Feb 13 10:15:36.548646 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 10:15:36.548659 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 10:15:36.548665 kernel: BIOS-provided physical RAM map: Feb 13 10:15:36.548669 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 10:15:36.548673 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 10:15:36.548677 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 10:15:36.548681 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 10:15:36.548685 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 10:15:36.548689 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081f88fff] usable Feb 13 10:15:36.548692 kernel: BIOS-e820: [mem 0x0000000081f89000-0x0000000081f89fff] ACPI NVS Feb 13 10:15:36.548697 kernel: BIOS-e820: [mem 0x0000000081f8a000-0x0000000081f8afff] reserved Feb 13 10:15:36.548701 kernel: BIOS-e820: [mem 0x0000000081f8b000-0x000000008afccfff] usable Feb 13 10:15:36.548704 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 13 10:15:36.548708 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 13 10:15:36.548713 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 13 10:15:36.548718 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 13 10:15:36.548722 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 13 10:15:36.548726 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 13 10:15:36.548730 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 10:15:36.548734 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 10:15:36.548738 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 10:15:36.548742 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 10:15:36.548746 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 10:15:36.548750 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 13 10:15:36.548754 kernel: NX (Execute Disable) protection: active Feb 13 10:15:36.548758 kernel: SMBIOS 3.2.1 present. Feb 13 10:15:36.548763 kernel: DMI: Supermicro Super Server/X11SCM-F, BIOS 1.9 09/16/2022 Feb 13 10:15:36.548767 kernel: tsc: Detected 3400.000 MHz processor Feb 13 10:15:36.548771 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 10:15:36.548776 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 10:15:36.548780 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 10:15:36.548785 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 13 10:15:36.548789 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 10:15:36.548793 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 13 10:15:36.548797 kernel: Using GB pages for direct mapping Feb 13 10:15:36.548801 kernel: ACPI: Early table checksum verification disabled Feb 13 10:15:36.548806 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 10:15:36.548811 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 10:15:36.548815 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 13 10:15:36.548819 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 10:15:36.548825 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 13 10:15:36.548830 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 13 10:15:36.548835 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 13 10:15:36.548840 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 10:15:36.548844 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 10:15:36.548849 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 10:15:36.548853 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 10:15:36.548858 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 10:15:36.548862 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 10:15:36.548867 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 10:15:36.548872 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 10:15:36.548877 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 10:15:36.548881 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 10:15:36.548886 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 10:15:36.548890 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 10:15:36.548895 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 10:15:36.548899 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 10:15:36.548904 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 10:15:36.548909 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 10:15:36.548914 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 13 10:15:36.548918 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 10:15:36.548923 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 10:15:36.548927 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 10:15:36.548932 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 13 10:15:36.548936 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 10:15:36.548941 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 10:15:36.548945 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 10:15:36.548951 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 10:15:36.548955 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 10:15:36.548960 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 13 10:15:36.548964 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 13 10:15:36.548969 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 13 10:15:36.548973 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 13 10:15:36.548978 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 13 10:15:36.548982 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 13 10:15:36.548988 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 13 10:15:36.548992 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 13 10:15:36.548997 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 13 10:15:36.549001 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 13 10:15:36.549006 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 13 10:15:36.549010 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 13 10:15:36.549015 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 13 10:15:36.549019 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 13 10:15:36.549024 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 13 10:15:36.549029 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 13 10:15:36.549033 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 13 10:15:36.549038 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 13 10:15:36.549042 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 13 10:15:36.549047 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 13 10:15:36.549051 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 13 10:15:36.549056 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 13 10:15:36.549060 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 13 10:15:36.549065 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 13 10:15:36.549070 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 13 10:15:36.549074 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 13 10:15:36.549079 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 13 10:15:36.549083 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 13 10:15:36.549088 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 13 10:15:36.549093 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 13 10:15:36.549097 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 13 10:15:36.549102 kernel: No NUMA configuration found Feb 13 10:15:36.549106 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 13 10:15:36.549111 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 13 10:15:36.549116 kernel: Zone ranges: Feb 13 10:15:36.549121 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 10:15:36.549125 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 10:15:36.549130 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 13 10:15:36.549134 kernel: Movable zone start for each node Feb 13 10:15:36.549139 kernel: Early memory node ranges Feb 13 10:15:36.549143 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 10:15:36.549148 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 10:15:36.549152 kernel: node 0: [mem 0x0000000040400000-0x0000000081f88fff] Feb 13 10:15:36.549158 kernel: node 0: [mem 0x0000000081f8b000-0x000000008afccfff] Feb 13 10:15:36.549162 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 13 10:15:36.549167 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 13 10:15:36.549171 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 13 10:15:36.549176 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 13 10:15:36.549180 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 10:15:36.549188 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 10:15:36.549194 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 10:15:36.549199 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 10:15:36.549203 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 13 10:15:36.549209 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 13 10:15:36.549214 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 13 10:15:36.549219 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 13 10:15:36.549224 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 10:15:36.549229 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 10:15:36.549233 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 10:15:36.549238 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 10:15:36.549244 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 10:15:36.549249 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 10:15:36.549253 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 10:15:36.549258 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 10:15:36.549263 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 10:15:36.549268 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 10:15:36.549273 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 10:15:36.549277 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 10:15:36.549282 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 10:15:36.549288 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 10:15:36.549293 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 10:15:36.549297 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 10:15:36.549302 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 10:15:36.549307 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 10:15:36.549312 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 10:15:36.549317 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 10:15:36.549322 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 10:15:36.549327 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 10:15:36.549332 kernel: TSC deadline timer available Feb 13 10:15:36.549337 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 10:15:36.549342 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 13 10:15:36.549347 kernel: Booting paravirtualized kernel on bare hardware Feb 13 10:15:36.549352 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 10:15:36.549357 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 10:15:36.549362 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 10:15:36.549366 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 10:15:36.549371 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 10:15:36.549377 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 13 10:15:36.549381 kernel: Policy zone: Normal Feb 13 10:15:36.549387 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 10:15:36.549392 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 10:15:36.549397 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 10:15:36.549402 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 10:15:36.549407 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 10:15:36.549412 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 10:15:36.549418 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 10:15:36.549423 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 10:15:36.549428 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 10:15:36.549432 kernel: rcu: Hierarchical RCU implementation. Feb 13 10:15:36.549438 kernel: rcu: RCU event tracing is enabled. Feb 13 10:15:36.549443 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 10:15:36.549448 kernel: Rude variant of Tasks RCU enabled. Feb 13 10:15:36.549453 kernel: Tracing variant of Tasks RCU enabled. Feb 13 10:15:36.549458 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 10:15:36.549463 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 10:15:36.549470 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 10:15:36.549492 kernel: random: crng init done Feb 13 10:15:36.549496 kernel: Console: colour dummy device 80x25 Feb 13 10:15:36.549501 kernel: printk: console [tty0] enabled Feb 13 10:15:36.549506 kernel: printk: console [ttyS1] enabled Feb 13 10:15:36.549511 kernel: ACPI: Core revision 20210730 Feb 13 10:15:36.549516 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 13 10:15:36.549535 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 10:15:36.549540 kernel: DMAR: Host address width 39 Feb 13 10:15:36.549545 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 10:15:36.549550 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 10:15:36.549555 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 13 10:15:36.549560 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 13 10:15:36.549565 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 10:15:36.549569 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 10:15:36.549574 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 10:15:36.549579 kernel: x2apic enabled Feb 13 10:15:36.549585 kernel: Switched APIC routing to cluster x2apic. Feb 13 10:15:36.549590 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 10:15:36.549594 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 10:15:36.549599 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 10:15:36.549604 kernel: process: using mwait in idle threads Feb 13 10:15:36.549609 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 10:15:36.549614 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 10:15:36.549618 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 10:15:36.549623 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 10:15:36.549629 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 10:15:36.549634 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 10:15:36.549639 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 10:15:36.549643 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 10:15:36.549648 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 10:15:36.549653 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 10:15:36.549658 kernel: TAA: Mitigation: TSX disabled Feb 13 10:15:36.549662 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 10:15:36.549667 kernel: SRBDS: Mitigation: Microcode Feb 13 10:15:36.549672 kernel: GDS: Vulnerable: No microcode Feb 13 10:15:36.549677 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 10:15:36.549682 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 10:15:36.549687 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 10:15:36.549692 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 10:15:36.549697 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 10:15:36.549701 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 10:15:36.549706 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 10:15:36.549711 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 10:15:36.549716 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 10:15:36.549720 kernel: Freeing SMP alternatives memory: 32K Feb 13 10:15:36.549725 kernel: pid_max: default: 32768 minimum: 301 Feb 13 10:15:36.549730 kernel: LSM: Security Framework initializing Feb 13 10:15:36.549735 kernel: SELinux: Initializing. Feb 13 10:15:36.549740 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 10:15:36.549745 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 10:15:36.549750 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 10:15:36.549755 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 10:15:36.549759 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 10:15:36.549764 kernel: ... version: 4 Feb 13 10:15:36.549769 kernel: ... bit width: 48 Feb 13 10:15:36.549774 kernel: ... generic registers: 4 Feb 13 10:15:36.549779 kernel: ... value mask: 0000ffffffffffff Feb 13 10:15:36.549784 kernel: ... max period: 00007fffffffffff Feb 13 10:15:36.549789 kernel: ... fixed-purpose events: 3 Feb 13 10:15:36.549794 kernel: ... event mask: 000000070000000f Feb 13 10:15:36.549799 kernel: signal: max sigframe size: 2032 Feb 13 10:15:36.549804 kernel: rcu: Hierarchical SRCU implementation. Feb 13 10:15:36.549808 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 10:15:36.549813 kernel: smp: Bringing up secondary CPUs ... Feb 13 10:15:36.549818 kernel: x86: Booting SMP configuration: Feb 13 10:15:36.549823 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 10:15:36.549828 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 10:15:36.549834 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 10:15:36.549839 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 10:15:36.549844 kernel: smpboot: Max logical packages: 1 Feb 13 10:15:36.549848 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 10:15:36.549853 kernel: devtmpfs: initialized Feb 13 10:15:36.549858 kernel: x86/mm: Memory block size: 128MB Feb 13 10:15:36.549863 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81f89000-0x81f89fff] (4096 bytes) Feb 13 10:15:36.549868 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 13 10:15:36.549873 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 10:15:36.549879 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 10:15:36.549884 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 10:15:36.549888 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 10:15:36.549893 kernel: audit: initializing netlink subsys (disabled) Feb 13 10:15:36.549898 kernel: audit: type=2000 audit(1707819331.040:1): state=initialized audit_enabled=0 res=1 Feb 13 10:15:36.549903 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 10:15:36.549908 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 10:15:36.549913 kernel: cpuidle: using governor menu Feb 13 10:15:36.549918 kernel: ACPI: bus type PCI registered Feb 13 10:15:36.549923 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 10:15:36.549928 kernel: dca service started, version 1.12.1 Feb 13 10:15:36.549933 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 10:15:36.549938 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 10:15:36.549942 kernel: PCI: Using configuration type 1 for base access Feb 13 10:15:36.549947 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 10:15:36.549952 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 10:15:36.549957 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 10:15:36.549962 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 10:15:36.549967 kernel: ACPI: Added _OSI(Module Device) Feb 13 10:15:36.549972 kernel: ACPI: Added _OSI(Processor Device) Feb 13 10:15:36.549977 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 10:15:36.549982 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 10:15:36.549987 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 10:15:36.549992 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 10:15:36.549996 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 10:15:36.550001 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 10:15:36.550007 kernel: ACPI: Dynamic OEM Table Load: Feb 13 10:15:36.550012 kernel: ACPI: SSDT 0xFFFF9225C0213000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 10:15:36.550017 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 10:15:36.550021 kernel: ACPI: Dynamic OEM Table Load: Feb 13 10:15:36.550026 kernel: ACPI: SSDT 0xFFFF9225C1AE1400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 10:15:36.550031 kernel: ACPI: Dynamic OEM Table Load: Feb 13 10:15:36.550036 kernel: ACPI: SSDT 0xFFFF9225C1A58800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 10:15:36.550040 kernel: ACPI: Dynamic OEM Table Load: Feb 13 10:15:36.550045 kernel: ACPI: SSDT 0xFFFF9225C1A5C800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 10:15:36.550050 kernel: ACPI: Dynamic OEM Table Load: Feb 13 10:15:36.550055 kernel: ACPI: SSDT 0xFFFF9225C014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 10:15:36.550060 kernel: ACPI: Dynamic OEM Table Load: Feb 13 10:15:36.550065 kernel: ACPI: SSDT 0xFFFF9225C1AE0800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 10:15:36.550070 kernel: ACPI: Interpreter enabled Feb 13 10:15:36.550075 kernel: ACPI: PM: (supports S0 S5) Feb 13 10:15:36.550079 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 10:15:36.550084 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 10:15:36.550089 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 10:15:36.550094 kernel: HEST: Table parsing has been initialized. Feb 13 10:15:36.550099 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 10:15:36.550104 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 10:15:36.550109 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 10:15:36.550114 kernel: ACPI: PM: Power Resource [USBC] Feb 13 10:15:36.550119 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 10:15:36.550124 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 10:15:36.550129 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 10:15:36.550133 kernel: ACPI: PM: Power Resource [WRST] Feb 13 10:15:36.550138 kernel: ACPI: PM: Power Resource [FN00] Feb 13 10:15:36.550144 kernel: ACPI: PM: Power Resource [FN01] Feb 13 10:15:36.550148 kernel: ACPI: PM: Power Resource [FN02] Feb 13 10:15:36.550153 kernel: ACPI: PM: Power Resource [FN03] Feb 13 10:15:36.550158 kernel: ACPI: PM: Power Resource [FN04] Feb 13 10:15:36.550163 kernel: ACPI: PM: Power Resource [PIN] Feb 13 10:15:36.550168 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 10:15:36.550231 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 10:15:36.550275 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 10:15:36.550316 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 10:15:36.550323 kernel: PCI host bridge to bus 0000:00 Feb 13 10:15:36.550365 