[1467]: New session 78 of user core. Feb 13 05:17:37.044835 systemd[1]: Started session-78.scope. Feb 13 05:17:37.040000 audit[11680]: CRED_ACQ pid=11680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.135314 sshd[11680]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:37.136858 systemd[1]: sshd@101-139.178.90.239:22-139.178.68.195:55266.service: Deactivated successfully. Feb 13 05:17:37.137309 systemd[1]: session-78.scope: Deactivated successfully. Feb 13 05:17:37.137638 systemd-logind[1467]: Session 78 logged out. Waiting for processes to exit. Feb 13 05:17:37.138134 systemd-logind[1467]: Removed session 78. Feb 13 05:17:37.223231 kernel: audit: type=1101 audit(1707801457.039:2424): pid=11680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.223290 kernel: audit: type=1103 audit(1707801457.040:2425): pid=11680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.223332 kernel: audit: type=1006 audit(1707801457.040:2426): pid=11680 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 13 05:17:37.040000 audit[11680]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d0f3c20 a2=3 a3=0 items=0 ppid=1 pid=11680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:37.373814 kernel: audit: type=1300 audit(1707801457.040:2426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1d0f3c20 a2=3 a3=0 items=0 ppid=1 pid=11680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:37.373856 kernel: audit: type=1327 audit(1707801457.040:2426): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:37.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:37.045000 audit[11680]: USER_START pid=11680 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.498814 kernel: audit: type=1105 audit(1707801457.045:2427): pid=11680 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.498879 kernel: audit: type=1103 audit(1707801457.045:2428): pid=11682 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.045000 audit[11682]: CRED_ACQ pid=11682 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.134000 audit[11680]: USER_END pid=11680 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.683448 kernel: audit: type=1106 audit(1707801457.134:2429): pid=11680 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.683496 kernel: audit: type=1104 audit(1707801457.134:2430): pid=11680 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.134000 audit[11680]: CRED_DISP pid=11680 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:37.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.90.239:22-139.178.68.195:55266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:42.145120 systemd[1]: Started sshd@102-139.178.90.239:22-139.178.68.195:55272.service. Feb 13 05:17:42.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.239:22-139.178.68.195:55272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:42.172030 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:42.172175 kernel: audit: type=1130 audit(1707801462.143:2432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.239:22-139.178.68.195:55272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:42.294922 sshd[11704]: Accepted publickey for core from 139.178.68.195 port 55272 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:42.293000 audit[11704]: USER_ACCT pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.295739 sshd[11704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:42.298158 systemd-logind[1467]: New session 79 of user core. Feb 13 05:17:42.298616 systemd[1]: Started session-79.scope. Feb 13 05:17:42.378305 sshd[11704]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:42.379762 systemd[1]: sshd@102-139.178.90.239:22-139.178.68.195:55272.service: Deactivated successfully. Feb 13 05:17:42.380203 systemd[1]: session-79.scope: Deactivated successfully. Feb 13 05:17:42.380544 systemd-logind[1467]: Session 79 logged out. Waiting for processes to exit. Feb 13 05:17:42.381079 systemd-logind[1467]: Removed session 79. Feb 13 05:17:42.294000 audit[11704]: CRED_ACQ pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.477565 kernel: audit: type=1101 audit(1707801462.293:2433): pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.477636 kernel: audit: type=1103 audit(1707801462.294:2434): pid=11704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.477674 kernel: audit: type=1006 audit(1707801462.294:2435): pid=11704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 13 05:17:42.294000 audit[11704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96af0230 a2=3 a3=0 items=0 ppid=1 pid=11704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:42.628214 kernel: audit: type=1300 audit(1707801462.294:2435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96af0230 a2=3 a3=0 items=0 ppid=1 pid=11704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:42.628255 kernel: audit: type=1327 audit(1707801462.294:2435): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:42.294000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:42.299000 audit[11704]: USER_START pid=11704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.753277 kernel: audit: type=1105 audit(1707801462.299:2436): pid=11704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.753346 kernel: audit: type=1103 audit(1707801462.300:2437): pid=11706 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.300000 audit[11706]: CRED_ACQ pid=11706 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.377000 audit[11704]: USER_END pid=11704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.937985 kernel: audit: type=1106 audit(1707801462.377:2438): pid=11704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.938039 kernel: audit: type=1104 audit(1707801462.377:2439): pid=11704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.377000 audit[11704]: CRED_DISP pid=11704 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:42.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.90.239:22-139.178.68.195:55272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:47.388015 systemd[1]: Started sshd@103-139.178.90.239:22-139.178.68.195:48826.service. Feb 13 05:17:47.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.239:22-139.178.68.195:48826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:47.415026 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:47.415192 kernel: audit: type=1130 audit(1707801467.386:2441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.239:22-139.178.68.195:48826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:47.537000 audit[11745]: USER_ACCT pid=11745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.538965 sshd[11745]: Accepted publickey for core from 139.178.68.195 port 48826 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:47.542831 sshd[11745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:47.548000 systemd-logind[1467]: New session 80 of user core. Feb 13 05:17:47.548466 systemd[1]: Started session-80.scope. Feb 13 05:17:47.540000 audit[11745]: CRED_ACQ pid=11745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.639004 sshd[11745]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:47.640506 systemd[1]: sshd@103-139.178.90.239:22-139.178.68.195:48826.service: Deactivated successfully. Feb 13 05:17:47.640962 systemd[1]: session-80.scope: Deactivated successfully. Feb 13 05:17:47.641289 systemd-logind[1467]: Session 80 logged out. Waiting for processes to exit. Feb 13 05:17:47.641934 systemd-logind[1467]: Removed session 80. Feb 13 05:17:47.720552 kernel: audit: type=1101 audit(1707801467.537:2442): pid=11745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.720604 kernel: audit: type=1103 audit(1707801467.540:2443): pid=11745 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.720644 kernel: audit: type=1006 audit(1707801467.540:2444): pid=11745 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 13 05:17:47.540000 audit[11745]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff1b6cde0 a2=3 a3=0 items=0 ppid=1 pid=11745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:47.871139 kernel: audit: type=1300 audit(1707801467.540:2444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff1b6cde0 a2=3 a3=0 items=0 ppid=1 pid=11745 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:47.871201 kernel: audit: type=1327 audit(1707801467.540:2444): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:47.