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 10:15:36.550401 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 10:15:36.550436 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 10:15:36.550474 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 13 10:15:36.550510 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 10:15:36.550546 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 10:15:36.550596 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 10:15:36.550645 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 10:15:36.550686 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.550730 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 10:15:36.550771 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 13 10:15:36.550816 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 10:15:36.550857 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 13 10:15:36.550903 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 10:15:36.550944 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 13 10:15:36.550986 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 10:15:36.551030 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 10:15:36.551073 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 13 10:15:36.551112 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 13 10:15:36.551156 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 10:15:36.551195 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 10:15:36.551241 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 10:15:36.551282 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 10:15:36.551327 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 10:15:36.551368 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 13 10:15:36.551407 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 10:15:36.551450 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 10:15:36.551492 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 13 10:15:36.551531 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 10:15:36.551574 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 10:15:36.551615 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 13 10:15:36.551656 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 10:15:36.551699 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 10:15:36.551740 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 13 10:15:36.551779 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 13 10:15:36.551819 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 13 10:15:36.551858 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 13 10:15:36.551904 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 13 10:15:36.551946 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 13 10:15:36.551986 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 10:15:36.552030 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 10:15:36.552071 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.552115 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 10:15:36.552155 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.552203 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 10:15:36.552245 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.552289 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 10:15:36.552331 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.552374 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 13 10:15:36.552417 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.552460 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 10:15:36.552504 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 10:15:36.552549 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 10:15:36.552594 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 10:15:36.552635 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 13 10:15:36.552675 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 10:15:36.552721 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 10:15:36.552761 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 10:15:36.552807 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 10:15:36.552851 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 10:15:36.552893 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 13 10:15:36.552934 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 13 10:15:36.552977 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 10:15:36.553018 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 10:15:36.553063 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 10:15:36.553106 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 10:15:36.553148 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 13 10:15:36.553190 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 13 10:15:36.553231 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 10:15:36.553273 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 10:15:36.553314 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 10:15:36.553355 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 10:15:36.553395 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 10:15:36.553436 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 10:15:36.553486 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 13 10:15:36.553528 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 13 10:15:36.553571 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 10:15:36.553614 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 13 10:15:36.553656 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.553698 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 10:15:36.553740 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 10:15:36.553782 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 10:15:36.553828 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 10:15:36.553870 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 13 10:15:36.553912 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 10:15:36.553953 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 13 10:15:36.553995 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 10:15:36.554035 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 10:15:36.554075 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 10:15:36.554118 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 10:15:36.554158 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 10:15:36.554204 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 10:15:36.554246 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 13 10:15:36.554288 kernel: pci 0000:06:00.0: supports D1 D2 Feb 13 10:15:36.554330 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 10:15:36.554372 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 10:15:36.554412 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 10:15:36.554454 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 10:15:36.554541 kernel: pci_bus 0000:07: extended config space not accessible Feb 13 10:15:36.554588 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 10:15:36.554634 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 13 10:15:36.554677 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 13 10:15:36.554722 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 10:15:36.554765 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 10:15:36.554811 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 10:15:36.554855 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 10:15:36.554899 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 10:15:36.554941 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 10:15:36.554983 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 10:15:36.554990 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 10:15:36.554996 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 10:15:36.555002 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 10:15:36.555007 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 10:15:36.555013 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 10:15:36.555018 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 10:15:36.555023 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 10:15:36.555028 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 10:15:36.555033 kernel: iommu: Default domain type: Translated Feb 13 10:15:36.555038 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 10:15:36.555081 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 13 10:15:36.555160 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 10:15:36.555226 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 13 10:15:36.555233 kernel: vgaarb: loaded Feb 13 10:15:36.555238 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 10:15:36.555244 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 10:15:36.555249 kernel: PTP clock support registered Feb 13 10:15:36.555254 kernel: PCI: Using ACPI for IRQ routing Feb 13 10:15:36.555259 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 10:15:36.555264 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 10:15:36.555271 kernel: e820: reserve RAM buffer [mem 0x81f89000-0x83ffffff] Feb 13 10:15:36.555276 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 13 10:15:36.555281 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 13 10:15:36.555286 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 13 10:15:36.555291 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 13 10:15:36.555296 kernel: clocksource: Switched to clocksource tsc-early Feb 13 10:15:36.555301 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 10:15:36.555307 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 10:15:36.555312 kernel: pnp: PnP ACPI init Feb 13 10:15:36.555355 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 10:15:36.555395 kernel: pnp 00:02: [dma 0 disabled] Feb 13 10:15:36.555435 kernel: pnp 00:03: [dma 0 disabled] Feb 13 10:15:36.555479 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 10:15:36.555517 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 10:15:36.555556 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 10:15:36.555597 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 10:15:36.555635 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 10:15:36.555671 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 10:15:36.555709 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 10:15:36.555744 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 10:15:36.555780 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 10:15:36.555815 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 10:15:36.555853 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 10:15:36.555892 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 10:15:36.555929 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 10:15:36.555965 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 10:15:36.556001 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 10:15:36.556037 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 10:15:36.556073 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 10:15:36.556110 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 10:15:36.556149 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 10:15:36.556157 kernel: pnp: PnP ACPI: found 10 devices Feb 13 10:15:36.556162 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 10:15:36.556168 kernel: NET: Registered PF_INET protocol family Feb 13 10:15:36.556173 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 10:15:36.556178 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 10:15:36.556183 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 10:15:36.556190 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 10:15:36.556195 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 10:15:36.556201 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 10:15:36.556206 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 10:15:36.556211 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 10:15:36.556216 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 10:15:36.556221 kernel: NET: Registered PF_XDP protocol family Feb 13 10:15:36.556262 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 13 10:15:36.556304 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 13 10:15:36.556344 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 13 10:15:36.556387 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 10:15:36.556429 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 10:15:36.556474 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 10:15:36.556516 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 10:15:36.556557 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 10:15:36.556597 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 13 10:15:36.556639 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 10:15:36.556680 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 13 10:15:36.556720 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 13 10:15:36.556761 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 10:15:36.556801 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 13 10:15:36.556844 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 13 10:15:36.556884 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 10:15:36.556925 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 13 10:15:36.556965 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 13 10:15:36.557007 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 13 10:15:36.557049 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 13 10:15:36.557090 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 13 10:15:36.557132 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 13 10:15:36.557174 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 13 10:15:36.557216 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 13 10:15:36.557252 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 10:15:36.557288 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 10:15:36.557323 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 10:15:36.557358 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 10:15:36.557393 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 13 10:15:36.557428 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 10:15:36.557473 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 13 10:15:36.557514 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 10:15:36.557556 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 13 10:15:36.557595 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 13 10:15:36.557635 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 13 10:15:36.557673 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 13 10:15:36.557715 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 13 10:15:36.557754 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 13 10:15:36.557794 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 10:15:36.557833 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 13 10:15:36.557840 kernel: PCI: CLS 64 bytes, default 64 Feb 13 10:15:36.557846 kernel: DMAR: No ATSR found Feb 13 10:15:36.557851 kernel: DMAR: No SATC found Feb 13 10:15:36.557856 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 10:15:36.557896 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 10:15:36.557938 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 10:15:36.557979 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 13 10:15:36.558020 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 13 10:15:36.558060 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 13 10:15:36.558100 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 13 10:15:36.558141 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 13 10:15:36.558181 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 13 10:15:36.558221 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 13 10:15:36.558263 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 13 10:15:36.558304 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 13 10:15:36.558344 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 13 10:15:36.558384 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 13 10:15:36.558424 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 13 10:15:36.558465 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 13 10:15:36.558508 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 13 10:15:36.558549 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 13 10:15:36.558590 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 13 10:15:36.558631 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 13 10:15:36.558670 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 13 10:15:36.558711 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 13 10:15:36.558753 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 13 10:15:36.558795 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 13 10:15:36.558835 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 13 10:15:36.558878 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 10:15:36.558922 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 13 10:15:36.558965 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 13 10:15:36.558973 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 10:15:36.558978 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 10:15:36.558983 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 13 10:15:36.558989 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 13 10:15:36.558994 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 10:15:36.558999 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 10:15:36.559006 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 10:15:36.559048 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 10:15:36.559056 kernel: Initialise system trusted keyrings Feb 13 10:15:36.559061 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 10:15:36.559066 kernel: Key type asymmetric registered Feb 13 10:15:36.559071 kernel: Asymmetric key parser 'x509' registered Feb 13 10:15:36.559076 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 10:15:36.559081 kernel: io scheduler mq-deadline registered Feb 13 10:15:36.559088 kernel: io scheduler kyber registered Feb 13 10:15:36.559093 kernel: io scheduler bfq registered Feb 13 10:15:36.559133 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 13 10:15:36.559175 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 13 10:15:36.559215 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 13 10:15:36.559256 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 13 10:15:36.559296 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 13 10:15:36.559337 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 13 10:15:36.559384 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 10:15:36.559392 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 10:15:36.559398 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 10:15:36.559403 kernel: pstore: Registered erst as persistent store backend Feb 13 10:15:36.559408 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 10:15:36.559413 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 10:15:36.559419 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 10:15:36.559424 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 10:15:36.559430 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 13 10:15:36.559495 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 10:15:36.559503 kernel: i8042: PNP: No PS/2 controller found. Feb 13 10:15:36.559555 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 10:15:36.559593 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 10:15:36.559630 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T10:15:35 UTC (1707819335) Feb 13 10:15:36.559666 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 10:15:36.559673 kernel: fail to initialize ptp_kvm Feb 13 10:15:36.559680 kernel: intel_pstate: Intel P-state driver initializing Feb 13 10:15:36.559685 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 10:15:36.559690 kernel: intel_pstate: HWP enabled Feb 13 10:15:36.559695 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 10:15:36.559700 kernel: vesafb: scrolling: redraw Feb 13 10:15:36.559706 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 10:15:36.559711 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000082d522a1, using 768k, total 768k Feb 13 10:15:36.559716 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 10:15:36.559721 kernel: fb0: VESA VGA frame buffer device Feb 13 10:15:36.559727 kernel: NET: Registered PF_INET6 protocol family Feb 13 10:15:36.559732 kernel: Segment Routing with IPv6 Feb 13 10:15:36.559738 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 10:15:36.559743 kernel: NET: Registered PF_PACKET protocol family Feb 13 10:15:36.559748 kernel: Key type dns_resolver registered Feb 13 10:15:36.559753 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 10:15:36.559759 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 10:15:36.559764 kernel: IPI shorthand broadcast: enabled Feb 13 10:15:36.559769 kernel: sched_clock: Marking stable (1734148264, 1339374109)->(4492506190, -1418983817) Feb 13 10:15:36.559775 kernel: registered taskstats version 1 Feb 13 10:15:36.559780 kernel: Loading compiled-in X.509 certificates Feb 13 10:15:36.559785 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 10:15:36.559790 kernel: Key type .fscrypt registered Feb 13 10:15:36.559795 kernel: Key type fscrypt-provisioning registered Feb 13 10:15:36.559801 kernel: pstore: Using crash dump compression: deflate Feb 13 10:15:36.559806 kernel: ima: Allocated hash algorithm: sha1 Feb 13 10:15:36.559811 kernel: ima: No architecture policies found Feb 13 10:15:36.559817 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 10:15:36.559823 kernel: Write protecting the kernel read-only data: 28672k Feb 13 10:15:36.559828 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 10:15:36.559833 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 10:15:36.559838 kernel: Run /init as init process Feb 13 10:15:36.559844 kernel: with arguments: Feb 13 10:15:36.559849 kernel: /init Feb 13 10:15:36.559854 kernel: with environment: Feb 13 10:15:36.559859 kernel: HOME=/ Feb 13 10:15:36.559865 kernel: TERM=linux Feb 13 10:15:36.559870 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 10:15:36.559876 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 10:15:36.559883 systemd[1]: Detected architecture x86-64. Feb 13 10:15:36.559888 systemd[1]: Running in initrd. Feb 13 10:15:36.559894 systemd[1]: No hostname configured, using default hostname. Feb 13 10:15:36.559899 systemd[1]: Hostname set to . Feb 13 10:15:36.559904 systemd[1]: Initializing machine ID from random generator. Feb 13 10:15:36.559911 systemd[1]: Queued start job for default target initrd.target. Feb 13 10:15:36.559916 systemd[1]: Started systemd-ask-password-console.path. Feb 13 10:15:36.559921 systemd[1]: Reached target cryptsetup.target. Feb 13 10:15:36.559926 systemd[1]: Reached target paths.target. Feb 13 10:15:36.559932 systemd[1]: Reached target slices.target. Feb 13 10:15:36.559937 systemd[1]: Reached target swap.target. Feb 13 10:15:36.559942 systemd[1]: Reached target timers.target. Feb 13 10:15:36.559948 systemd[1]: Listening on iscsid.socket. Feb 13 10:15:36.559954 systemd[1]: Listening on iscsiuio.socket. Feb 13 10:15:36.559960 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 10:15:36.559965 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 10:15:36.559970 systemd[1]: Listening on systemd-journald.socket. Feb 13 10:15:36.559976 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 13 10:15:36.559981 systemd[1]: Listening on systemd-networkd.socket. Feb 13 10:15:36.559986 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 13 10:15:36.559992 kernel: clocksource: Switched to clocksource tsc Feb 13 10:15:36.559998 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 10:15:36.560003 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 10:15:36.560008 systemd[1]: Reached target sockets.target. Feb 13 10:15:36.560014 systemd[1]: Starting kmod-static-nodes.service... Feb 13 10:15:36.560019 systemd[1]: Finished network-cleanup.service. Feb 13 10:15:36.560024 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 10:15:36.560030 systemd[1]: Starting systemd-journald.service... Feb 13 10:15:36.560035 systemd[1]: Starting systemd-modules-load.service... Feb 13 10:15:36.560042 systemd-journald[268]: Journal started Feb 13 10:15:36.560067 systemd-journald[268]: Runtime Journal (/run/log/journal/f89241b9cce04e27921c521f38173f7f) is 8.0M, max 640.1M, 632.1M free. Feb 13 10:15:36.564086 systemd-modules-load[269]: Inserted module 'overlay' Feb 13 10:15:36.593817 kernel: audit: type=1334 audit(1707819336.569:2): prog-id=6 op=LOAD Feb 13 10:15:36.593829 systemd[1]: Starting systemd-resolved.service... Feb 13 10:15:36.569000 audit: BPF prog-id=6 op=LOAD Feb 13 10:15:36.637511 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 10:15:36.637527 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 10:15:36.668521 kernel: Bridge firewalling registered Feb 13 10:15:36.668538 systemd[1]: Started systemd-journald.service. Feb 13 10:15:36.682484 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 13 10:15:36.