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:47.549000 audit[11745]: USER_START pid=11745 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.996030 kernel: audit: type=1105 audit(1707801467.549:2445): pid=11745 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.996081 kernel: audit: type=1103 audit(1707801467.549:2446): pid=11747 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.549000 audit[11747]: CRED_ACQ pid=11747 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.638000 audit[11745]: USER_END pid=11745 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:48.180784 kernel: audit: type=1106 audit(1707801467.638:2447): pid=11745 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:48.180819 kernel: audit: type=1104 audit(1707801467.638:2448): pid=11745 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.638000 audit[11745]: CRED_DISP pid=11745 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:47.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.90.239:22-139.178.68.195:48826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:52.648994 systemd[1]: Started sshd@104-139.178.90.239:22-139.178.68.195:48828.service. Feb 13 05:17:52.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.239:22-139.178.68.195:48828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:52.676112 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:52.676196 kernel: audit: type=1130 audit(1707801472.647:2450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.239:22-139.178.68.195:48828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:52.798000 audit[11790]: USER_ACCT pid=11790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.800407 sshd[11790]: Accepted publickey for core from 139.178.68.195 port 48828 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:52.803807 sshd[11790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:52.814770 systemd-logind[1467]: New session 81 of user core. Feb 13 05:17:52.815998 systemd[1]: Started session-81.scope. Feb 13 05:17:52.801000 audit[11790]: CRED_ACQ pid=11790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.897718 sshd[11790]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:52.899027 systemd[1]: sshd@104-139.178.90.239:22-139.178.68.195:48828.service: Deactivated successfully. Feb 13 05:17:52.899572 systemd[1]: session-81.scope: Deactivated successfully. Feb 13 05:17:52.899953 systemd-logind[1467]: Session 81 logged out. Waiting for processes to exit. Feb 13 05:17:52.900388 systemd-logind[1467]: Removed session 81. Feb 13 05:17:52.981763 kernel: audit: type=1101 audit(1707801472.798:2451): pid=11790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.981837 kernel: audit: type=1103 audit(1707801472.801:2452): pid=11790 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.981858 kernel: audit: type=1006 audit(1707801472.801:2453): pid=11790 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 13 05:17:53.040359 kernel: audit: type=1300 audit(1707801472.801:2453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62637e20 a2=3 a3=0 items=0 ppid=1 pid=11790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:52.801000 audit[11790]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd62637e20 a2=3 a3=0 items=0 ppid=1 pid=11790 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:53.132300 kernel: audit: type=1327 audit(1707801472.801:2453): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:52.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:53.162740 kernel: audit: type=1105 audit(1707801472.816:2454): pid=11790 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.816000 audit[11790]: USER_START pid=11790 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:53.257192 kernel: audit: type=1103 audit(1707801472.820:2455): pid=11800 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.820000 audit[11800]: CRED_ACQ pid=11800 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:53.346365 kernel: audit: type=1106 audit(1707801472.896:2456): pid=11790 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.896000 audit[11790]: USER_END pid=11790 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:53.441834 kernel: audit: type=1104 audit(1707801472.896:2457): pid=11790 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.896000 audit[11790]: CRED_DISP pid=11790 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:52.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.90.239:22-139.178.68.195:48828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:57.909207 systemd[1]: Started sshd@105-139.178.90.239:22-139.178.68.195:43110.service. Feb 13 05:17:57.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.239:22-139.178.68.195:43110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:57.936720 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:17:57.936807 kernel: audit: type=1130 audit(1707801477.908:2459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.239:22-139.178.68.195:43110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:17:58.057000 audit[11843]: USER_ACCT pid=11843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.059493 sshd[11843]: Accepted publickey for core from 139.178.68.195 port 43110 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:17:58.060069 sshd[11843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:17:58.062331 systemd-logind[1467]: New session 82 of user core. Feb 13 05:17:58.062831 systemd[1]: Started session-82.scope. Feb 13 05:17:58.142532 sshd[11843]: pam_unix(sshd:session): session closed for user core Feb 13 05:17:58.144015 systemd[1]: sshd@105-139.178.90.239:22-139.178.68.195:43110.service: Deactivated successfully. Feb 13 05:17:58.144488 systemd[1]: session-82.scope: Deactivated successfully. Feb 13 05:17:58.144929 systemd-logind[1467]: Session 82 logged out. Waiting for processes to exit. Feb 13 05:17:58.145395 systemd-logind[1467]: Removed session 82. Feb 13 05:17:58.058000 audit[11843]: CRED_ACQ pid=11843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.241186 kernel: audit: type=1101 audit(1707801478.057:2460): pid=11843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.241222 kernel: audit: type=1103 audit(1707801478.058:2461): pid=11843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.241242 kernel: audit: type=1006 audit(1707801478.058:2462): pid=11843 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 13 05:17:58.299731 kernel: audit: type=1300 audit(1707801478.058:2462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeb51dd80 a2=3 a3=0 items=0 ppid=1 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:58.058000 audit[11843]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeb51dd80 a2=3 a3=0 items=0 ppid=1 pid=11843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:17:58.391665 kernel: audit: type=1327 audit(1707801478.058:2462): proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:58.058000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:17:58.422115 kernel: audit: type=1105 audit(1707801478.063:2463): pid=11843 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.063000 audit[11843]: USER_START pid=11843 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.516532 kernel: audit: type=1103 audit(1707801478.063:2464): pid=11845 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.063000 audit[11845]: CRED_ACQ pid=11845 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.605670 kernel: audit: type=1106 audit(1707801478.141:2465): pid=11843 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.141000 audit[11843]: USER_END pid=11843 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.701152 kernel: audit: type=1104 audit(1707801478.141:2466): pid=11843 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.141000 audit[11843]: CRED_DISP pid=11843 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:17:58.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.90.239:22-139.178.68.195:43110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:03.152412 systemd[1]: Started sshd@106-139.178.90.239:22-139.178.68.195:43122.service. Feb 13 05:18:03.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.239:22-139.178.68.195:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:03.179318 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:03.179424 kernel: audit: type=1130 audit(1707801483.151:2468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.239:22-139.178.68.195:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:03.301000 audit[11871]: USER_ACCT pid=11871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.302848 sshd[11871]: Accepted publickey for core from 139.178.68.195 port 43122 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:03.304741 sshd[11871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:03.307141 systemd-logind[1467]: New session 83 of user core. Feb 13 05:18:03.307658 systemd[1]: Started session-83.scope. Feb 13 05:18:03.384784 sshd[11871]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:03.386128 systemd[1]: sshd@106-139.178.90.239:22-139.178.68.195:43122.service: Deactivated successfully. Feb 13 05:18:03.386629 systemd[1]: session-83.scope: Deactivated successfully. Feb 13 05:18:03.386970 systemd-logind[1467]: Session 83 logged out. Waiting for processes to exit. Feb 13 05:18:03.387340 systemd-logind[1467]: Removed session 83. Feb 13 05:18:03.303000 audit[11871]: CRED_ACQ pid=11871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.485004 kernel: audit: type=1101 audit(1707801483.301:2469): pid=11871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.485042 kernel: audit: type=1103 audit(1707801483.303:2470): pid=11871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.485060 kernel: audit: type=1006 audit(1707801483.303:2471): pid=11871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=83 res=1 Feb 13 05:18:03.543572 kernel: audit: type=1300 audit(1707801483.303:2471): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad994330 a2=3 a3=0 items=0 ppid=1 pid=11871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:03.303000 audit[11871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad994330 a2=3 a3=0 items=0 ppid=1 pid=11871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:03.635443 kernel: audit: type=1327 audit(1707801483.303:2471): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:03.303000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:03.665865 kernel: audit: type=1105 audit(1707801483.308:2472): pid=11871 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.308000 audit[11871]: USER_START pid=11871 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.760229 kernel: audit: type=1103 audit(1707801483.309:2473): pid=11873 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.309000 audit[11873]: CRED_ACQ pid=11873 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.849280 kernel: audit: type=1106 audit(1707801483.383:2474): pid=11871 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.383000 audit[11871]: USER_END pid=11871 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.944670 kernel: audit: type=1104 audit(1707801483.384:2475): pid=11871 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.384000 audit[11871]: CRED_DISP pid=11871 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:03.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.90.239:22-139.178.68.195:43122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:08.394137 systemd[1]: Started sshd@107-139.178.90.239:22-139.178.68.195:44740.service. Feb 13 05:18:08.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.239:22-139.178.68.195:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:08.421083 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:08.421139 kernel: audit: type=1130 audit(1707801488.392:2477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.239:22-139.178.68.195:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:08.544270 sshd[11935]: Accepted publickey for core from 139.178.68.195 port 44740 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:08.542000 audit[11935]: USER_ACCT pid=11935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.545776 sshd[11935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:08.548285 systemd-logind[1467]: New session 84 of user core. Feb 13 05:18:08.548929 systemd[1]: Started session-84.scope. Feb 13 05:18:08.544000 audit[11935]: CRED_ACQ pid=11935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.637817 sshd[11935]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:08.639100 systemd[1]: sshd@107-139.178.90.239:22-139.178.68.195:44740.service: Deactivated successfully. Feb 13 05:18:08.639601 systemd[1]: session-84.scope: Deactivated successfully. Feb 13 05:18:08.639952 systemd-logind[1467]: Session 84 logged out. Waiting for processes to exit. Feb 13 05:18:08.640367 systemd-logind[1467]: Removed session 84. Feb 13 05:18:08.725935 kernel: audit: type=1101 audit(1707801488.542:2478): pid=11935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.725974 kernel: audit: type=1103 audit(1707801488.544:2479): pid=11935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.725991 kernel: audit: type=1006 audit(1707801488.544:2480): pid=11935 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=84 res=1 Feb 13 05:18:08.784524 kernel: audit: type=1300 audit(1707801488.544:2480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a8d54b0 a2=3 a3=0 items=0 ppid=1 pid=11935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:08.544000 audit[11935]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a8d54b0 a2=3 a3=0 items=0 ppid=1 pid=11935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:08.876390 kernel: audit: type=1327 audit(1707801488.544:2480): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:08.544000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:08.549000 audit[11935]: USER_START pid=11935 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:09.001207 kernel: audit: type=1105 audit(1707801488.549:2481): pid=11935 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:09.001296 kernel: audit: type=1103 audit(1707801488.550:2482): pid=11937 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.550000 audit[11937]: CRED_ACQ pid=11937 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.636000 audit[11935]: USER_END pid=11935 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:09.185824 kernel: audit: type=1106 audit(1707801488.636:2483): pid=11935 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:09.185865 kernel: audit: type=1104 audit(1707801488.636:2484): pid=11935 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.636000 audit[11935]: CRED_DISP pid=11935 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:08.