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.688695 systemd-resolved[271]: Positive Trust Anchors: Feb 13 10:15:36.806217 kernel: audit: type=1130 audit(1707819336.689:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.806230 kernel: SCSI subsystem initialized Feb 13 10:15:36.806237 kernel: audit: type=1130 audit(1707819336.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.806246 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 10:15:36.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.688702 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 10:15:36.920650 kernel: device-mapper: uevent: version 1.0.3 Feb 13 10:15:36.920682 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 10:15:36.920704 kernel: audit: type=1130 audit(1707819336.863:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.688721 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 10:15:36.992648 kernel: audit: type=1130 audit(1707819336.927:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.690270 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 13 10:15:37.053712 kernel: audit: type=1130 audit(1707819337.000:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.710687 systemd[1]: Started systemd-resolved.service. Feb 13 10:15:37.108580 kernel: audit: type=1130 audit(1707819337.062:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:36.743648 systemd[1]: Finished kmod-static-nodes.service. Feb 13 10:15:36.864580 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 10:15:36.907517 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 13 10:15:36.928896 systemd[1]: Finished systemd-modules-load.service. Feb 13 10:15:37.000731 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 10:15:37.062786 systemd[1]: Reached target nss-lookup.target. Feb 13 10:15:37.117145 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 10:15:37.137059 systemd[1]: Starting systemd-sysctl.service... Feb 13 10:15:37.137357 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 10:15:37.140218 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 10:15:37.197731 kernel: audit: type=1130 audit(1707819337.138:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.140963 systemd[1]: Finished systemd-sysctl.service. Feb 13 10:15:37.262668 kernel: audit: type=1130 audit(1707819337.206:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.206798 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 10:15:37.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.272114 systemd[1]: Starting dracut-cmdline.service... Feb 13 10:15:37.291566 dracut-cmdline[294]: dracut-dracut-053 Feb 13 10:15:37.291566 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 10:15:37.291566 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 10:15:37.363580 kernel: Loading iSCSI transport class v2.0-870. Feb 13 10:15:37.363595 kernel: iscsi: registered transport (tcp) Feb 13 10:15:37.414126 kernel: iscsi: registered transport (qla4xxx) Feb 13 10:15:37.414146 kernel: QLogic iSCSI HBA Driver Feb 13 10:15:37.430071 systemd[1]: Finished dracut-cmdline.service. Feb 13 10:15:37.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:37.440231 systemd[1]: Starting dracut-pre-udev.service... Feb 13 10:15:37.497532 kernel: raid6: avx2x4 gen() 38970 MB/s Feb 13 10:15:37.532541 kernel: raid6: avx2x4 xor() 14455 MB/s Feb 13 10:15:37.567502 kernel: raid6: avx2x2 gen() 51678 MB/s Feb 13 10:15:37.602508 kernel: raid6: avx2x2 xor() 32041 MB/s Feb 13 10:15:37.637509 kernel: raid6: avx2x1 gen() 44140 MB/s Feb 13 10:15:37.671536 kernel: raid6: avx2x1 xor() 27833 MB/s Feb 13 10:15:37.705501 kernel: raid6: sse2x4 gen() 21319 MB/s Feb 13 10:15:37.739502 kernel: raid6: sse2x4 xor() 11797 MB/s Feb 13 10:15:37.773502 kernel: raid6: sse2x2 gen() 21618 MB/s Feb 13 10:15:37.807541 kernel: raid6: sse2x2 xor() 13407 MB/s Feb 13 10:15:37.841541 kernel: raid6: sse2x1 gen() 18196 MB/s Feb 13 10:15:37.893111 kernel: raid6: sse2x1 xor() 8912 MB/s Feb 13 10:15:37.893127 kernel: raid6: using algorithm avx2x2 gen() 51678 MB/s Feb 13 10:15:37.893135 kernel: raid6: .... xor() 32041 MB/s, rmw enabled Feb 13 10:15:37.911180 kernel: raid6: using avx2x2 recovery algorithm Feb 13 10:15:37.957490 kernel: xor: automatically using best checksumming function avx Feb 13 10:15:38.035514 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 10:15:38.040915 systemd[1]: Finished dracut-pre-udev.service. Feb 13 10:15:38.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:38.049000 audit: BPF prog-id=7 op=LOAD Feb 13 10:15:38.049000 audit: BPF prog-id=8 op=LOAD Feb 13 10:15:38.050556 systemd[1]: Starting systemd-udevd.service... Feb 13 10:15:38.058840 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 13 10:15:38.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:38.063621 systemd[1]: Started systemd-udevd.service. Feb 13 10:15:38.100583 dracut-pre-trigger[484]: rd.md=0: removing MD RAID activation Feb 13 10:15:38.077172 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 10:15:38.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:38.101872 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 10:15:38.118497 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 10:15:38.168576 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 10:15:38.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:38.194482 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 10:15:38.235228 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 10:15:38.235321 kernel: AES CTR mode by8 optimization enabled Feb 13 10:15:38.235472 kernel: ACPI: bus type USB registered Feb 13 10:15:38.252518 kernel: libata version 3.00 loaded. Feb 13 10:15:38.252535 kernel: usbcore: registered new interface driver usbfs Feb 13 10:15:38.269838 kernel: usbcore: registered new interface driver hub Feb 13 10:15:38.287241 kernel: usbcore: registered new device driver usb Feb 13 10:15:38.304475 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 10:15:38.338074 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 10:15:38.379229 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 10:15:38.379326 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 10:15:38.379388 kernel: pps pps0: new PPS source ptp0 Feb 13 10:15:38.413678 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 10:15:38.413756 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 13 10:15:38.428922 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 10:15:38.428990 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 10:15:38.461863 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 10:15:38.461936 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:2a Feb 13 10:15:38.479420 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 10:15:38.527676 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 13 10:15:38.527753 kernel: hub 1-0:1.0: USB hub found Feb 13 10:15:38.527817 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 10:15:38.569800 kernel: hub 1-0:1.0: 16 ports detected Feb 13 10:15:38.569874 kernel: pps pps1: new PPS source ptp1 Feb 13 10:15:38.593637 kernel: hub 2-0:1.0: USB hub found Feb 13 10:15:38.593720 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 13 10:15:38.593777 kernel: hub 2-0:1.0: 10 ports detected Feb 13 10:15:38.617255 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 10:15:38.631658 kernel: usb: port power management may be unreliable Feb 13 10:15:38.631673 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 00:25:90:bd:75:2b Feb 13 10:15:38.672514 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 13 10:15:38.672583 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 10:15:38.702501 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 13 10:15:38.702573 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 10:15:38.733770 kernel: mlx5_core 0000:01:00.0: firmware version: 14.31.1014 Feb 13 10:15:38.733846 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 13 10:15:38.733897 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 10:15:38.733947 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 10:15:38.786550 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 13 10:15:38.812443 kernel: scsi host0: ahci Feb 13 10:15:38.812645 kernel: scsi host1: ahci Feb 13 10:15:38.812801 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 10:15:38.812839 kernel: scsi host2: ahci Feb 13 10:15:38.853388 kernel: scsi host3: ahci Feb 13 10:15:38.877897 kernel: scsi host4: ahci Feb 13 10:15:38.877970 kernel: scsi host5: ahci Feb 13 10:15:38.889918 kernel: scsi host6: ahci Feb 13 10:15:38.889987 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 138 Feb 13 10:15:38.922997 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 138 Feb 13 10:15:38.923012 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 138 Feb 13 10:15:38.939303 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 138 Feb 13 10:15:38.983880 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 138 Feb 13 10:15:38.983925 kernel: hub 1-14:1.0: USB hub found Feb 13 10:15:38.984140 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 138 Feb 13 10:15:39.000238 kernel: hub 1-14:1.0: 4 ports detected Feb 13 10:15:39.000315 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 138 Feb 13 10:15:39.030474 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 10:15:39.090505 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 10:15:39.332562 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 10:15:39.332709 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 10:15:39.352473 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 10:15:39.367519 kernel: mlx5_core 0000:01:00.1: firmware version: 14.31.1014 Feb 13 10:15:39.367606 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 10:15:39.399564 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 10:15:39.399633 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 10:15:39.433474 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 10:15:39.448478 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU004, max UDMA/133 Feb 13 10:15:39.465510 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 10:15:39.481515 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 10:15:39.481531 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 10:15:39.496520 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 13 10:15:39.527510 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 10:15:39.573877 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 10:15:39.573890 kernel: ata1.00: Features: NCQ-prio Feb 13 10:15:39.573897 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 10:15:39.603969 kernel: ata2.00: Features: NCQ-prio Feb 13 10:15:39.623531 kernel: ata1.00: configured for UDMA/133 Feb 13 10:15:39.623547 kernel: ata2.00: configured for UDMA/133 Feb 13 10:15:39.623555 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U004 PQ: 0 ANSI: 5 Feb 13 10:15:39.654507 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 13 10:15:39.703453 kernel: usbcore: registered new interface driver usbhid Feb 13 10:15:39.703479 kernel: usbhid: USB HID core driver Feb 13 10:15:39.736517 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 10:15:39.736533 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(128) max mc(2048) Feb 13 10:15:39.768958 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 10:15:39.768975 kernel: port_module: 9 callbacks suppressed Feb 13 10:15:39.768983 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 13 10:15:39.769050 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:39.798512 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 10:15:39.798603 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 10:15:39.800206 kernel: sd 1:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 10:15:39.800321 kernel: sd 0:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 10:15:39.800386 kernel: sd 0:0:0:0: [sdb] 4096-byte physical blocks Feb 13 10:15:39.800441 kernel: sd 0:0:0:0: [sdb] Write Protect is off Feb 13 10:15:39.800502 kernel: sd 0:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 10:15:39.800559 kernel: sd 0:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 10:15:39.800613 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:39.803474 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 10:15:39.803490 kernel: GPT:9289727 != 937703087 Feb 13 10:15:39.803497 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 10:15:39.803504 kernel: GPT:9289727 != 937703087 Feb 13 10:15:39.803509 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 10:15:39.803516 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 10:15:39.803522 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:39.803530 kernel: sd 0:0:0:0: [sdb] Attached SCSI disk Feb 13 10:15:39.866229 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 10:15:39.866247 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 13 10:15:39.866319 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 13 10:15:39.866376 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 10:15:39.903532 kernel: sd 1:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 10:15:39.903609 kernel: sd 1:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 10:15:40.039534 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 10:15:40.039606 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 10:15:40.280169 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 10:15:40.280184 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 13 10:15:40.316476 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Feb 13 10:15:40.342061 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 10:15:40.373572 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sdb6 scanned by (udev-worker) (527) Feb 13 10:15:40.373608 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Feb 13 10:15:40.361590 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 10:15:40.386323 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 10:15:40.425020 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 10:15:40.439129 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 10:15:40.454511 systemd[1]: Starting disk-uuid.service... Feb 13 10:15:40.489580 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:40.489602 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 10:15:40.489684 disk-uuid[690]: Primary Header is updated. Feb 13 10:15:40.489684 disk-uuid[690]: Secondary Entries is updated. Feb 13 10:15:40.489684 disk-uuid[690]: Secondary Header is updated. Feb 13 10:15:40.546575 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:40.546585 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 10:15:40.546591 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:40.573542 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 10:15:41.553291 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 10:15:41.577515 kernel: sdb: sdb1 sdb2 sdb3 sdb4 sdb6 sdb7 sdb9 Feb 13 10:15:41.577705 disk-uuid[691]: The operation has completed successfully. Feb 13 10:15:41.614810 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 10:15:41.710999 kernel: audit: type=1130 audit(1707819341.621:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.711037 kernel: audit: type=1131 audit(1707819341.621:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.614855 systemd[1]: Finished disk-uuid.service. Feb 13 10:15:41.740512 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 10:15:41.624963 systemd[1]: Starting verity-setup.service... Feb 13 10:15:41.769152 systemd[1]: Found device dev-mapper-usr.device. Feb 13 10:15:41.779453 systemd[1]: Mounting sysusr-usr.mount... Feb 13 10:15:41.792669 systemd[1]: Finished verity-setup.service. Feb 13 10:15:41.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.846474 kernel: audit: type=1130 audit(1707819341.798:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.873841 systemd[1]: Mounted sysusr-usr.mount. Feb 13 10:15:41.888694 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 10:15:41.880760 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 10:15:41.979393 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 10:15:41.979407 kernel: BTRFS info (device sdb6): using free space tree Feb 13 10:15:41.979415 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 10:15:41.979421 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 10:15:41.881157 systemd[1]: Starting ignition-setup.service... Feb 13 10:15:41.903005 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 10:15:42.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:41.987893 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 10:15:42.107312 kernel: audit: type=1130 audit(1707819342.005:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.107327 kernel: audit: type=1130 audit(1707819342.060:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.005838 systemd[1]: Finished ignition-setup.service. Feb 13 10:15:42.138305 kernel: audit: type=1334 audit(1707819342.116:24): prog-id=9 op=LOAD Feb 13 10:15:42.116000 audit: BPF prog-id=9 op=LOAD Feb 13 10:15:42.061143 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 10:15:42.118418 systemd[1]: Starting systemd-networkd.service... Feb 13 10:15:42.153245 systemd-networkd[874]: lo: Link UP Feb 13 10:15:42.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.153247 systemd-networkd[874]: lo: Gained carrier Feb 13 10:15:42.234583 kernel: audit: type=1130 audit(1707819342.169:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.153584 systemd-networkd[874]: Enumeration completed Feb 13 10:15:42.153649 systemd[1]: Started systemd-networkd.service. Feb 13 10:15:42.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.154267 systemd-networkd[874]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 10:15:42.326652 kernel: audit: type=1130 audit(1707819342.254:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.252084 ignition[867]: Ignition 2.14.0 Feb 13 10:15:42.402906 kernel: audit: type=1130 audit(1707819342.333:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.402922 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 10:15:42.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.403031 iscsid[890]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 10:15:42.403031 iscsid[890]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 10:15:42.403031 iscsid[890]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 10:15:42.403031 iscsid[890]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 10:15:42.403031 iscsid[890]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 10:15:42.403031 iscsid[890]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 10:15:42.403031 iscsid[890]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 10:15:42.535666 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 13 10:15:42.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.170603 systemd[1]: Reached target network.target. Feb 13 10:15:42.252089 ignition[867]: Stage: fetch-offline Feb 13 10:15:42.228154 systemd[1]: Starting iscsiuio.service... Feb 13 10:15:42.252115 ignition[867]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 10:15:42.241571 systemd[1]: Started iscsiuio.service. Feb 13 10:15:42.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:42.252129 ignition[867]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 10:15:42.256173 systemd[1]: Starting iscsid.service... Feb 13 10:15:42.647584 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 10:15:42.255033 ignition[867]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 10:15:42.265363 unknown[867]: fetched base config from "system" Feb 13 10:15:42.255100 ignition[867]: parsed url from cmdline: "" Feb 13 10:15:42.265367 unknown[867]: fetched user config from "system" Feb 13 10:15:42.255102 ignition[867]: no config URL provided Feb 13 10:15:42.313844 systemd[1]: Started iscsid.service. Feb 13 10:15:42.255105 ignition[867]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 10:15:42.353000 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 10:15:42.255116 ignition[867]: parsing config with SHA512: 3c0c2fdb5d047856c3ffc621fed2a9abb990c5f853d5822cb39f0f6cff4410ca6826f29a86d892560ed7a2d38b007d1ba179ec3a0508441084e589e6bd828e84 Feb 13 10:15:42.404528 systemd-networkd[874]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 10:15:42.265539 ignition[867]: fetch-offline: fetch-offline passed Feb 13 10:15:42.419017 systemd[1]: Starting dracut-initqueue.service... Feb 13 10:15:42.265542 ignition[867]: POST message to Packet Timeline Feb 13 10:15:42.469691 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 10:15:42.265547 ignition[867]: POST Status error: resource requires networking Feb 13 10:15:42.470154 systemd[1]: Starting ignition-kargs.service... Feb 13 10:15:42.265581 ignition[867]: Ignition finished successfully Feb 13 10:15:42.491812 systemd[1]: Finished dracut-initqueue.service. Feb 13 10:15:42.474641 ignition[899]: Ignition 2.14.0 Feb 13 10:15:42.522683 systemd[1]: Reached target remote-fs-pre.target. Feb 13 10:15:42.474644 ignition[899]: Stage: kargs Feb 13 10:15:42.553602 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 10:15:42.474698 ignition[899]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 10:15:42.567622 systemd[1]: Reached target remote-fs.target. Feb 13 10:15:42.474707 ignition[899]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 10:15:42.582567 systemd[1]: Starting dracut-pre-mount.service... Feb 13 10:15:42.475995 ignition[899]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 10:15:42.594851 systemd[1]: Finished dracut-pre-mount.service. Feb 13 10:15:42.477516 ignition[899]: kargs: kargs passed Feb 13 10:15:42.641641 systemd-networkd[874]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 10:15:42.477519 ignition[899]: POST message to Packet Timeline Feb 13 10:15:42.669702 systemd-networkd[874]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 10:15:42.477528 ignition[899]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 10:15:42.698058 systemd-networkd[874]: enp1s0f1np1: Link UP Feb 13 10:15:42.479844 ignition[899]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:51432->[::1]:53: read: connection refused Feb 13 10:15:42.698288 systemd-networkd[874]: enp1s0f1np1: Gained carrier Feb 13 10:15:42.680251 ignition[899]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 10:15:42.710818 systemd-networkd[874]: enp1s0f0np0: Link UP Feb 13 10:15:42.680778 ignition[899]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37156->[::1]:53: read: connection refused Feb 13 10:15:42.711120 systemd-networkd[874]: eno2: Link UP Feb 13 10:15:42.711401 systemd-networkd[874]: eno1: Link UP Feb 13 10:15:43.081426 ignition[899]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 10:15:43.082888 ignition[899]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48494->[::1]:53: read: connection refused Feb 13 10:15:43.438639 systemd-networkd[874]: enp1s0f0np0: Gained carrier Feb 13 10:15:43.447756 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 13 10:15:43.467642 systemd-networkd[874]: enp1s0f0np0: DHCPv4 address 139.178.70.43/31, gateway 139.178.70.42 acquired from 145.40.83.140 Feb 13 10:15:43.801051 systemd-networkd[874]: enp1s0f1np1: Gained IPv6LL Feb 13 10:15:43.883803 ignition[899]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 10:15:43.884982 ignition[899]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:36352->[::1]:53: read: connection refused Feb 13 10:15:45.401062 systemd-networkd[874]: enp1s0f0np0: Gained IPv6LL Feb 13 10:15:45.486751 ignition[899]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 10:15:45.487988 ignition[899]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56369->[::1]:53: read: connection refused Feb 13 10:15:48.690650 ignition[899]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 10:15:48.727646 ignition[899]: GET result: OK Feb 13 10:15:49.051328 ignition[899]: Ignition finished successfully Feb 13 10:15:49.055917 systemd[1]: Finished ignition-kargs.service. Feb 13 10:15:49.140850 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:15:49.140869 kernel: audit: type=1130 audit(1707819349.066:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.076227 ignition[916]: Ignition 2.14.0 Feb 13 10:15:49.069826 systemd[1]: Starting ignition-disks.service... Feb 13 10:15:49.076231 ignition[916]: Stage: disks Feb 13 10:15:49.076304 ignition[916]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 10:15:49.076314 ignition[916]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 10:15:49.077843 ignition[916]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 10:15:49.079224 ignition[916]: disks: disks passed Feb 13 10:15:49.079227 ignition[916]: POST message to Packet Timeline Feb 13 10:15:49.079237 ignition[916]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 10:15:49.102615 ignition[916]: GET result: OK Feb 13 10:15:49.289185 ignition[916]: Ignition finished successfully Feb 13 10:15:49.291939 systemd[1]: Finished ignition-disks.service. Feb 13 10:15:49.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.305044 systemd[1]: Reached target initrd-root-device.target. Feb 13 10:15:49.381697 kernel: audit: type=1130 audit(1707819349.303:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.373649 systemd[1]: Reached target local-fs-pre.target. Feb 13 10:15:49.389681 systemd[1]: Reached target local-fs.target. Feb 13 10:15:49.404637 systemd[1]: Reached target sysinit.target. Feb 13 10:15:49.419684 systemd[1]: Reached target basic.target. Feb 13 10:15:49.434791 systemd[1]: Starting systemd-fsck-root.service... Feb 13 10:15:49.457399 systemd-fsck[931]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 10:15:49.467537 systemd[1]: Finished systemd-fsck-root.service. Feb 13 10:15:49.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.476098 systemd[1]: Mounting sysroot.mount... Feb 13 10:15:49.550560 kernel: audit: type=1130 audit(1707819349.475:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.550573 kernel: EXT4-fs (sdb9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 10:15:49.561986 systemd[1]: Mounted sysroot.mount. Feb 13 10:15:49.568717 systemd[1]: Reached target initrd-root-fs.target. Feb 13 10:15:49.590613 systemd[1]: Mounting sysroot-usr.mount... Feb 13 10:15:49.598364 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 10:15:49.613139 systemd[1]: Starting flatcar-static-network.service... Feb 13 10:15:49.628612 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 10:15:49.628726 systemd[1]: Reached target ignition-diskful.target. Feb 13 10:15:49.647579 systemd[1]: Mounted sysroot-usr.mount. Feb 13 10:15:49.670508 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 10:15:49.731599 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sdb6 scanned by mount (944) Feb 13 10:15:49.731615 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 10:15:49.681835 systemd[1]: Starting initrd-setup-root.service... Feb 13 10:15:49.802071 kernel: BTRFS info (device sdb6): using free space tree Feb 13 10:15:49.802086 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 10:15:49.802095 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 10:15:49.802102 initrd-setup-root[949]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 10:15:49.863516 kernel: audit: type=1130 audit(1707819349.810:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.863553 coreos-metadata[938]: Feb 13 10:15:49.758 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 10:15:49.863553 coreos-metadata[938]: Feb 13 10:15:49.823 INFO Fetch successful Feb 13 10:15:49.863553 coreos-metadata[938]: Feb 13 10:15:49.840 INFO wrote hostname ci-3510.3.2-a-c294f0feca to /sysroot/etc/hostname Feb 13 10:15:49.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.955303 coreos-metadata[939]: Feb 13 10:15:49.758 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 10:15:49.955303 coreos-metadata[939]: Feb 13 10:15:49.823 INFO Fetch successful Feb 13 10:15:50.090545 kernel: audit: type=1130 audit(1707819349.900:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.090558 kernel: audit: type=1130 audit(1707819349.963:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.090566 kernel: audit: type=1131 audit(1707819349.963:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.759005 systemd[1]: Finished initrd-setup-root.service. Feb 13 10:15:50.105623 initrd-setup-root[957]: cut: /sysroot/etc/group: No such file or directory Feb 13 10:15:50.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:49.831937 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 10:15:50.177719 kernel: audit: type=1130 audit(1707819350.112:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.177737 initrd-setup-root[965]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 10:15:49.871874 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 10:15:50.196674 initrd-setup-root[973]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 10:15:49.900745 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 10:15:50.216666 ignition[1015]: INFO : Ignition 2.14.0 Feb 13 10:15:50.216666 ignition[1015]: INFO : Stage: mount Feb 13 10:15:50.216666 ignition[1015]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 10:15:50.216666 ignition[1015]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 10:15:50.216666 ignition[1015]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 10:15:50.216666 ignition[1015]: INFO : mount: mount passed Feb 13 10:15:50.216666 ignition[1015]: INFO : POST message to Packet Timeline Feb 13 10:15:50.216666 ignition[1015]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 10:15:50.216666 ignition[1015]: INFO : GET result: OK Feb 13 10:15:49.900787 systemd[1]: Finished flatcar-static-network.service. Feb 13 10:15:49.964083 systemd[1]: Starting ignition-mount.service... Feb 13 10:15:50.077505 systemd[1]: Starting sysroot-boot.service... Feb 13 10:15:50.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.388817 ignition[1015]: INFO : Ignition finished successfully Feb 13 10:15:50.404571 kernel: audit: type=1130 audit(1707819350.331:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.098424 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 10:15:50.098460 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 10:15:50.099126 systemd[1]: Finished sysroot-boot.service. Feb 13 10:15:50.496555 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sdb6 scanned by mount (1031) Feb 13 10:15:50.496567 kernel: BTRFS info (device sdb6): using crc32c (crc32c-intel) checksum algorithm Feb 13 10:15:50.496575 kernel: BTRFS info (device sdb6): using free space tree Feb 13 10:15:50.496581 kernel: BTRFS info (device sdb6): has skinny extents Feb 13 10:15:50.496588 kernel: BTRFS info (device sdb6): enabling ssd optimizations Feb 13 10:15:50.320345 systemd[1]: Finished ignition-mount.service. Feb 13 10:15:50.333407 systemd[1]: Starting ignition-files.service... Feb 13 10:15:50.398294 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 10:15:50.532320 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 10:15:50.561270 unknown[1051]: wrote ssh authorized keys file for user: core Feb 13 10:15:50.601718 kernel: BTRFS info: devid 1 device path /dev/sdb6 changed to /dev/disk/by-label/OEM scanned by ignition (1059) Feb 13 10:15:50.601731 ignition[1051]: INFO : Ignition 2.14.0 Feb 13 10:15:50.601731 ignition[1051]: INFO : Stage: files Feb 13 10:15:50.601731 ignition[1051]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 10:15:50.601731 ignition[1051]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 10:15:50.601731 ignition[1051]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 10:15:50.601731 ignition[1051]: DEBUG : files: compiled without relabeling support, skipping Feb 13 10:15:50.601731 ignition[1051]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 10:15:50.601731 ignition[1051]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 10:15:50.601731 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 10:15:50.601731 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem892696613" Feb 13 10:15:50.601731 ignition[1051]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem892696613": device or resource busy Feb 13 10:15:50.601731 ignition[1051]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem892696613", trying btrfs: device or resource busy Feb 13 10:15:50.601731 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem892696613" Feb 13 10:15:50.868402 systemd[1]: Finished ignition-files.service. Feb 13 10:15:50.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.942885 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem892696613" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem892696613" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem892696613" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(a): [started] processing unit "etcd-member.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Feb 13 10:15:50.942885 ignition[1051]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 10:15:51.342762 kernel: audit: type=1130 audit(1707819350.884:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.891132 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 10:15:51.361939 ignition[1051]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 10:15:51.361939 ignition[1051]: INFO : files: files passed Feb 13 10:15:51.361939 ignition[1051]: INFO : POST message to Packet Timeline Feb 13 10:15:51.361939 ignition[1051]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 10:15:51.361939 ignition[1051]: INFO : GET result: OK Feb 13 10:15:51.361939 ignition[1051]: INFO : Ignition finished successfully Feb 13 10:15:50.951713 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 10:15:50.952020 systemd[1]: Starting ignition-quench.service... Feb 13 10:15:51.506903 initrd-setup-root-after-ignition[1081]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 10:15:51.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:50.989771 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 10:15:51.014021 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 10:15:51.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.014105 systemd[1]: Finished ignition-quench.service. Feb 13 10:15:51.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.039992 systemd[1]: Reached target ignition-complete.target. Feb 13 10:15:51.062397 systemd[1]: Starting initrd-parse-etc.service... Feb 13 10:15:51.079911 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 10:15:51.079967 systemd[1]: Finished initrd-parse-etc.service. Feb 13 10:15:51.090756 systemd[1]: Reached target initrd-fs.target. Feb 13 10:15:51.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.116695 systemd[1]: Reached target initrd.target. Feb 13 10:15:51.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.135892 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 10:15:51.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.137901 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 10:15:51.711674 ignition[1096]: INFO : Ignition 2.14.0 Feb 13 10:15:51.711674 ignition[1096]: INFO : Stage: umount Feb 13 10:15:51.711674 ignition[1096]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 10:15:51.711674 ignition[1096]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 10:15:51.711674 ignition[1096]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 10:15:51.711674 ignition[1096]: INFO : umount: umount passed Feb 13 10:15:51.711674 ignition[1096]: INFO : POST message to Packet Timeline Feb 13 10:15:51.711674 ignition[1096]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 10:15:51.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.844134 iscsid[890]: iscsid shutting down. Feb 13 10:15:51.168156 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 10:15:51.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.871903 ignition[1096]: INFO : GET result: OK Feb 13 10:15:51.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.191635 systemd[1]: Starting initrd-cleanup.service... Feb 13 10:15:51.215992 systemd[1]: Stopped target nss-lookup.target. Feb 13 10:15:51.219087 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 10:15:51.247068 systemd[1]: Stopped target timers.target. Feb 13 10:15:51.945745 ignition[1096]: INFO : Ignition finished successfully Feb 13 10:15:51.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.267135 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 10:15:51.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.267464 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 10:15:51.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.984000 audit: BPF prog-id=6 op=UNLOAD Feb 13 10:15:51.280446 systemd[1]: Stopped target initrd.target. Feb 13 10:15:51.306140 systemd[1]: Stopped target basic.target. Feb 13 10:15:52.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.326197 systemd[1]: Stopped target ignition-complete.target. Feb 13 10:15:52.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.352040 systemd[1]: Stopped target ignition-diskful.target. Feb 13 10:15:52.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.370015 systemd[1]: Stopped target initrd-root-device.target. Feb 13 10:15:52.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.394017 systemd[1]: Stopped target remote-fs.target. Feb 13 10:15:51.409012 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 10:15:52.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.426097 systemd[1]: Stopped target sysinit.target. Feb 13 10:15:52.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.444088 systemd[1]: Stopped target local-fs.target. Feb 13 10:15:52.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.459062 systemd[1]: Stopped target local-fs-pre.target. Feb 13 10:15:51.476057 systemd[1]: Stopped target swap.target. Feb 13 10:15:52.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.499899 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 10:15:51.500219 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 10:15:51.515175 systemd[1]: Stopped target cryptsetup.target. Feb 13 10:15:52.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.537047 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 10:15:52.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.537375 systemd[1]: Stopped dracut-initqueue.service. Feb 13 10:15:52.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.554290 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 10:15:51.554626 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 10:15:52.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.571157 systemd[1]: Stopped target paths.target. Feb 13 10:15:52.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.585033 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 10:15:52.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.589692 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 10:15:52.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:52.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.603039 systemd[1]: Stopped target slices.target. Feb 13 10:15:51.618144 systemd[1]: Stopped target sockets.target. Feb 13 10:15:51.636069 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 10:15:51.636445 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 10:15:51.653125 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 10:15:51.653433 systemd[1]: Stopped ignition-files.service. Feb 13 10:15:51.669179 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 10:15:51.669549 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 10:15:51.687235 systemd[1]: Stopping ignition-mount.service... Feb 13 10:15:51.702676 systemd[1]: Stopping iscsid.service... Feb 13 10:15:51.719145 systemd[1]: Stopping sysroot-boot.service... Feb 13 10:15:51.732717 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 10:15:51.732812 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 10:15:51.757820 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 10:15:51.757923 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 10:15:51.791659 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 10:15:52.