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.90.239:22-139.178.68.195:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:10.912000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:10.912000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00121b5f0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:18:10.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:18:10.912000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:10.912000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f320 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:18:10.912000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:18:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c015c10620 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:18:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:18:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sdb9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c009cbff80 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:18:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:18:11.210000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:11.210000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01cbe0ed0 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:18:11.210000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:18:11.219000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sdb9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:11.219000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01cbe0f30 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:18:11.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:18:11.220000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:11.220000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c015c10640 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:18:11.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:18:11.220000 audit[2407]: AVC avc: denied { watch } for pid=2407 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sdb9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:11.220000 audit[2407]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c01cbe0f60 a2=fc6 a3=0 items=0 ppid=2241 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c819,c858 key=(null) Feb 13 05:18:11.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E39302E323339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 13 05:18:13.647831 systemd[1]: Started sshd@108-139.178.90.239:22-139.178.68.195:44742.service. Feb 13 05:18:13.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.239:22-139.178.68.195:44742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:13.674850 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 05:18:13.674918 kernel: audit: type=1130 audit(1707801493.646:2494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.239:22-139.178.68.195:44742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:13.795000 audit[11959]: USER_ACCT pid=11959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.797030 sshd[11959]: Accepted publickey for core from 139.178.68.195 port 44742 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:13.797738 sshd[11959]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:13.799806 systemd-logind[1467]: New session 85 of user core. Feb 13 05:18:13.800299 systemd[1]: Started session-85.scope. Feb 13 05:18:13.878325 sshd[11959]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:13.879865 systemd[1]: sshd@108-139.178.90.239:22-139.178.68.195:44742.service: Deactivated successfully. Feb 13 05:18:13.880316 systemd[1]: session-85.scope: Deactivated successfully. Feb 13 05:18:13.880760 systemd-logind[1467]: Session 85 logged out. Waiting for processes to exit. Feb 13 05:18:13.881285 systemd-logind[1467]: Removed session 85. Feb 13 05:18:13.796000 audit[11959]: CRED_ACQ pid=11959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.978838 kernel: audit: type=1101 audit(1707801493.795:2495): pid=11959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.978874 kernel: audit: type=1103 audit(1707801493.796:2496): pid=11959 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.978894 kernel: audit: type=1006 audit(1707801493.796:2497): pid=11959 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=85 res=1 Feb 13 05:18:14.037465 kernel: audit: type=1300 audit(1707801493.796:2497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff946e7720 a2=3 a3=0 items=0 ppid=1 pid=11959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:13.796000 audit[11959]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff946e7720 a2=3 a3=0 items=0 ppid=1 pid=11959 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:14.129456 kernel: audit: type=1327 audit(1707801493.796:2497): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:13.796000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:14.159931 kernel: audit: type=1105 audit(1707801493.800:2498): pid=11959 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.800000 audit[11959]: USER_START pid=11959 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:14.254425 kernel: audit: type=1103 audit(1707801493.801:2499): pid=11961 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.801000 audit[11961]: CRED_ACQ pid=11961 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:14.343637 kernel: audit: type=1106 audit(1707801493.877:2500): pid=11959 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.877000 audit[11959]: USER_END pid=11959 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:14.439131 kernel: audit: type=1104 audit(1707801493.877:2501): pid=11959 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.877000 audit[11959]: CRED_DISP pid=11959 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:13.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.90.239:22-139.178.68.195:44742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:18.890393 systemd[1]: Started sshd@109-139.178.90.239:22-139.178.68.195:59928.service. Feb 13 05:18:18.