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:51.793523 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 10:15:51.793741 systemd[1]: Stopped iscsid.service. Feb 13 10:15:51.804707 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 10:15:51.804898 systemd[1]: Stopped sysroot-boot.service. Feb 13 10:15:51.819954 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 10:15:51.820195 systemd[1]: Closed iscsid.socket. Feb 13 10:15:51.834014 systemd[1]: Stopping iscsiuio.service... Feb 13 10:15:51.851285 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 10:15:51.851516 systemd[1]: Stopped iscsiuio.service. Feb 13 10:15:51.865455 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 10:15:51.865679 systemd[1]: Finished initrd-cleanup.service. Feb 13 10:15:51.881704 systemd[1]: Stopped target network.target. Feb 13 10:15:51.894834 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 10:15:51.894926 systemd[1]: Closed iscsiuio.socket. Feb 13 10:15:51.909087 systemd[1]: Stopping systemd-networkd.service... Feb 13 10:15:51.914615 systemd-networkd[874]: enp1s0f1np1: DHCPv6 lease lost Feb 13 10:15:51.922661 systemd-networkd[874]: enp1s0f0np0: DHCPv6 lease lost Feb 13 10:15:51.923005 systemd[1]: Stopping systemd-resolved.service... Feb 13 10:15:52.531000 audit: BPF prog-id=9 op=UNLOAD Feb 13 10:15:51.939389 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 10:15:52.533484 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 13 10:15:51.939612 systemd[1]: Stopped systemd-resolved.service. Feb 13 10:15:51.955633 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 10:15:51.955863 systemd[1]: Stopped systemd-networkd.service. Feb 13 10:15:51.970262 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 10:15:51.970457 systemd[1]: Stopped ignition-mount.service. Feb 13 10:15:51.986078 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 10:15:51.986159 systemd[1]: Closed systemd-networkd.socket. Feb 13 10:15:52.001718 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 10:15:52.001829 systemd[1]: Stopped ignition-disks.service. Feb 13 10:15:52.016772 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 10:15:52.016880 systemd[1]: Stopped ignition-kargs.service. Feb 13 10:15:52.031778 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 10:15:52.031892 systemd[1]: Stopped ignition-setup.service. Feb 13 10:15:52.047844 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 10:15:52.047976 systemd[1]: Stopped initrd-setup-root.service. Feb 13 10:15:52.065376 systemd[1]: Stopping network-cleanup.service... Feb 13 10:15:52.078667 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 10:15:52.078798 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 10:15:52.093937 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 10:15:52.094086 systemd[1]: Stopped systemd-sysctl.service. Feb 13 10:15:52.110070 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 10:15:52.110184 systemd[1]: Stopped systemd-modules-load.service. Feb 13 10:15:52.125052 systemd[1]: Stopping systemd-udevd.service... Feb 13 10:15:52.142963 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 10:15:52.144192 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 10:15:52.144481 systemd[1]: Stopped systemd-udevd.service. Feb 13 10:15:52.156986 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 10:15:52.157098 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 10:15:52.170814 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 10:15:52.170909 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 10:15:52.187807 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 10:15:52.187948 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 10:15:52.202833 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 10:15:52.202945 systemd[1]: Stopped dracut-cmdline.service. Feb 13 10:15:52.218759 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 10:15:52.218873 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 10:15:52.236670 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 10:15:52.249545 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 13 10:15:52.249576 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 13 10:15:52.266730 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 10:15:52.266762 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 10:15:52.282635 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 10:15:52.282683 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 10:15:52.299044 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 13 10:15:52.299798 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 10:15:52.299916 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 10:15:52.446847 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 10:15:52.447056 systemd[1]: Stopped network-cleanup.service. Feb 13 10:15:52.455955 systemd[1]: Reached target initrd-switch-root.target. Feb 13 10:15:52.474191 systemd[1]: Starting initrd-switch-root.service... Feb 13 10:15:52.496071 systemd[1]: Switching root. Feb 13 10:15:52.534497 systemd-journald[268]: Journal stopped Feb 13 10:15:56.165341 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 10:15:56.165355 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 10:15:56.165363 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 10:15:56.165369 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 10:15:56.165374 kernel: SELinux: policy capability open_perms=1 Feb 13 10:15:56.165379 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 10:15:56.165385 kernel: SELinux: policy capability always_check_network=0 Feb 13 10:15:56.165390 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 10:15:56.165395 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 10:15:56.165401 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 10:15:56.165406 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 10:15:56.165413 systemd[1]: Successfully loaded SELinux policy in 282.833ms. Feb 13 10:15:56.165419 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.878ms. Feb 13 10:15:56.165426 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 10:15:56.165434 systemd[1]: Detected architecture x86-64. Feb 13 10:15:56.165439 systemd[1]: Detected first boot. Feb 13 10:15:56.165445 systemd[1]: Hostname set to . Feb 13 10:15:56.165452 systemd[1]: Initializing machine ID from random generator. Feb 13 10:15:56.165457 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 10:15:56.165463 systemd[1]: Populated /etc with preset unit settings. Feb 13 10:15:56.165472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 10:15:56.165479 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 10:15:56.165486 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 10:15:56.165492 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 13 10:15:56.165498 kernel: audit: type=1334 audit(1707819354.716:93): prog-id=12 op=LOAD Feb 13 10:15:56.165504 kernel: audit: type=1334 audit(1707819354.716:94): prog-id=3 op=UNLOAD Feb 13 10:15:56.165509 kernel: audit: type=1334 audit(1707819354.758:95): prog-id=13 op=LOAD Feb 13 10:15:56.165515 kernel: audit: type=1334 audit(1707819354.800:96): prog-id=14 op=LOAD Feb 13 10:15:56.165521 kernel: audit: type=1334 audit(1707819354.800:97): prog-id=4 op=UNLOAD Feb 13 10:15:56.165527 kernel: audit: type=1334 audit(1707819354.800:98): prog-id=5 op=UNLOAD Feb 13 10:15:56.165532 kernel: audit: type=1334 audit(1707819354.841:99): prog-id=15 op=LOAD Feb 13 10:15:56.165537 kernel: audit: type=1334 audit(1707819354.841:100): prog-id=12 op=UNLOAD Feb 13 10:15:56.165543 kernel: audit: type=1334 audit(1707819354.899:101): prog-id=16 op=LOAD Feb 13 10:15:56.165548 kernel: audit: type=1334 audit(1707819354.917:102): prog-id=17 op=LOAD Feb 13 10:15:56.165553 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 10:15:56.165559 systemd[1]: Stopped initrd-switch-root.service. Feb 13 10:15:56.165566 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 10:15:56.165573 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 10:15:56.165579 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 10:15:56.165585 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 10:15:56.165593 systemd[1]: Created slice system-getty.slice. Feb 13 10:15:56.165599 systemd[1]: Created slice system-modprobe.slice. Feb 13 10:15:56.165605 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 10:15:56.165612 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 10:15:56.165619 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 10:15:56.165625 systemd[1]: Created slice user.slice. Feb 13 10:15:56.165631 systemd[1]: Started systemd-ask-password-console.path. Feb 13 10:15:56.165638 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 10:15:56.165644 systemd[1]: Set up automount boot.automount. Feb 13 10:15:56.165650 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 10:15:56.165656 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 10:15:56.165662 systemd[1]: Stopped target initrd-fs.target. Feb 13 10:15:56.165668 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 10:15:56.165675 systemd[1]: Reached target integritysetup.target. Feb 13 10:15:56.165682 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 10:15:56.165688 systemd[1]: Reached target remote-fs.target. Feb 13 10:15:56.165694 systemd[1]: Reached target slices.target. Feb 13 10:15:56.165700 systemd[1]: Reached target swap.target. Feb 13 10:15:56.165706 systemd[1]: Reached target torcx.target. Feb 13 10:15:56.165712 systemd[1]: Reached target veritysetup.target. Feb 13 10:15:56.165719 systemd[1]: Listening on systemd-coredump.socket. Feb 13 10:15:56.165726 systemd[1]: Listening on systemd-initctl.socket. Feb 13 10:15:56.165732 systemd[1]: Listening on systemd-networkd.socket. Feb 13 10:15:56.165739 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 10:15:56.165745 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 10:15:56.165752 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 10:15:56.165759 systemd[1]: Mounting dev-hugepages.mount... Feb 13 10:15:56.165765 systemd[1]: Mounting dev-mqueue.mount... Feb 13 10:15:56.165772 systemd[1]: Mounting media.mount... Feb 13 10:15:56.165778 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 10:15:56.165785 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 10:15:56.165791 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 10:15:56.165797 systemd[1]: Mounting tmp.mount... Feb 13 10:15:56.165803 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 10:15:56.165811 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 10:15:56.165817 systemd[1]: Starting kmod-static-nodes.service... Feb 13 10:15:56.165824 systemd[1]: Starting modprobe@configfs.service... Feb 13 10:15:56.165830 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 10:15:56.165836 systemd[1]: Starting modprobe@drm.service... Feb 13 10:15:56.165843 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 10:15:56.165849 systemd[1]: Starting modprobe@fuse.service... Feb 13 10:15:56.165855 kernel: fuse: init (API version 7.34) Feb 13 10:15:56.165861 systemd[1]: Starting modprobe@loop.service... Feb 13 10:15:56.165868 kernel: loop: module loaded Feb 13 10:15:56.165874 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 10:15:56.165881 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 10:15:56.165887 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 10:15:56.165894 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 10:15:56.165900 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 10:15:56.165907 systemd[1]: Stopped systemd-journald.service. Feb 13 10:15:56.165913 systemd[1]: Starting systemd-journald.service... Feb 13 10:15:56.165919 systemd[1]: Starting systemd-modules-load.service... Feb 13 10:15:56.165928 systemd-journald[1245]: Journal started Feb 13 10:15:56.165952 systemd-journald[1245]: Runtime Journal (/run/log/journal/309e73d6af774bfdbaa5827581236c04) is 8.0M, max 640.1M, 632.1M free. Feb 13 10:15:52.870000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 10:15:53.123000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 10:15:53.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 10:15:53.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 10:15:53.125000 audit: BPF prog-id=10 op=LOAD Feb 13 10:15:53.125000 audit: BPF prog-id=10 op=UNLOAD Feb 13 10:15:53.126000 audit: BPF prog-id=11 op=LOAD Feb 13 10:15:53.126000 audit: BPF prog-id=11 op=UNLOAD Feb 13 10:15:53.189000 audit[1135]: AVC avc: denied { associate } for pid=1135 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 10:15:53.189000 audit[1135]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1118 pid=1135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:15:53.189000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 10:15:53.213000 audit[1135]: AVC avc: denied { associate } for pid=1135 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 10:15:53.213000 audit[1135]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000116000 a2=1ed a3=0 items=2 ppid=1118 pid=1135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:15:53.213000 audit: CWD cwd="/" Feb 13 10:15:53.213000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:53.213000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:53.213000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 10:15:54.716000 audit: BPF prog-id=12 op=LOAD Feb 13 10:15:54.716000 audit: BPF prog-id=3 op=UNLOAD Feb 13 10:15:54.758000 audit: BPF prog-id=13 op=LOAD Feb 13 10:15:54.800000 audit: BPF prog-id=14 op=LOAD Feb 13 10:15:54.800000 audit: BPF prog-id=4 op=UNLOAD Feb 13 10:15:54.800000 audit: BPF prog-id=5 op=UNLOAD Feb 13 10:15:54.841000 audit: BPF prog-id=15 op=LOAD Feb 13 10:15:54.841000 audit: BPF prog-id=12 op=UNLOAD Feb 13 10:15:54.899000 audit: BPF prog-id=16 op=LOAD Feb 13 10:15:54.917000 audit: BPF prog-id=17 op=LOAD Feb 13 10:15:54.917000 audit: BPF prog-id=13 op=UNLOAD Feb 13 10:15:54.917000 audit: BPF prog-id=14 op=UNLOAD Feb 13 10:15:54.935000 audit: BPF prog-id=18 op=LOAD Feb 13 10:15:54.935000 audit: BPF prog-id=15 op=UNLOAD Feb 13 10:15:54.935000 audit: BPF prog-id=19 op=LOAD Feb 13 10:15:54.935000 audit: BPF prog-id=20 op=LOAD Feb 13 10:15:54.935000 audit: BPF prog-id=16 op=UNLOAD Feb 13 10:15:54.935000 audit: BPF prog-id=17 op=UNLOAD Feb 13 10:15:54.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:54.979000 audit: BPF prog-id=18 op=UNLOAD Feb 13 10:15:54.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:54.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.138000 audit: BPF prog-id=21 op=LOAD Feb 13 10:15:56.138000 audit: BPF prog-id=22 op=LOAD Feb 13 10:15:56.138000 audit: BPF prog-id=23 op=LOAD Feb 13 10:15:56.138000 audit: BPF prog-id=19 op=UNLOAD Feb 13 10:15:56.138000 audit: BPF prog-id=20 op=UNLOAD Feb 13 10:15:56.161000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 10:15:56.161000 audit[1245]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffddad4b3c0 a2=4000 a3=7ffddad4b45c items=0 ppid=1 pid=1245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:15:56.161000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 10:15:54.716119 systemd[1]: Queued start job for default target multi-user.target. Feb 13 10:15:53.188481 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 10:15:54.937656 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 10:15:53.188972 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 10:15:53.188986 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 10:15:53.189006 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 10:15:53.189012 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 10:15:53.189031 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 10:15:53.189038 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 10:15:53.189156 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 10:15:53.189178 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 10:15:53.189186 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 10:15:53.189657 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 10:15:53.189677 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 10:15:53.189688 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 10:15:53.189696 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 10:15:53.189706 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 10:15:53.189714 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 10:15:54.384623 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:54Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 10:15:54.384767 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:54Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 10:15:54.384822 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:54Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 10:15:54.384920 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:54Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 10:15:54.384950 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:54Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 10:15:54.384984 /usr/lib/systemd/system-generators/torcx-generator[1135]: time="2024-02-13T10:15:54Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 10:15:56.196650 systemd[1]: Starting systemd-network-generator.service... Feb 13 10:15:56.218511 systemd[1]: Starting systemd-remount-fs.service... Feb 13 10:15:56.239509 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 10:15:56.272993 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 10:15:56.273012 systemd[1]: Stopped verity-setup.service. Feb 13 10:15:56.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.307516 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 10:15:56.321521 systemd[1]: Started systemd-journald.service. Feb 13 10:15:56.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.329985 systemd[1]: Mounted dev-hugepages.mount. Feb 13 10:15:56.336728 systemd[1]: Mounted dev-mqueue.mount. Feb 13 10:15:56.343725 systemd[1]: Mounted media.mount. Feb 13 10:15:56.350719 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 10:15:56.359737 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 10:15:56.368690 systemd[1]: Mounted tmp.mount. Feb 13 10:15:56.375780 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 10:15:56.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.383778 systemd[1]: Finished kmod-static-nodes.service. Feb 13 10:15:56.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.391917 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 10:15:56.392038 systemd[1]: Finished modprobe@configfs.service. Feb 13 10:15:56.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.400907 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 10:15:56.401045 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 10:15:56.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.409969 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 10:15:56.410126 systemd[1]: Finished modprobe@drm.service. Feb 13 10:15:56.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.420168 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 10:15:56.420414 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 10:15:56.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.430314 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 10:15:56.430645 systemd[1]: Finished modprobe@fuse.service. Feb 13 10:15:56.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.440327 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 10:15:56.440657 systemd[1]: Finished modprobe@loop.service. Feb 13 10:15:56.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.449306 systemd[1]: Finished systemd-modules-load.service. Feb 13 10:15:56.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.458271 systemd[1]: Finished systemd-network-generator.service. Feb 13 10:15:56.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.467315 systemd[1]: Finished systemd-remount-fs.service. Feb 13 10:15:56.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.476243 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 10:15:56.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.485863 systemd[1]: Reached target network-pre.target. Feb 13 10:15:56.498219 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 10:15:56.507128 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 10:15:56.513668 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 10:15:56.514646 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 10:15:56.522079 systemd[1]: Starting systemd-journal-flush.service... Feb 13 10:15:56.525594 systemd-journald[1245]: Time spent on flushing to /var/log/journal/309e73d6af774bfdbaa5827581236c04 is 15.117ms for 1566 entries. Feb 13 10:15:56.525594 systemd-journald[1245]: System Journal (/var/log/journal/309e73d6af774bfdbaa5827581236c04) is 8.0M, max 195.6M, 187.6M free. Feb 13 10:15:56.560177 systemd-journald[1245]: Received client request to flush runtime journal. Feb 13 10:15:56.538593 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 10:15:56.539907 systemd[1]: Starting systemd-random-seed.service... Feb 13 10:15:56.549573 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 10:15:56.550291 systemd[1]: Starting systemd-sysctl.service... Feb 13 10:15:56.557270 systemd[1]: Starting systemd-sysusers.service... Feb 13 10:15:56.564086 systemd[1]: Starting systemd-udev-settle.service... Feb 13 10:15:56.571703 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 10:15:56.579658 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 10:15:56.587687 systemd[1]: Finished systemd-journal-flush.service. Feb 13 10:15:56.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.595726 systemd[1]: Finished systemd-random-seed.service. Feb 13 10:15:56.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.603750 systemd[1]: Finished systemd-sysctl.service. Feb 13 10:15:56.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.611743 systemd[1]: Finished systemd-sysusers.service. Feb 13 10:15:56.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.620706 systemd[1]: Reached target first-boot-complete.target. Feb 13 10:15:56.629243 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 10:15:56.638452 udevadm[1262]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 10:15:56.648407 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 10:15:56.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.815240 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 10:15:56.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.823000 audit: BPF prog-id=24 op=LOAD Feb 13 10:15:56.823000 audit: BPF prog-id=25 op=LOAD Feb 13 10:15:56.823000 audit: BPF prog-id=7 op=UNLOAD Feb 13 10:15:56.823000 audit: BPF prog-id=8 op=UNLOAD Feb 13 10:15:56.824731 systemd[1]: Starting systemd-udevd.service... Feb 13 10:15:56.836510 systemd-udevd[1265]: Using default interface naming scheme 'v252'. Feb 13 10:15:56.853786 systemd[1]: Started systemd-udevd.service. Feb 13 10:15:56.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:56.863669 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 10:15:56.862000 audit: BPF prog-id=26 op=LOAD Feb 13 10:15:56.864892 systemd[1]: Starting systemd-networkd.service... Feb 13 10:15:56.885000 audit: BPF prog-id=27 op=LOAD Feb 13 10:15:56.900238 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 10:15:56.900292 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 10:15:56.900306 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sdb6 scanned by (udev-worker) (1266) Feb 13 10:15:56.920206 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 10:15:56.935000 audit: BPF prog-id=28 op=LOAD Feb 13 10:15:56.935000 audit: BPF prog-id=29 op=LOAD Feb 13 10:15:56.937550 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 10:15:56.937982 systemd[1]: Starting systemd-userdbd.service... Feb 13 10:15:56.953474 kernel: ACPI: button: Power Button [PWRF] Feb 13 10:15:56.897000 audit[1337]: AVC avc: denied { confidentiality } for pid=1337 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 10:15:56.985481 kernel: IPMI message handler: version 39.2 Feb 13 10:15:56.897000 audit[1337]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f7e463a9010 a1=4d8bc a2=7f7e4804abc5 a3=5 items=42 ppid=1265 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:15:56.897000 audit: CWD cwd="/" Feb 13 10:15:56.897000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=1 name=(null) inode=21799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=2 name=(null) inode=21799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=3 name=(null) inode=21800 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=4 name=(null) inode=21799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=5 name=(null) inode=21801 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=6 name=(null) inode=21799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=7 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=8 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=9 name=(null) inode=21803 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=10 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=11 name=(null) inode=21804 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=12 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=13 name=(null) inode=21805 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=14 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=15 name=(null) inode=21806 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=16 name=(null) inode=21802 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=17 name=(null) inode=21807 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=18 name=(null) inode=21799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=19 name=(null) inode=21808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=20 name=(null) inode=21808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=21 name=(null) inode=21809 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=22 name=(null) inode=21808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=23 name=(null) inode=21810 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=24 name=(null) inode=21808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=25 name=(null) inode=21811 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=26 name=(null) inode=21808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=27 name=(null) inode=21812 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=28 name=(null) inode=21808 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=29 name=(null) inode=21813 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=30 name=(null) inode=21799 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=31 name=(null) inode=21814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=32 name=(null) inode=21814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=33 name=(null) inode=21815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=34 name=(null) inode=21814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=35 name=(null) inode=21816 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=36 name=(null) inode=21814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=37 name=(null) inode=21817 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=38 name=(null) inode=21814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=39 name=(null) inode=21818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=40 name=(null) inode=21814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PATH item=41 name=(null) inode=21819 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:15:56.897000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 10:15:57.021327 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 10:15:57.030630 systemd[1]: Started systemd-userdbd.service. Feb 13 10:15:57.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:57.041474 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 10:15:57.041588 kernel: ipmi device interface Feb 13 10:15:57.041603 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 10:15:57.120587 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 10:15:57.120877 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 10:15:57.120978 kernel: ipmi_si: IPMI System Interface driver Feb 13 10:15:57.151767 kernel: i2c i2c-0: 1/4 memory slots populated (from DMI) Feb 13 10:15:57.151962 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 10:15:57.185712 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 10:15:57.185733 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 10:15:57.218022 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 10:15:57.218126 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 10:15:57.266482 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 10:15:57.266523 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 10:15:57.282447 systemd-networkd[1299]: bond0: netdev ready Feb 13 10:15:57.284402 systemd-networkd[1299]: lo: Link UP Feb 13 10:15:57.284405 systemd-networkd[1299]: lo: Gained carrier Feb 13 10:15:57.284884 systemd-networkd[1299]: Enumeration completed Feb 13 10:15:57.284945 systemd[1]: Started systemd-networkd.service. Feb 13 10:15:57.285161 systemd-networkd[1299]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 10:15:57.285474 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 10:15:57.285501 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 10:15:57.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:57.322083 systemd-networkd[1299]: enp1s0f1np1: Configuring with /etc/systemd/network/10-b8:59:9f:e1:0a:f9.network. Feb 13 10:15:57.322356 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 10:15:57.380910 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 13 10:15:57.381001 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 10:15:57.381070 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 13 10:15:57.399473 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 13 10:15:57.461458 kernel: intel_rapl_common: Found RAPL domain package Feb 13 10:15:57.461518 kernel: intel_rapl_common: Found RAPL domain core Feb 13 10:15:57.461534 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 10:15:57.477585 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 10:15:57.520473 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 10:15:57.587591 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 10:15:57.609515 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 13 10:15:57.609553 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 10:15:57.631209 systemd-networkd[1299]: enp1s0f0np0: Configuring with /etc/systemd/network/10-b8:59:9f:e1:0a:f8.network. Feb 13 10:15:57.757504 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 10:15:57.989472 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 10:15:58.701640 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 13 10:15:58.725515 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 13 10:15:58.725572 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 10:15:58.746398 systemd-networkd[1299]: bond0: Link UP Feb 13 10:15:58.746706 systemd-networkd[1299]: enp1s0f1np1: Link UP Feb 13 10:15:58.785161 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 10:15:58.785196 kernel: bond0: active interface up! Feb 13 10:15:58.806879 systemd-networkd[1299]: enp1s0f1np1: Gained carrier Feb 13 10:15:58.807526 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Feb 13 10:15:58.808063 systemd-networkd[1299]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-b8:59:9f:e1:0a:f8.network. Feb 13 10:15:58.828809 systemd[1]: Finished systemd-udev-settle.service. Feb 13 10:15:58.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:58.848242 systemd[1]: Starting lvm2-activation-early.service... Feb 13 10:15:58.854513 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 10:15:58.863439 lvm[1371]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 10:15:58.893971 systemd[1]: Finished lvm2-activation-early.service. Feb 13 10:15:58.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:58.903635 systemd[1]: Reached target cryptsetup.target. Feb 13 10:15:58.913051 systemd[1]: Starting lvm2-activation.service... Feb 13 10:15:58.915297 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 10:15:58.935530 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:58.958534 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:58.979473 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:58.985882 systemd[1]: Finished lvm2-activation.service. Feb 13 10:15:59.001517 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.018587 systemd[1]: Reached target local-fs-pre.target. Feb 13 10:15:59.023475 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.040514 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 10:15:59.040528 systemd[1]: Reached target local-fs.target. Feb 13 10:15:59.045509 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.062518 systemd[1]: Reached target machines.target. Feb 13 10:15:59.066505 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.083946 systemd[1]: Starting ldconfig.service... Feb 13 10:15:59.087531 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.107515 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.123129 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 10:15:59.123153 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 10:15:59.123964 systemd[1]: Starting systemd-boot-update.service... Feb 13 10:15:59.128518 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.145080 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 10:15:59.148514 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.166106 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 10:15:59.168373 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 10:15:59.168404 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 10:15:59.168471 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.168992 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 10:15:59.169194 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1374 (bootctl) Feb 13 10:15:59.169785 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 10:15:59.187473 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.192630 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 10:15:59.193583 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 10:15:59.194571 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 10:15:59.206539 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.226394 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 10:15:59.226527 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.226768 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 10:15:59.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.226939 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 10:15:59.245474 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.265513 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.283471 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.288294 systemd-fsck[1383]: fsck.fat 4.2 (2021-01-31) Feb 13 10:15:59.288294 systemd-fsck[1383]: /dev/sdb1: 789 files, 115339/258078 clusters Feb 13 10:15:59.293504 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 10:15:59.301473 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.320472 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.321321 systemd[1]: Mounting boot.mount... Feb 13 10:15:59.339512 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.341479 systemd[1]: Mounted boot.mount. Feb 13 10:15:59.356502 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.367980 ldconfig[1373]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 10:15:59.371641 systemd[1]: Finished ldconfig.service. Feb 13 10:15:59.373516 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.388642 systemd[1]: Finished systemd-boot-update.service. Feb 13 10:15:59.390532 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.408520 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.408701 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 10:15:59.426530 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:15:59.427322 systemd[1]: Starting audit-rules.service... Feb 13 10:15:59.443475 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.442000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 10:15:59.442000 audit[1402]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff8bb4bdc0 a2=420 a3=0 items=0 ppid=1387 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:15:59.442000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 10:15:59.444187 augenrules[1402]: No rules Feb 13 10:15:59.459146 systemd[1]: Starting clean-ca-certificates.service... Feb 13 10:15:59.460523 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.477539 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.478113 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 10:15:59.493528 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.495561 systemd[1]: Starting systemd-resolved.service... Feb 13 10:15:59.509531 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.526167 systemd[1]: Starting systemd-timesyncd.service... Feb 13 10:15:59.526505 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.542053 systemd[1]: Starting systemd-update-utmp.service... Feb 13 10:15:59.542526 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.557802 systemd[1]: Finished audit-rules.service. Feb 13 10:15:59.558519 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.573475 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.573680 systemd[1]: Finished clean-ca-certificates.service. Feb 13 10:15:59.589517 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.590684 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 10:15:59.603522 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.618508 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.630871 systemd[1]: Starting systemd-update-done.service... Feb 13 10:15:59.632470 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.647474 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.647550 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 10:15:59.647794 systemd[1]: Finished systemd-update-utmp.service. Feb 13 10:15:59.662473 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.676474 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.676634 systemd[1]: Finished systemd-update-done.service. Feb 13 10:15:59.682799 systemd-resolved[1409]: Positive Trust Anchors: Feb 13 10:15:59.682805 systemd-resolved[1409]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 10:15:59.682824 systemd-resolved[1409]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 10:15:59.686752 systemd-resolved[1409]: Using system hostname 'ci-3510.3.2-a-c294f0feca'. Feb 13 10:15:59.691506 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.702883 systemd[1]: Started systemd-timesyncd.service. Feb 13 10:15:59.705520 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.719530 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.730840 systemd[1]: Reached target time-set.target. Feb 13 10:15:59.732520 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.745524 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.758473 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.770472 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.781471 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.793471 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.804471 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.815472 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.816594 systemd-networkd[1299]: enp1s0f0np0: Link UP Feb 13 10:15:59.816763 systemd-networkd[1299]: bond0: Gained carrier Feb 13 10:15:59.816854 systemd-networkd[1299]: enp1s0f0np0: Gained carrier Feb 13 10:15:59.816871 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:15:59.817416 systemd[1]: Started systemd-resolved.service. Feb 13 10:15:59.836527 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 10:15:59.836545 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 13 10:15:59.841732 systemd[1]: Reached target network.target. Feb 13 10:15:59.843646 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:15:59.843697 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:15:59.843824 systemd-networkd[1299]: enp1s0f1np1: Link DOWN Feb 13 10:15:59.843827 systemd-networkd[1299]: enp1s0f1np1: Lost carrier Feb 13 10:15:59.849565 systemd[1]: Reached target nss-lookup.target. Feb 13 10:15:59.851639 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:15:59.851692 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:15:59.851842 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:15:59.857561 systemd[1]: Reached target sysinit.target. Feb 13 10:15:59.865585 systemd[1]: Started motdgen.path. Feb 13 10:15:59.872561 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 10:15:59.882613 systemd[1]: Started logrotate.timer. Feb 13 10:15:59.889595 systemd[1]: Started mdadm.timer. Feb 13 10:15:59.896557 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 10:15:59.904503 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 10:15:59.904518 systemd[1]: Reached target paths.target. Feb 13 10:15:59.911501 systemd[1]: Reached target timers.target. Feb 13 10:15:59.918662 systemd[1]: Listening on dbus.socket. Feb 13 10:15:59.926090 systemd[1]: Starting docker.socket... Feb 13 10:15:59.933846 systemd[1]: Listening on sshd.socket. Feb 13 10:15:59.940597 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 10:15:59.940870 systemd[1]: Listening on docker.socket. Feb 13 10:15:59.947541 systemd[1]: Reached target sockets.target. Feb 13 10:15:59.955550 systemd[1]: Reached target basic.target. Feb 13 10:15:59.962559 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 10:15:59.962573 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 10:15:59.963028 systemd[1]: Starting containerd.service... Feb 13 10:15:59.969966 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 10:15:59.979091 systemd[1]: Starting coreos-metadata.service... Feb 13 10:15:59.986023 systemd[1]: Starting dbus.service... Feb 13 10:15:59.991969 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 10:15:59.996877 jq[1425]: false Feb 13 10:15:59.997172 coreos-metadata[1418]: Feb 13 10:15:59.997 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 10:15:59.999010 systemd[1]: Starting extend-filesystems.service... Feb 13 10:16:00.002934 dbus-daemon[1424]: [system] SELinux support is enabled Feb 13 10:16:00.005961 extend-filesystems[1427]: Found sda Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb1 Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb2 Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb3 Feb 13 10:16:00.013540 extend-filesystems[1427]: Found usr Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb4 Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb6 Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb7 Feb 13 10:16:00.013540 extend-filesystems[1427]: Found sdb9 Feb 13 10:16:00.013540 extend-filesystems[1427]: Checking size of /dev/sdb9 Feb 13 10:16:00.013540 extend-filesystems[1427]: Resized partition /dev/sdb9 Feb 13 10:16:00.177511 kernel: EXT4-fs (sdb9): resizing filesystem from 553472 to 116605649 blocks Feb 13 10:16:00.177538 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 13 10:16:00.177675 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 10:16:00.177693 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Feb 13 10:16:00.177708 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Feb 13 10:16:00.177727 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Feb 13 10:16:00.177757 coreos-metadata[1421]: Feb 13 10:16:00.006 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 10:16:00.006519 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 10:16:00.177956 extend-filesystems[1438]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 10:16:00.007162 systemd[1]: Starting motdgen.service... Feb 13 10:16:00.033181 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 10:16:00.058868 systemd[1]: Starting sshd-keygen.service... Feb 13 10:16:00.072684 systemd-networkd[1299]: enp1s0f1np1: Link UP Feb 13 10:16:00.192935 update_engine[1454]: I0213 10:16:00.179574 1454 main.cc:92] Flatcar Update Engine starting Feb 13 10:16:00.192935 update_engine[1454]: I0213 10:16:00.182786 1454 update_check_scheduler.cc:74] Next update check in 8m56s Feb 13 10:16:00.072883 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:00.193145 jq[1455]: true Feb 13 10:16:00.072980 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:00.072995 systemd-networkd[1299]: enp1s0f1np1: Gained carrier Feb 13 10:16:00.100854 systemd[1]: Starting systemd-logind.service... Feb 13 10:16:00.103618 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:00.103669 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:00.103749 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:00.117509 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 10:16:00.118055 systemd[1]: Starting tcsd.service... Feb 13 10:16:00.121085 systemd-logind[1452]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 10:16:00.121094 systemd-logind[1452]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 10:16:00.121105 systemd-logind[1452]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 10:16:00.121207 systemd-logind[1452]: New seat seat0. Feb 13 10:16:00.135794 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 10:16:00.136151 systemd[1]: Starting update-engine.service... Feb 13 10:16:00.154036 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 10:16:00.169809 systemd[1]: Started dbus.service. Feb 13 10:16:00.186186 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 10:16:00.186277 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 10:16:00.186425 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 10:16:00.186506 systemd[1]: Finished motdgen.service. Feb 13 10:16:00.199826 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 10:16:00.199903 