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.239:22-139.178.68.195:59928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:18.917937 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:18.918036 kernel: audit: type=1130 audit(1707801498.889:2503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.239:22-139.178.68.195:59928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:19.037000 audit[11988]: USER_ACCT pid=11988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.038832 sshd[11988]: Accepted publickey for core from 139.178.68.195 port 59928 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:19.040057 sshd[11988]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:19.042382 systemd-logind[1467]: New session 86 of user core. Feb 13 05:18:19.042854 systemd[1]: Started session-86.scope. Feb 13 05:18:19.038000 audit[11988]: CRED_ACQ pid=11988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.135184 sshd[11988]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:19.136737 systemd[1]: sshd@109-139.178.90.239:22-139.178.68.195:59928.service: Deactivated successfully. Feb 13 05:18:19.137223 systemd[1]: session-86.scope: Deactivated successfully. Feb 13 05:18:19.137645 systemd-logind[1467]: Session 86 logged out. Waiting for processes to exit. Feb 13 05:18:19.138240 systemd-logind[1467]: Removed session 86. Feb 13 05:18:19.222777 kernel: audit: type=1101 audit(1707801499.037:2504): pid=11988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.222814 kernel: audit: type=1103 audit(1707801499.038:2505): pid=11988 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.222832 kernel: audit: type=1006 audit(1707801499.038:2506): pid=11988 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=86 res=1 Feb 13 05:18:19.281437 kernel: audit: type=1300 audit(1707801499.038:2506): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21ba0760 a2=3 a3=0 items=0 ppid=1 pid=11988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:19.038000 audit[11988]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff21ba0760 a2=3 a3=0 items=0 ppid=1 pid=11988 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:19.373505 kernel: audit: type=1327 audit(1707801499.038:2506): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:19.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:19.404016 kernel: audit: type=1105 audit(1707801499.043:2507): pid=11988 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.043000 audit[11988]: USER_START pid=11988 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.043000 audit[11990]: CRED_ACQ pid=11990 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.587819 kernel: audit: type=1103 audit(1707801499.043:2508): pid=11990 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.587863 kernel: audit: type=1106 audit(1707801499.134:2509): pid=11988 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.134000 audit[11988]: USER_END pid=11988 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.683356 kernel: audit: type=1104 audit(1707801499.134:2510): pid=11988 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.134000 audit[11988]: CRED_DISP pid=11988 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:19.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.90.239:22-139.178.68.195:59928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:21.772000 audit[5814]: AVC avc: denied { watch } for pid=5814 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.2340699176/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c139,c675 tclass=file permissive=0 Feb 13 05:18:21.772000 audit[5814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001c1ba60 a2=fc6 a3=0 items=0 ppid=5309 pid=5814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c139,c675 key=(null) Feb 13 05:18:21.772000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:18:24.144691 systemd[1]: Started sshd@110-139.178.90.239:22-139.178.68.195:59942.service. Feb 13 05:18:24.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.239:22-139.178.68.195:59942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:24.171686 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 05:18:24.171752 kernel: audit: type=1130 audit(1707801504.143:2513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.239:22-139.178.68.195:59942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:24.293000 audit[12082]: USER_ACCT pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.294926 sshd[12082]: Accepted publickey for core from 139.178.68.195 port 59942 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:24.295727 sshd[12082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:24.297923 systemd-logind[1467]: New session 87 of user core. Feb 13 05:18:24.298479 systemd[1]: Started session-87.scope. Feb 13 05:18:24.376605 sshd[12082]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:24.378120 systemd[1]: sshd@110-139.178.90.239:22-139.178.68.195:59942.service: Deactivated successfully. Feb 13 05:18:24.378578 systemd[1]: session-87.scope: Deactivated successfully. Feb 13 05:18:24.378970 systemd-logind[1467]: Session 87 logged out. Waiting for processes to exit. Feb 13 05:18:24.379398 systemd-logind[1467]: Removed session 87. Feb 13 05:18:24.294000 audit[12082]: CRED_ACQ pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.477527 kernel: audit: type=1101 audit(1707801504.293:2514): pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.477565 kernel: audit: type=1103 audit(1707801504.294:2515): pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.477582 kernel: audit: type=1006 audit(1707801504.294:2516): pid=12082 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 13 05:18:24.536191 kernel: audit: type=1300 audit(1707801504.294:2516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fdb3b60 a2=3 a3=0 items=0 ppid=1 pid=12082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:24.294000 audit[12082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3fdb3b60 a2=3 a3=0 items=0 ppid=1 pid=12082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:24.294000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:24.658667 kernel: audit: type=1327 audit(1707801504.294:2516): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:24.658692 kernel: audit: type=1105 audit(1707801504.299:2517): pid=12082 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.299000 audit[12082]: USER_START pid=12082 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.753154 kernel: audit: type=1103 audit(1707801504.299:2518): pid=12084 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.299000 audit[12084]: CRED_ACQ pid=12084 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.842464 kernel: audit: type=1106 audit(1707801504.375:2519): pid=12082 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.375000 audit[12082]: USER_END pid=12082 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.376000 audit[12082]: CRED_DISP pid=12082 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:25.027223 kernel: audit: type=1104 audit(1707801504.376:2520): pid=12082 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:24.