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 10:16:00.209999 jq[1457]: true Feb 13 10:16:00.211057 dbus-daemon[1424]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 10:16:00.215179 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 10:16:00.215278 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 10:16:00.218012 systemd[1]: Started update-engine.service. Feb 13 10:16:00.220041 env[1458]: time="2024-02-13T10:16:00.220020584Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 10:16:00.228108 env[1458]: time="2024-02-13T10:16:00.228093885Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 10:16:00.228163 env[1458]: time="2024-02-13T10:16:00.228154426Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 10:16:00.228995 env[1458]: time="2024-02-13T10:16:00.228936492Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 10:16:00.229033 env[1458]: time="2024-02-13T10:16:00.228997118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 10:16:00.230582 systemd[1]: Started systemd-logind.service. Feb 13 10:16:00.230796 env[1458]: time="2024-02-13T10:16:00.230778585Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 10:16:00.230830 env[1458]: time="2024-02-13T10:16:00.230795768Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 10:16:00.230830 env[1458]: time="2024-02-13T10:16:00.230805035Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 10:16:00.230830 env[1458]: time="2024-02-13T10:16:00.230810778Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 10:16:00.230897 env[1458]: time="2024-02-13T10:16:00.230852504Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 10:16:00.232914 env[1458]: time="2024-02-13T10:16:00.232903410Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 10:16:00.232985 env[1458]: time="2024-02-13T10:16:00.232974672Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 10:16:00.233013 env[1458]: time="2024-02-13T10:16:00.232987303Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 10:16:00.233035 env[1458]: time="2024-02-13T10:16:00.233016491Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 10:16:00.233035 env[1458]: time="2024-02-13T10:16:00.233024319Z" level=info msg="metadata content store policy set" policy=shared Feb 13 10:16:00.239264 bash[1481]: Updated "/home/core/.ssh/authorized_keys" Feb 13 10:16:00.240113 systemd[1]: Started locksmithd.service. Feb 13 10:16:00.244035 env[1458]: time="2024-02-13T10:16:00.244022173Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 10:16:00.244077 env[1458]: time="2024-02-13T10:16:00.244037404Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 10:16:00.244077 env[1458]: time="2024-02-13T10:16:00.244045623Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 10:16:00.244077 env[1458]: time="2024-02-13T10:16:00.244061460Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244077 env[1458]: time="2024-02-13T10:16:00.244069333Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244077 env[1458]: time="2024-02-13T10:16:00.244076932Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244084006Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244091351Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244097857Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244104922Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244111870Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244118134Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 10:16:00.244195 env[1458]: time="2024-02-13T10:16:00.244163947Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 10:16:00.244354 env[1458]: time="2024-02-13T10:16:00.244210827Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 10:16:00.244354 env[1458]: time="2024-02-13T10:16:00.244337971Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 10:16:00.244354 env[1458]: time="2024-02-13T10:16:00.244352502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244360271Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244389911Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244397675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244404468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244410341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244417028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244424 env[1458]: time="2024-02-13T10:16:00.244423498Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244429830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244435517Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244442219Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244510386Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244521036Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244527792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244534023Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244542134Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244548072Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244557788Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 10:16:00.244593 env[1458]: time="2024-02-13T10:16:00.244579397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 10:16:00.244852 env[1458]: time="2024-02-13T10:16:00.244686024Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 10:16:00.244852 env[1458]: time="2024-02-13T10:16:00.244716779Z" level=info msg="Connect containerd service" Feb 13 10:16:00.244852 env[1458]: time="2024-02-13T10:16:00.244735049Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.244997519Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245093111Z" level=info msg="Start subscribing containerd event" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245109350Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245122961Z" level=info msg="Start recovering state" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245131495Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245154420Z" level=info msg="containerd successfully booted in 0.025468s" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245156797Z" level=info msg="Start event monitor" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245163964Z" level=info msg="Start snapshots syncer" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245168877Z" level=info msg="Start cni network conf syncer for default" Feb 13 10:16:00.247031 env[1458]: time="2024-02-13T10:16:00.245177629Z" level=info msg="Start streaming server" Feb 13 10:16:00.246635 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 10:16:00.246772 systemd[1]: Reached target system-config.target. Feb 13 10:16:00.254583 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 10:16:00.254696 systemd[1]: Reached target user-config.target. Feb 13 10:16:00.263981 systemd[1]: Started containerd.service. Feb 13 10:16:00.270754 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 10:16:00.295462 locksmithd[1492]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 10:16:00.412689 sshd_keygen[1451]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 10:16:00.424476 systemd[1]: Finished sshd-keygen.service. Feb 13 10:16:00.432375 systemd[1]: Starting issuegen.service... Feb 13 10:16:00.439743 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 10:16:00.439817 systemd[1]: Finished issuegen.service. Feb 13 10:16:00.447305 systemd[1]: Starting systemd-user-sessions.service... Feb 13 10:16:00.455782 systemd[1]: Finished systemd-user-sessions.service. Feb 13 10:16:00.464224 systemd[1]: Started getty@tty1.service. Feb 13 10:16:00.471187 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 10:16:00.479626 systemd[1]: Reached target getty.target. Feb 13 10:16:00.493473 kernel: EXT4-fs (sdb9): resized filesystem to 116605649 Feb 13 10:16:00.524363 extend-filesystems[1438]: Filesystem at /dev/sdb9 is mounted on /; on-line resizing required Feb 13 10:16:00.524363 extend-filesystems[1438]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 10:16:00.524363 extend-filesystems[1438]: The filesystem on /dev/sdb9 is now 116605649 (4k) blocks long. Feb 13 10:16:00.564509 extend-filesystems[1427]: Resized filesystem in /dev/sdb9 Feb 13 10:16:00.524754 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 10:16:00.524837 systemd[1]: Finished extend-filesystems.service. Feb 13 10:16:00.824628 systemd-networkd[1299]: bond0: Gained IPv6LL Feb 13 10:16:00.824873 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:01.209678 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:01.210133 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:01.213080 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 10:16:01.224421 systemd[1]: Reached target network-online.target. Feb 13 10:16:03.307649 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 10:16:05.494547 login[1516]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 10:16:05.501346 login[1515]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 10:16:05.503053 systemd-logind[1452]: New session 1 of user core. Feb 13 10:16:05.503640 systemd[1]: Created slice user-500.slice. Feb 13 10:16:05.504264 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 10:16:05.505578 systemd-logind[1452]: New session 2 of user core. Feb 13 10:16:05.509635 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 10:16:05.510306 systemd[1]: Starting user@500.service... Feb 13 10:16:05.512180 (systemd)[1521]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:05.583769 systemd[1521]: Queued start job for default target default.target. Feb 13 10:16:05.583998 systemd[1521]: Reached target paths.target. Feb 13 10:16:05.584009 systemd[1521]: Reached target sockets.target. Feb 13 10:16:05.584017 systemd[1521]: Reached target timers.target. Feb 13 10:16:05.584024 systemd[1521]: Reached target basic.target. Feb 13 10:16:05.584042 systemd[1521]: Reached target default.target. Feb 13 10:16:05.584056 systemd[1521]: Startup finished in 68ms. Feb 13 10:16:05.584103 systemd[1]: Started user@500.service. Feb 13 10:16:05.584677 systemd[1]: Started session-1.scope. Feb 13 10:16:05.585013 systemd[1]: Started session-2.scope. Feb 13 10:16:06.046874 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 13 10:16:06.047027 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 13 10:16:06.137911 coreos-metadata[1421]: Feb 13 10:16:06.137 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 10:16:06.138716 coreos-metadata[1418]: Feb 13 10:16:06.137 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 10:16:06.722852 systemd[1]: Created slice system-sshd.slice. Feb 13 10:16:06.723515 systemd[1]: Started sshd@0-139.178.70.43:22-139.178.68.195:55812.service. Feb 13 10:16:06.791242 sshd[1542]: Accepted publickey for core from 139.178.68.195 port 55812 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:06.792464 sshd[1542]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:06.796660 systemd-logind[1452]: New session 3 of user core. Feb 13 10:16:06.797653 systemd[1]: Started session-3.scope. Feb 13 10:16:06.855856 systemd[1]: Started sshd@1-139.178.70.43:22-139.178.68.195:55814.service. Feb 13 10:16:06.892763 sshd[1547]: Accepted publickey for core from 139.178.68.195 port 55814 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:06.893433 sshd[1547]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:06.895776 systemd-logind[1452]: New session 4 of user core. Feb 13 10:16:06.896185 systemd[1]: Started session-4.scope. Feb 13 10:16:06.946612 sshd[1547]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:06.948044 systemd[1]: sshd@1-139.178.70.43:22-139.178.68.195:55814.service: Deactivated successfully. Feb 13 10:16:06.948350 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 10:16:06.948725 systemd-logind[1452]: Session 4 logged out. Waiting for processes to exit. Feb 13 10:16:06.949197 systemd[1]: Started sshd@2-139.178.70.43:22-139.178.68.195:55822.service. Feb 13 10:16:06.949575 systemd-logind[1452]: Removed session 4. Feb 13 10:16:06.986905 sshd[1553]: Accepted publickey for core from 139.178.68.195 port 55822 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:06.988099 sshd[1553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:06.992288 systemd-logind[1452]: New session 5 of user core. Feb 13 10:16:06.993307 systemd[1]: Started session-5.scope. Feb 13 10:16:07.061243 sshd[1553]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:07.066424 systemd[1]: sshd@2-139.178.70.43:22-139.178.68.195:55822.service: Deactivated successfully. Feb 13 10:16:07.068014 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 10:16:07.069622 systemd-logind[1452]: Session 5 logged out. Waiting for processes to exit. Feb 13 10:16:07.071756 systemd-logind[1452]: Removed session 5. Feb 13 10:16:07.138408 coreos-metadata[1421]: Feb 13 10:16:07.138 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 10:16:07.139160 coreos-metadata[1418]: Feb 13 10:16:07.138 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 10:16:07.166213 coreos-metadata[1421]: Feb 13 10:16:07.166 INFO Fetch successful Feb 13 10:16:07.166551 coreos-metadata[1418]: Feb 13 10:16:07.166 INFO Fetch successful Feb 13 10:16:07.190724 systemd[1]: Finished coreos-metadata.service. Feb 13 10:16:07.191330 unknown[1418]: wrote ssh authorized keys file for user: core Feb 13 10:16:07.191465 systemd[1]: Starting etcd-member.service... Feb 13 10:16:07.192170 systemd[1]: Started packet-phone-home.service. Feb 13 10:16:07.202767 curl[1561]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 10:16:07.202767 curl[1561]: Dload Upload Total Spent Left Speed Feb 13 10:16:07.206294 update-ssh-keys[1562]: Updated "/home/core/.ssh/authorized_keys" Feb 13 10:16:07.206790 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 10:16:07.214089 systemd[1]: Starting docker.service... Feb 13 10:16:07.231545 env[1577]: time="2024-02-13T10:16:07.231489948Z" level=info msg="Starting up" Feb 13 10:16:07.232118 env[1577]: time="2024-02-13T10:16:07.232078693Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 10:16:07.232118 env[1577]: time="2024-02-13T10:16:07.232088190Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 10:16:07.232118 env[1577]: time="2024-02-13T10:16:07.232102230Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 10:16:07.232118 env[1577]: time="2024-02-13T10:16:07.232108402Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 10:16:07.232899 env[1577]: time="2024-02-13T10:16:07.232888837Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 10:16:07.232899 env[1577]: time="2024-02-13T10:16:07.232897153Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 10:16:07.232941 env[1577]: time="2024-02-13T10:16:07.232904703Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 10:16:07.232941 env[1577]: time="2024-02-13T10:16:07.232909960Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 10:16:07.246840 env[1577]: time="2024-02-13T10:16:07.246778385Z" level=info msg="Loading containers: start." Feb 13 10:16:07.365579 kernel: Initializing XFRM netlink socket Feb 13 10:16:07.370986 curl[1561]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 10:16:07.373204 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 10:16:07.409627 env[1577]: time="2024-02-13T10:16:07.409582047Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 10:16:07.410407 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:07.410500 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:07.413908 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:07.414052 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:07.462619 systemd-networkd[1299]: docker0: Link UP Feb 13 10:16:07.462869 systemd-timesyncd[1410]: Network configuration changed, trying to establish connection. Feb 13 10:16:07.469841 env[1577]: time="2024-02-13T10:16:07.469790677Z" level=info msg="Loading containers: done." Feb 13 10:16:07.479752 env[1577]: time="2024-02-13T10:16:07.479685199Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 10:16:07.479926 env[1577]: time="2024-02-13T10:16:07.479877546Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 10:16:07.480007 env[1577]: time="2024-02-13T10:16:07.479987425Z" level=info msg="Daemon has completed initialization" Feb 13 10:16:07.480817 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck827732449-merged.mount: Deactivated successfully. Feb 13 10:16:07.521346 systemd[1]: Started docker.service. Feb 13 10:16:07.536359 env[1577]: time="2024-02-13T10:16:07.536223186Z" level=info msg="API listen on /run/docker.sock" Feb 13 10:16:07.538221 etcd-wrapper[1566]: Error response from daemon: No such container: etcd-member Feb 13 10:16:07.582348 etcd-wrapper[1701]: Error: No such container: etcd-member Feb 13 10:16:07.656345 etcd-wrapper[1724]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Feb 13 10:16:08.918717 etcd-wrapper[1724]: v3.5.0: Pulling from coreos/etcd Feb 13 10:16:09.243023 etcd-wrapper[1724]: 1813d21adc01: Pulling fs layer Feb 13 10:16:09.243023 etcd-wrapper[1724]: 6e96907ab677: Pulling fs layer Feb 13 10:16:09.243023 etcd-wrapper[1724]: 444ed0ea8673: Pulling fs layer Feb 13 10:16:09.243023 etcd-wrapper[1724]: 0fd2df5633f0: Pulling fs layer Feb 13 10:16:09.243023 etcd-wrapper[1724]: 8cc22b9456bb: Pulling fs layer Feb 13 10:16:09.243023 etcd-wrapper[1724]: 7ac70aecd290: Pulling fs layer Feb 13 10:16:09.244053 etcd-wrapper[1724]: 4b376c64dfe4: Pulling fs layer Feb 13 10:16:09.244053 etcd-wrapper[1724]: 0fd2df5633f0: Waiting Feb 13 10:16:09.244053 etcd-wrapper[1724]: 8cc22b9456bb: Waiting Feb 13 10:16:09.614881 etcd-wrapper[1724]: 444ed0ea8673: Verifying Checksum Feb 13 10:16:09.614881 etcd-wrapper[1724]: 444ed0ea8673: Download complete Feb 13 10:16:09.620531 etcd-wrapper[1724]: 6e96907ab677: Verifying Checksum Feb 13 10:16:09.620531 etcd-wrapper[1724]: 6e96907ab677: Download complete Feb 13 10:16:09.656404 etcd-wrapper[1724]: 1813d21adc01: Verifying Checksum Feb 13 10:16:09.656404 etcd-wrapper[1724]: 1813d21adc01: Download complete Feb 13 10:16:09.928587 etcd-wrapper[1724]: 8cc22b9456bb: Download complete Feb 13 10:16:09.934058 etcd-wrapper[1724]: 0fd2df5633f0: Verifying Checksum Feb 13 10:16:09.934058 etcd-wrapper[1724]: 0fd2df5633f0: Download complete Feb 13 10:16:09.970119 etcd-wrapper[1724]: 7ac70aecd290: Verifying Checksum Feb 13 10:16:09.970119 etcd-wrapper[1724]: 7ac70aecd290: Download complete Feb 13 10:16:10.134734 etcd-wrapper[1724]: 1813d21adc01: Pull complete Feb 13 10:16:10.235350 etcd-wrapper[1724]: 4b376c64dfe4: Verifying Checksum Feb 13 10:16:10.235350 etcd-wrapper[1724]: 4b376c64dfe4: Download complete Feb 13 10:16:10.326604 systemd[1]: var-lib-docker-overlay2-377386e1b5866ba0c053107ab1eefe3f1dd58e65bf3226822d7a4942167cfde2-merged.mount: Deactivated successfully. Feb 13 10:16:10.594970 etcd-wrapper[1724]: 6e96907ab677: Pull complete Feb 13 10:16:10.746940 systemd[1]: var-lib-docker-overlay2-6c966df13bc6f44f9c014cfd79185a68f58238148a74316a19fdadb8bba574af-merged.mount: Deactivated successfully. Feb 13 10:16:10.818090 etcd-wrapper[1724]: 444ed0ea8673: Pull complete Feb 13 10:16:11.026104 etcd-wrapper[1724]: 0fd2df5633f0: Pull complete Feb 13 10:16:11.102569 etcd-wrapper[1724]: 8cc22b9456bb: Pull complete Feb 13 10:16:11.128887 etcd-wrapper[1724]: 7ac70aecd290: Pull complete Feb 13 10:16:11.137036 systemd[1]: var-lib-docker-overlay2-6de73b10317323c1f361deccf1323909b3970aa93d9b781f706e4f6977064e61-merged.mount: Deactivated successfully. Feb 13 10:16:11.148878 systemd[1]: var-lib-docker-overlay2-9b3ef1172f64b3875691d0cb7825698bd9f81fd5dd2e36c78f4cd7b9a059b32c-merged.mount: Deactivated successfully. Feb 13 10:16:11.151601 etcd-wrapper[1724]: 4b376c64dfe4: Pull complete Feb 13 10:16:11.154291 etcd-wrapper[1724]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Feb 13 10:16:11.155207 etcd-wrapper[1724]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Feb 13 10:16:11.158540 systemd[1]: var-lib-docker-overlay2-f5e6c7d3b6e5c07ebb7b0a94a0ec54ba0442ad0f8245da9dcb1abafec8820079\x2dinit-merged.mount: Deactivated successfully. Feb 13 10:16:11.194610 env[1458]: time="2024-02-13T10:16:11.194573323Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 10:16:11.194610 env[1458]: time="2024-02-13T10:16:11.194598860Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 10:16:11.194868 env[1458]: time="2024-02-13T10:16:11.194611637Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 10:16:11.194868 env[1458]: time="2024-02-13T10:16:11.194683308Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/95b55f53baa8fbeb5d00484375d703c593ce0755f9ab56a050781a8a59490c58 pid=1900 runtime=io.containerd.runc.v2 Feb 13 10:16:11.200737 systemd[1]: Started docker-95b55f53baa8fbeb5d00484375d703c593ce0755f9ab56a050781a8a59490c58.scope. Feb 13 10:16:11.235779 etcd-wrapper[1724]: {"level":"info","ts":1707819371.2356253,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Feb 13 10:16:11.235779 etcd-wrapper[1724]: {"level":"info","ts":1707819371.2356756,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"309e73d6af774bfdbaa5827581236c04"} Feb 13 10:16:11.235779 etcd-wrapper[1724]: {"level":"warn","ts":1707819371.2356958,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Feb 13 10:16:11.235779 etcd-wrapper[1724]: {"level":"warn","ts":1707819371.235701,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Feb 13 10:16:11.235779 etcd-wrapper[1724]: {"level":"warn","ts":1707819371.2357054,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Feb 13 10:16:11.235779 etcd-wrapper[1724]: {"level":"warn","ts":1707819371.2357092,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Feb 13 10:16:11.236067 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.235Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-peer-urls=http://10.67.80.63:2380","--listen-client-urls=http://0.0.0.0:2379","--initial-advertise-peer-urls=http://10.67.80.63:2380","--advertise-client-urls=http://10.67.80.63:2379","--discovery=https://discovery.etcd.io/7ce2c371c2456b26d7592abb899146a8"]} Feb 13 10:16:11.236067 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.235Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://10.67.80.63:2380"]} Feb 13 10:16:11.236067 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.235Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Feb 13 10:16:11.236155 