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.90.239:22-139.178.68.195:59942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:24.382000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:24.382000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150c5c0 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:18:24.382000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:18:24.383000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:24.383000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c2ef20 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:18:24.383000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:18:24.384000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:24.384000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c2f040 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:18:24.384000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:18:24.384000 audit[2412]: AVC avc: denied { watch } for pid=2412 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sdb9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 05:18:24.384000 audit[2412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00150cc00 a2=fc6 a3=0 items=0 ppid=2269 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c351,c428 key=(null) Feb 13 05:18:24.384000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 05:18:26.978000 audit[5972]: AVC avc: denied { watch } for pid=5972 comm="apiserver" path="/calico-apiserver-certs/..2024_02_13_04_59_03.4129191814/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c860,c989 tclass=file permissive=0 Feb 13 05:18:26.978000 audit[5972]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e41640 a2=fc6 a3=0 items=0 ppid=5384 pid=5972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c860,c989 key=(null) Feb 13 05:18:26.978000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 13 05:18:29.386563 systemd[1]: Started sshd@111-139.178.90.239:22-139.178.68.195:33826.service. Feb 13 05:18:29.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.239:22-139.178.68.195:33826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:29.413754 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 05:18:29.413811 kernel: audit: type=1130 audit(1707801509.385:2527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.239:22-139.178.68.195:33826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:29.533000 audit[12108]: USER_ACCT pid=12108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.535808 sshd[12108]: Accepted publickey for core from 139.178.68.195 port 33826 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:29.539369 sshd[12108]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:29.544451 systemd-logind[1467]: New session 88 of user core. Feb 13 05:18:29.544988 systemd[1]: Started session-88.scope. Feb 13 05:18:29.626221 sshd[12108]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:29.536000 audit[12108]: CRED_ACQ pid=12108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.627641 systemd[1]: sshd@111-139.178.90.239:22-139.178.68.195:33826.service: Deactivated successfully. Feb 13 05:18:29.628082 systemd[1]: session-88.scope: Deactivated successfully. Feb 13 05:18:29.628360 systemd-logind[1467]: Session 88 logged out. Waiting for processes to exit. Feb 13 05:18:29.628965 systemd-logind[1467]: Removed session 88. Feb 13 05:18:29.717309 kernel: audit: type=1101 audit(1707801509.533:2528): pid=12108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.717350 kernel: audit: type=1103 audit(1707801509.536:2529): pid=12108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.717369 kernel: audit: type=1006 audit(1707801509.537:2530): pid=12108 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 13 05:18:29.537000 audit[12108]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6552b030 a2=3 a3=0 items=0 ppid=1 pid=12108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:29.867888 kernel: audit: type=1300 audit(1707801509.537:2530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6552b030 a2=3 a3=0 items=0 ppid=1 pid=12108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:29.867918 kernel: audit: type=1327 audit(1707801509.537:2530): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:29.537000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:29.898333 kernel: audit: type=1105 audit(1707801509.545:2531): pid=12108 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.545000 audit[12108]: USER_START pid=12108 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.545000 audit[12112]: CRED_ACQ pid=12112 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:30.082138 kernel: audit: type=1103 audit(1707801509.545:2532): pid=12112 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:30.082173 kernel: audit: type=1106 audit(1707801509.625:2533): pid=12108 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.625000 audit[12108]: USER_END pid=12108 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:30.177669 kernel: audit: type=1104 audit(1707801509.625:2534): pid=12108 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.625000 audit[12108]: CRED_DISP pid=12108 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:29.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.90.239:22-139.178.68.195:33826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.635139 systemd[1]: Started sshd@112-139.178.90.239:22-139.178.68.195:33830.service. Feb 13 05:18:34.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.239:22-139.178.68.195:33830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.662478 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:34.662556 kernel: audit: type=1130 audit(1707801514.633:2536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.239:22-139.178.68.195:33830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:34.784000 audit[12174]: USER_ACCT pid=12174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.785792 sshd[12174]: Accepted publickey for core from 139.178.68.195 port 33830 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:34.787188 sshd[12174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:34.789420 systemd-logind[1467]: New session 89 of user core. Feb 13 05:18:34.790036 systemd[1]: Started session-89.scope. Feb 13 05:18:34.867795 sshd[12174]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:34.869148 systemd[1]: sshd@112-139.178.90.239:22-139.178.68.195:33830.service: Deactivated successfully. Feb 13 05:18:34.869615 systemd[1]: session-89.scope: Deactivated successfully. Feb 13 05:18:34.869966 systemd-logind[1467]: Session 89 logged out. Waiting for processes to exit. Feb 13 05:18:34.870398 systemd-logind[1467]: Removed session 89. Feb 13 05:18:34.785000 audit[12174]: CRED_ACQ pid=12174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.967657 kernel: audit: type=1101 audit(1707801514.784:2537): pid=12174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.967700 kernel: audit: type=1103 audit(1707801514.785:2538): pid=12174 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.967717 kernel: audit: type=1006 audit(1707801514.785:2539): pid=12174 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 13 05:18:35.026301 kernel: audit: type=1300 audit(1707801514.785:2539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2ff0180 a2=3 a3=0 items=0 ppid=1 pid=12174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:34.785000 audit[12174]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb2ff0180 a2=3 a3=0 items=0 ppid=1 pid=12174 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:35.118527 kernel: audit: type=1327 audit(1707801514.785:2539): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:34.785000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:35.149032 kernel: audit: type=1105 audit(1707801514.790:2540): pid=12174 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.790000 audit[12174]: USER_START pid=12174 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:35.243662 kernel: audit: type=1103 audit(1707801514.791:2541): pid=12176 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.791000 audit[12176]: CRED_ACQ pid=12176 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:35.333019 kernel: audit: type=1106 audit(1707801514.866:2542): pid=12174 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.866000 audit[12174]: USER_END pid=12174 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:35.428659 kernel: audit: type=1104 audit(1707801514.867:2543): pid=12174 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.867000 audit[12174]: CRED_DISP pid=12174 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:34.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.90.239:22-139.178.68.195:33830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:39.876865 systemd[1]: Started sshd@113-139.178.90.239:22-139.178.68.195:49694.service. Feb 13 05:18:39.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.239:22-139.178.68.195:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:39.903680 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:39.903827 kernel: audit: type=1130 audit(1707801519.875:2545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.239:22-139.178.68.195:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:40.025000 audit[12198]: USER_ACCT pid=12198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.027293 sshd[12198]: Accepted publickey for core from 139.178.68.195 port 49694 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:40.028815 sshd[12198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:40.031393 systemd-logind[1467]: New session 90 of user core. Feb 13 05:18:40.032039 systemd[1]: Started session-90.scope. Feb 13 05:18:40.112410 sshd[12198]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:40.113905 systemd[1]: sshd@113-139.178.90.239:22-139.178.68.195:49694.service: Deactivated successfully. Feb 13 05:18:40.114352 systemd[1]: session-90.scope: Deactivated successfully. Feb 13 05:18:40.114726 systemd-logind[1467]: Session 90 logged out. Waiting for processes to exit. Feb 13 05:18:40.115332 systemd-logind[1467]: Removed session 90. Feb 13 05:18:40.027000 audit[12198]: CRED_ACQ pid=12198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.209067 kernel: audit: type=1101 audit(1707801520.025:2546): pid=12198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.209118 kernel: audit: type=1103 audit(1707801520.027:2547): pid=12198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.209145 kernel: audit: type=1006 audit(1707801520.027:2548): pid=12198 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 13 05:18:40.267718 kernel: audit: type=1300 audit(1707801520.027:2548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56715d10 a2=3 a3=0 items=0 ppid=1 pid=12198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:40.027000 audit[12198]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56715d10 a2=3 a3=0 items=0 ppid=1 pid=12198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:40.359745 kernel: audit: type=1327 audit(1707801520.027:2548): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:40.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:40.390248 kernel: audit: type=1105 audit(1707801520.032:2549): pid=12198 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.032000 audit[12198]: USER_START pid=12198 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.484747 kernel: audit: type=1103 audit(1707801520.033:2550): pid=12200 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.033000 audit[12200]: CRED_ACQ pid=12200 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.574065 kernel: audit: type=1106 audit(1707801520.111:2551): pid=12198 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.111000 audit[12198]: USER_END pid=12198 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.669600 kernel: audit: type=1104 audit(1707801520.111:2552): pid=12198 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.111000 audit[12198]: CRED_DISP pid=12198 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:40.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.90.239:22-139.178.68.195:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:45.122089 systemd[1]: Started sshd@114-139.178.90.239:22-139.178.68.195:49698.service. Feb 13 05:18:45.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.239:22-139.178.68.195:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:45.148875 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:45.148944 kernel: audit: type=1130 audit(1707801525.120:2554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.239:22-139.178.68.195:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:45.270000 audit[12224]: USER_ACCT pid=12224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.271942 sshd[12224]: Accepted publickey for core from 139.178.68.195 port 49698 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:45.272730 sshd[12224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:45.274961 systemd-logind[1467]: New session 91 of user core. Feb 13 05:18:45.275410 systemd[1]: Started session-91.scope. Feb 13 05:18:45.353327 sshd[12224]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:45.354801 systemd[1]: sshd@114-139.178.90.239:22-139.178.68.195:49698.service: Deactivated successfully. Feb 13 05:18:45.355252 systemd[1]: session-91.scope: Deactivated successfully. Feb 13 05:18:45.355610 systemd-logind[1467]: Session 91 logged out. Waiting for processes to exit. Feb 13 05:18:45.356125 systemd-logind[1467]: Removed session 91. Feb 13 05:18:45.271000 audit[12224]: CRED_ACQ pid=12224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.453864 kernel: audit: type=1101 audit(1707801525.270:2555): pid=12224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.453896 kernel: audit: type=1103 audit(1707801525.271:2556): pid=12224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.453916 kernel: audit: type=1006 audit(1707801525.271:2557): pid=12224 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 13 05:18:45.512526 kernel: audit: type=1300 audit(1707801525.271:2557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd874dffb0 a2=3 a3=0 items=0 ppid=1 pid=12224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:45.271000 audit[12224]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd874dffb0 a2=3 a3=0 items=0 ppid=1 pid=12224 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:45.604617 kernel: audit: type=1327 audit(1707801525.271:2557): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:45.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:45.635121 kernel: audit: type=1105 audit(1707801525.276:2558): pid=12224 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.276000 audit[12224]: USER_START pid=12224 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.729633 kernel: audit: type=1103 audit(1707801525.276:2559): pid=12226 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.276000 audit[12226]: CRED_ACQ pid=12226 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.818819 kernel: audit: type=1106 audit(1707801525.352:2560): pid=12224 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.352000 audit[12224]: USER_END pid=12224 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.914329 kernel: audit: type=1104 audit(1707801525.352:2561): pid=12224 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.352000 audit[12224]: CRED_DISP pid=12224 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:45.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.90.239:22-139.178.68.195:49698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:50.364645 systemd[1]: Started sshd@115-139.178.90.239:22-139.178.68.195:50462.service. Feb 13 05:18:50.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.239:22-139.178.68.195:50462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:50.391971 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:50.392042 kernel: audit: type=1130 audit(1707801530.363:2563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.239:22-139.178.68.195:50462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:50.512000 audit[12249]: USER_ACCT pid=12249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.513897 sshd[12249]: Accepted publickey for core from 139.178.68.195 port 50462 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:50.514736 sshd[12249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:50.517168 systemd-logind[1467]: New session 92 of user core. Feb 13 05:18:50.517621 systemd[1]: Started session-92.scope. Feb 13 05:18:50.595689 sshd[12249]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:50.597137 systemd[1]: sshd@115-139.178.90.239:22-139.178.68.195:50462.service: Deactivated successfully. Feb 13 05:18:50.597582 systemd[1]: session-92.scope: Deactivated successfully. Feb 13 05:18:50.597949 systemd-logind[1467]: Session 92 logged out. Waiting for processes to exit. Feb 13 05:18:50.598380 systemd-logind[1467]: Removed session 92. Feb 13 05:18:50.513000 audit[12249]: CRED_ACQ pid=12249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.695706 kernel: audit: type=1101 audit(1707801530.512:2564): pid=12249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.695746 kernel: audit: type=1103 audit(1707801530.513:2565): pid=12249 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.695764 kernel: audit: type=1006 audit(1707801530.513:2566): pid=12249 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 13 05:18:50.754311 kernel: audit: type=1300 audit(1707801530.513:2566): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff650be750 a2=3 a3=0 items=0 ppid=1 pid=12249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:50.513000 audit[12249]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff650be750 a2=3 a3=0 items=0 ppid=1 pid=12249 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:50.846314 kernel: audit: type=1327 audit(1707801530.513:2566): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:50.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:50.876766 kernel: audit: type=1105 audit(1707801530.518:2567): pid=12249 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.518000 audit[12249]: USER_START pid=12249 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.971236 kernel: audit: type=1103 audit(1707801530.518:2568): pid=12251 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.518000 audit[12251]: CRED_ACQ pid=12251 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:51.060404 kernel: audit: type=1106 audit(1707801530.594:2569): pid=12249 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.594000 audit[12249]: USER_END pid=12249 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:51.155883 kernel: audit: type=1104 audit(1707801530.594:2570): pid=12249 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.594000 audit[12249]: CRED_DISP pid=12249 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:50.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.90.239:22-139.178.68.195:50462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:55.605957 systemd[1]: Started sshd@116-139.178.90.239:22-139.178.68.195:50476.service. Feb 13 05:18:55.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.239:22-139.178.68.195:50476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:55.632923 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 05:18:55.632959 kernel: audit: type=1130 audit(1707801535.604:2572): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.239:22-139.178.68.195:50476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 05:18:55.754000 audit[12321]: USER_ACCT pid=12321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.756551 sshd[12321]: Accepted publickey for core from 139.178.68.195 port 50476 ssh2: RSA SHA256:llQCsnGK+DGQD8plqhBaBLF6Morh7a75TNnEFmu+zwc Feb 13 05:18:55.758281 sshd[12321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 05:18:55.762720 systemd-logind[1467]: New session 93 of user core. Feb 13 05:18:55.763426 systemd[1]: Started session-93.scope. Feb 13 05:18:55.841516 sshd[12321]: pam_unix(sshd:session): session closed for user core Feb 13 05:18:55.842860 systemd[1]: sshd@116-139.178.90.239:22-139.178.68.195:50476.service: Deactivated successfully. Feb 13 05:18:55.843314 systemd[1]: session-93.scope: Deactivated successfully. Feb 13 05:18:55.843764 systemd-logind[1467]: Session 93 logged out. Waiting for processes to exit. Feb 13 05:18:55.844298 systemd-logind[1467]: Removed session 93. Feb 13 05:18:55.756000 audit[12321]: CRED_ACQ pid=12321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.938115 kernel: audit: type=1101 audit(1707801535.754:2573): pid=12321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.938159 kernel: audit: type=1103 audit(1707801535.756:2574): pid=12321 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.938178 kernel: audit: type=1006 audit(1707801535.756:2575): pid=12321 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 13 05:18:55.756000 audit[12321]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbf0aabc0 a2=3 a3=0 items=0 ppid=1 pid=12321 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:56.088910 kernel: audit: type=1300 audit(1707801535.756:2575): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbf0aabc0 a2=3 a3=0 items=0 ppid=1 pid=12321 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 05:18:56.088950 kernel: audit: type=1327 audit(1707801535.756:2575): proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:55.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 05:18:56.119410 kernel: audit: type=1105 audit(1707801535.764:2576): pid=12321 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.764000 audit[12321]: USER_START pid=12321 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:56.213906 kernel: audit: type=1103 audit(1707801535.764:2577): pid=12323 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.764000 audit[12323]: CRED_ACQ pid=12323 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:56.303207 kernel: audit: type=1106 audit(1707801535.840:2578): pid=12321 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.840000 audit[12321]: USER_END pid=12321 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.840000 audit[12321]: CRED_DISP pid=12321 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:56.488073 kernel: audit: type=1104 audit(1707801535.840:2579): pid=12321 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 05:18:55.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.90.239:22-139.178.68.195:50476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'