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.235Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"309e73d6af774bfdbaa5827581236c04","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://10.67.80.63:2380"],"listen-peer-urls":["http://10.67.80.63:2380"],"advertise-client-urls":["http://10.67.80.63:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"309e73d6af774bfdbaa5827581236c04=http://10.67.80.63:2380","initial-cluster-state":"new","initial-cluster-token":"https://discovery.etcd.io/7ce2c371c2456b26d7592abb899146a8","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"https://discovery.etcd.io/7ce2c371c2456b26d7592abb899146a8","discovery-proxy":"","downgrade-check-interval":"5s"} Feb 13 10:16:11.237034 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.236Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"735.929µs"} Feb 13 10:16:11.773862 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.773Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"83f86b6f5ec2fb21"} Feb 13 10:16:11.773862 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.773Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"83dfd9cf481830e7"} Feb 13 10:16:11.773862 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:16:11.773Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Feb 13 10:16:17.069580 systemd[1]: Started sshd@3-139.178.70.43:22-139.178.68.195:59784.service. Feb 13 10:16:17.106847 sshd[1950]: Accepted publickey for core from 139.178.68.195 port 59784 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:17.107724 sshd[1950]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:17.110677 systemd-logind[1452]: New session 6 of user core. Feb 13 10:16:17.111309 systemd[1]: Started session-6.scope. Feb 13 10:16:17.165138 sshd[1950]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:17.166845 systemd[1]: sshd@3-139.178.70.43:22-139.178.68.195:59784.service: Deactivated successfully. Feb 13 10:16:17.167172 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 10:16:17.167446 systemd-logind[1452]: Session 6 logged out. Waiting for processes to exit. Feb 13 10:16:17.168019 systemd[1]: Started sshd@4-139.178.70.43:22-139.178.68.195:59798.service. Feb 13 10:16:17.168395 systemd-logind[1452]: Removed session 6. Feb 13 10:16:17.205600 sshd[1956]: Accepted publickey for core from 139.178.68.195 port 59798 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:17.206229 sshd[1956]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:17.208503 systemd-logind[1452]: New session 7 of user core. Feb 13 10:16:17.208958 systemd[1]: Started session-7.scope. Feb 13 10:16:17.260647 sshd[1956]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:17.263459 systemd[1]: sshd@4-139.178.70.43:22-139.178.68.195:59798.service: Deactivated successfully. Feb 13 10:16:17.264383 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 10:16:17.265319 systemd-logind[1452]: Session 7 logged out. Waiting for processes to exit. Feb 13 10:16:17.266547 systemd-logind[1452]: Removed session 7. Feb 13 10:16:27.269674 systemd[1]: Started sshd@5-139.178.70.43:22-139.178.68.195:41254.service. Feb 13 10:16:27.306975 sshd[1962]: Accepted publickey for core from 139.178.68.195 port 41254 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:27.307835 sshd[1962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:27.310872 systemd-logind[1452]: New session 8 of user core. Feb 13 10:16:27.311428 systemd[1]: Started session-8.scope. Feb 13 10:16:27.365206 sshd[1962]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:27.366772 systemd[1]: sshd@5-139.178.70.43:22-139.178.68.195:41254.service: Deactivated successfully. Feb 13 10:16:27.367075 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 10:16:27.367381 systemd-logind[1452]: Session 8 logged out. Waiting for processes to exit. Feb 13 10:16:27.367939 systemd[1]: Started sshd@6-139.178.70.43:22-139.178.68.195:41268.service. Feb 13 10:16:27.368413 systemd-logind[1452]: Removed session 8. Feb 13 10:16:27.405231 sshd[1968]: Accepted publickey for core from 139.178.68.195 port 41268 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:27.406133 sshd[1968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:27.409277 systemd-logind[1452]: New session 9 of user core. Feb 13 10:16:27.409982 systemd[1]: Started session-9.scope. Feb 13 10:16:27.473358 sshd[1968]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:27.478592 systemd[1]: sshd@6-139.178.70.43:22-139.178.68.195:41268.service: Deactivated successfully. Feb 13 10:16:27.480247 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 10:16:27.481958 systemd-logind[1452]: Session 9 logged out. Waiting for processes to exit. Feb 13 10:16:27.484086 systemd-logind[1452]: Removed session 9. Feb 13 10:16:37.482049 systemd[1]: Started sshd@7-139.178.70.43:22-139.178.68.195:47004.service. Feb 13 10:16:37.519242 sshd[1974]: Accepted publickey for core from 139.178.68.195 port 47004 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:37.520120 sshd[1974]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:37.523285 systemd-logind[1452]: New session 10 of user core. Feb 13 10:16:37.524080 systemd[1]: Started session-10.scope. Feb 13 10:16:37.579938 sshd[1974]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:37.581737 systemd[1]: sshd@7-139.178.70.43:22-139.178.68.195:47004.service: Deactivated successfully. Feb 13 10:16:37.582060 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 10:16:37.582369 systemd-logind[1452]: Session 10 logged out. Waiting for processes to exit. Feb 13 10:16:37.582912 systemd[1]: Started sshd@8-139.178.70.43:22-139.178.68.195:47012.service. Feb 13 10:16:37.583363 systemd-logind[1452]: Removed session 10. Feb 13 10:16:37.620349 sshd[1980]: Accepted publickey for core from 139.178.68.195 port 47012 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:37.621169 sshd[1980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:37.624075 systemd-logind[1452]: New session 11 of user core. Feb 13 10:16:37.624686 systemd[1]: Started session-11.scope. Feb 13 10:16:37.678401 sshd[1980]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:37.679775 systemd[1]: sshd@8-139.178.70.43:22-139.178.68.195:47012.service: Deactivated successfully. Feb 13 10:16:37.680155 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 10:16:37.680423 systemd-logind[1452]: Session 11 logged out. Waiting for processes to exit. Feb 13 10:16:37.681036 systemd-logind[1452]: Removed session 11. Feb 13 10:16:37.992319 systemd-timesyncd[1410]: Contacted time server [2604:2dc0:100:380e::]:123 (2.flatcar.pool.ntp.org). Feb 13 10:16:37.992464 systemd-timesyncd[1410]: Initial clock synchronization to Tue 2024-02-13 10:16:37.862439 UTC. Feb 13 10:16:45.931846 update_engine[1454]: I0213 10:16:45.931731 1454 update_attempter.cc:509] Updating boot flags... Feb 13 10:16:47.593615 systemd[1]: Started sshd@9-139.178.70.43:22-139.178.68.195:59386.service. Feb 13 10:16:47.630779 sshd[2006]: Accepted publickey for core from 139.178.68.195 port 59386 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:47.631712 sshd[2006]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:47.634998 systemd-logind[1452]: New session 12 of user core. Feb 13 10:16:47.635660 systemd[1]: Started session-12.scope. Feb 13 10:16:47.690764 sshd[2006]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:47.692335 systemd[1]: sshd@9-139.178.70.43:22-139.178.68.195:59386.service: Deactivated successfully. Feb 13 10:16:47.692659 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 10:16:47.692985 systemd-logind[1452]: Session 12 logged out. Waiting for processes to exit. Feb 13 10:16:47.693585 systemd[1]: Started sshd@10-139.178.70.43:22-139.178.68.195:59394.service. Feb 13 10:16:47.694022 systemd-logind[1452]: Removed session 12. Feb 13 10:16:47.785301 sshd[2012]: Accepted publickey for core from 139.178.68.195 port 59394 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:47.788434 sshd[2012]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:47.798338 systemd-logind[1452]: New session 13 of user core. Feb 13 10:16:47.800732 systemd[1]: Started session-13.scope. Feb 13 10:16:47.879283 sshd[2012]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:47.885037 systemd[1]: sshd@10-139.178.70.43:22-139.178.68.195:59394.service: Deactivated successfully. Feb 13 10:16:47.886867 systemd[1]: session-13.scope: Deactivated successfully. Feb 13 10:16:47.888572 systemd-logind[1452]: Session 13 logged out. Waiting for processes to exit. Feb 13 10:16:47.890713 systemd-logind[1452]: Removed session 13. Feb 13 10:16:51.101611 systemd[1]: Started sshd@11-139.178.70.43:22-49.43.249.179:53535.service. Feb 13 10:16:52.218205 sshd[2018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:16:53.622226 sshd[2018]: Failed password for root from 49.43.249.179 port 53535 ssh2 Feb 13 10:16:54.088889 sshd[2018]: Received disconnect from 49.43.249.179 port 53535:11: Bye Bye [preauth] Feb 13 10:16:54.088889 sshd[2018]: Disconnected from authenticating user root 49.43.249.179 port 53535 [preauth] Feb 13 10:16:54.091372 systemd[1]: sshd@11-139.178.70.43:22-49.43.249.179:53535.service: Deactivated successfully. Feb 13 10:16:57.862548 systemd[1]: Started sshd@12-139.178.70.43:22-139.178.68.195:42598.service. Feb 13 10:16:57.899464 sshd[2022]: Accepted publickey for core from 139.178.68.195 port 42598 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:57.900060 sshd[2022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:57.902183 systemd-logind[1452]: New session 14 of user core. Feb 13 10:16:57.902753 systemd[1]: Started session-14.scope. Feb 13 10:16:57.954095 sshd[2022]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:57.955858 systemd[1]: sshd@12-139.178.70.43:22-139.178.68.195:42598.service: Deactivated successfully. Feb 13 10:16:57.956227 systemd[1]: session-14.scope: Deactivated successfully. Feb 13 10:16:57.956619 systemd-logind[1452]: Session 14 logged out. Waiting for processes to exit. Feb 13 10:16:57.957126 systemd[1]: Started sshd@13-139.178.70.43:22-139.178.68.195:42606.service. Feb 13 10:16:57.957515 systemd-logind[1452]: Removed session 14. Feb 13 10:16:57.994369 sshd[2028]: Accepted publickey for core from 139.178.68.195 port 42606 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:16:57.995200 sshd[2028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:16:57.998160 systemd-logind[1452]: New session 15 of user core. Feb 13 10:16:57.998764 systemd[1]: Started session-15.scope. Feb 13 10:16:58.063192 sshd[2028]: pam_unix(sshd:session): session closed for user core Feb 13 10:16:58.068642 systemd[1]: sshd@13-139.178.70.43:22-139.178.68.195:42606.service: Deactivated successfully. Feb 13 10:16:58.070292 systemd[1]: session-15.scope: Deactivated successfully. Feb 13 10:16:58.071949 systemd-logind[1452]: Session 15 logged out. Waiting for processes to exit. Feb 13 10:16:58.074090 systemd-logind[1452]: Removed session 15. Feb 13 10:17:08.065747 systemd[1]: Started sshd@14-139.178.70.43:22-139.178.68.195:50484.service. Feb 13 10:17:08.102759 sshd[2034]: Accepted publickey for core from 139.178.68.195 port 50484 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:08.103386 sshd[2034]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:08.105748 systemd-logind[1452]: New session 16 of user core. Feb 13 10:17:08.106207 systemd[1]: Started session-16.scope. Feb 13 10:17:08.157699 sshd[2034]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:08.159303 systemd[1]: sshd@14-139.178.70.43:22-139.178.68.195:50484.service: Deactivated successfully. Feb 13 10:17:08.159714 systemd[1]: session-16.scope: Deactivated successfully. Feb 13 10:17:08.160135 systemd-logind[1452]: Session 16 logged out. Waiting for processes to exit. Feb 13 10:17:08.160670 systemd[1]: Started sshd@15-139.178.70.43:22-139.178.68.195:50498.service. Feb 13 10:17:08.161139 systemd-logind[1452]: Removed session 16. Feb 13 10:17:08.197869 sshd[2040]: Accepted publickey for core from 139.178.68.195 port 50498 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:08.198511 sshd[2040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:08.200835 systemd-logind[1452]: New session 17 of user core. Feb 13 10:17:08.201266 systemd[1]: Started session-17.scope. Feb 13 10:17:08.251967 sshd[2040]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:08.253111 systemd[1]: sshd@15-139.178.70.43:22-139.178.68.195:50498.service: Deactivated successfully. Feb 13 10:17:08.253539 systemd[1]: session-17.scope: Deactivated successfully. Feb 13 10:17:08.253922 systemd-logind[1452]: Session 17 logged out. Waiting for processes to exit. Feb 13 10:17:08.254402 systemd-logind[1452]: Removed session 17. Feb 13 10:17:18.262621 systemd[1]: Started sshd@16-139.178.70.43:22-139.178.68.195:44178.service. Feb 13 10:17:18.299873 sshd[2046]: Accepted publickey for core from 139.178.68.195 port 44178 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:18.300529 sshd[2046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:18.302652 systemd-logind[1452]: New session 18 of user core. Feb 13 10:17:18.303141 systemd[1]: Started session-18.scope. Feb 13 10:17:18.355026 sshd[2046]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:18.356676 systemd[1]: sshd@16-139.178.70.43:22-139.178.68.195:44178.service: Deactivated successfully. Feb 13 10:17:18.357054 systemd[1]: session-18.scope: Deactivated successfully. Feb 13 10:17:18.357354 systemd-logind[1452]: Session 18 logged out. Waiting for processes to exit. Feb 13 10:17:18.357882 systemd[1]: Started sshd@17-139.178.70.43:22-139.178.68.195:44192.service. Feb 13 10:17:18.358284 systemd-logind[1452]: Removed session 18. Feb 13 10:17:18.395193 sshd[2052]: Accepted publickey for core from 139.178.68.195 port 44192 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:18.396017 sshd[2052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:18.398870 systemd-logind[1452]: New session 19 of user core. Feb 13 10:17:18.399438 systemd[1]: Started session-19.scope. Feb 13 10:17:18.453274 sshd[2052]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:18.454476 systemd[1]: sshd@17-139.178.70.43:22-139.178.68.195:44192.service: Deactivated successfully. Feb 13 10:17:18.454865 systemd[1]: session-19.scope: Deactivated successfully. Feb 13 10:17:18.455223 systemd-logind[1452]: Session 19 logged out. Waiting for processes to exit. Feb 13 10:17:18.455868 systemd-logind[1452]: Removed session 19. Feb 13 10:17:28.464402 systemd[1]: Started sshd@18-139.178.70.43:22-139.178.68.195:33850.service. Feb 13 10:17:28.501646 sshd[2058]: Accepted publickey for core from 139.178.68.195 port 33850 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:28.502264 sshd[2058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:28.504790 systemd-logind[1452]: New session 20 of user core. Feb 13 10:17:28.505167 systemd[1]: Started session-20.scope. Feb 13 10:17:28.556689 sshd[2058]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:28.558334 systemd[1]: sshd@18-139.178.70.43:22-139.178.68.195:33850.service: Deactivated successfully. Feb 13 10:17:28.558692 systemd[1]: session-20.scope: Deactivated successfully. Feb 13 10:17:28.559038 systemd-logind[1452]: Session 20 logged out. Waiting for processes to exit. Feb 13 10:17:28.559604 systemd[1]: Started sshd@19-139.178.70.43:22-139.178.68.195:33862.service. Feb 13 10:17:28.560066 systemd-logind[1452]: Removed session 20. Feb 13 10:17:28.596876 sshd[2064]: Accepted publickey for core from 139.178.68.195 port 33862 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:28.597853 sshd[2064]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:28.601233 systemd-logind[1452]: New session 21 of user core. Feb 13 10:17:28.601934 systemd[1]: Started session-21.scope. Feb 13 10:17:28.656735 sshd[2064]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:28.658039 systemd[1]: sshd@19-139.178.70.43:22-139.178.68.195:33862.service: Deactivated successfully. Feb 13 10:17:28.658421 systemd[1]: session-21.scope: Deactivated successfully. Feb 13 10:17:28.658828 systemd-logind[1452]: Session 21 logged out. Waiting for processes to exit. Feb 13 10:17:28.659406 systemd-logind[1452]: Removed session 21. Feb 13 10:17:38.666838 systemd[1]: Started sshd@20-139.178.70.43:22-139.178.68.195:50248.service. Feb 13 10:17:38.704007 sshd[2070]: Accepted publickey for core from 139.178.68.195 port 50248 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:38.705045 sshd[2070]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:38.708481 systemd-logind[1452]: New session 22 of user core. Feb 13 10:17:38.709342 systemd[1]: Started session-22.scope. Feb 13 10:17:38.766333 sshd[2070]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:38.768147 systemd[1]: sshd@20-139.178.70.43:22-139.178.68.195:50248.service: Deactivated successfully. Feb 13 10:17:38.768540 systemd[1]: session-22.scope: Deactivated successfully. Feb 13 10:17:38.768869 systemd-logind[1452]: Session 22 logged out. Waiting for processes to exit. Feb 13 10:17:38.769408 systemd[1]: Started sshd@21-139.178.70.43:22-139.178.68.195:50254.service. Feb 13 10:17:38.769851 systemd-logind[1452]: Removed session 22. Feb 13 10:17:38.806558 sshd[2076]: Accepted publickey for core from 139.178.68.195 port 50254 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:38.807553 sshd[2076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:38.810811 systemd-logind[1452]: New session 23 of user core. Feb 13 10:17:38.811879 systemd[1]: Started session-23.scope. Feb 13 10:17:38.867534 sshd[2076]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:38.868676 systemd[1]: sshd@21-139.178.70.43:22-139.178.68.195:50254.service: Deactivated successfully. Feb 13 10:17:38.869096 systemd[1]: session-23.scope: Deactivated successfully. Feb 13 10:17:38.869401 systemd-logind[1452]: Session 23 logged out. Waiting for processes to exit. Feb 13 10:17:38.869931 systemd-logind[1452]: Removed session 23. Feb 13 10:17:48.878280 systemd[1]: Started sshd@22-139.178.70.43:22-139.178.68.195:43344.service. Feb 13 10:17:48.915864 sshd[2083]: Accepted publickey for core from 139.178.68.195 port 43344 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:48.916518 sshd[2083]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:48.918683 systemd-logind[1452]: New session 24 of user core. Feb 13 10:17:48.919318 systemd[1]: Started session-24.scope. Feb 13 10:17:48.971094 sshd[2083]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:48.972845 systemd[1]: sshd@22-139.178.70.43:22-139.178.68.195:43344.service: Deactivated successfully. Feb 13 10:17:48.973259 systemd[1]: session-24.scope: Deactivated successfully. Feb 13 10:17:48.973605 systemd-logind[1452]: Session 24 logged out. Waiting for processes to exit. Feb 13 10:17:48.974154 systemd[1]: Started sshd@23-139.178.70.43:22-139.178.68.195:43346.service. Feb 13 10:17:48.974616 systemd-logind[1452]: Removed session 24. Feb 13 10:17:49.010962 sshd[2089]: Accepted publickey for core from 139.178.68.195 port 43346 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:49.011779 sshd[2089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:49.014553 systemd-logind[1452]: New session 25 of user core. Feb 13 10:17:49.015415 systemd[1]: Started session-25.scope. Feb 13 10:17:49.076691 sshd[2089]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:49.081993 systemd[1]: sshd@23-139.178.70.43:22-139.178.68.195:43346.service: Deactivated successfully. Feb 13 10:17:49.083810 systemd[1]: session-25.scope: Deactivated successfully. Feb 13 10:17:49.085457 systemd-logind[1452]: Session 25 logged out. Waiting for processes to exit. Feb 13 10:17:49.087592 systemd-logind[1452]: Removed session 25. Feb 13 10:17:59.085388 systemd[1]: Started sshd@24-139.178.70.43:22-139.178.68.195:56050.service. Feb 13 10:17:59.122525 sshd[2095]: Accepted publickey for core from 139.178.68.195 port 56050 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:59.123414 sshd[2095]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:59.126334 systemd-logind[1452]: New session 26 of user core. Feb 13 10:17:59.127275 systemd[1]: Started session-26.scope. Feb 13 10:17:59.182137 sshd[2095]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:59.184042 systemd[1]: sshd@24-139.178.70.43:22-139.178.68.195:56050.service: Deactivated successfully. Feb 13 10:17:59.184410 systemd[1]: session-26.scope: Deactivated successfully. Feb 13 10:17:59.184745 systemd-logind[1452]: Session 26 logged out. Waiting for processes to exit. Feb 13 10:17:59.185295 systemd[1]: Started sshd@25-139.178.70.43:22-139.178.68.195:56066.service. Feb 13 10:17:59.185760 systemd-logind[1452]: Removed session 26. Feb 13 10:17:59.222753 sshd[2101]: Accepted publickey for core from 139.178.68.195 port 56066 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:17:59.223576 sshd[2101]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:17:59.226307 systemd-logind[1452]: New session 27 of user core. Feb 13 10:17:59.227218 systemd[1]: Started session-27.scope. Feb 13 10:17:59.280828 sshd[2101]: pam_unix(sshd:session): session closed for user core Feb 13 10:17:59.282042 systemd[1]: sshd@25-139.178.70.43:22-139.178.68.195:56066.service: Deactivated successfully. Feb 13 10:17:59.282471 systemd[1]: session-27.scope: Deactivated successfully. Feb 13 10:17:59.282818 systemd-logind[1452]: Session 27 logged out. Waiting for processes to exit. Feb 13 10:17:59.283292 systemd-logind[1452]: Removed session 27. Feb 13 10:18:09.290451 systemd[1]: Started sshd@26-139.178.70.43:22-139.178.68.195:49204.service. Feb 13 10:18:09.327970 sshd[2107]: Accepted publickey for core from 139.178.68.195 port 49204 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:09.328966 sshd[2107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:09.332073 systemd-logind[1452]: New session 28 of user core. Feb 13 10:18:09.333126 systemd[1]: Started session-28.scope. Feb 13 10:18:09.388976 sshd[2107]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:09.390634 systemd[1]: sshd@26-139.178.70.43:22-139.178.68.195:49204.service: Deactivated successfully. Feb 13 10:18:09.390992 systemd[1]: session-28.scope: Deactivated successfully. Feb 13 10:18:09.391313 systemd-logind[1452]: Session 28 logged out. Waiting for processes to exit. Feb 13 10:18:09.391905 systemd[1]: Started sshd@27-139.178.70.43:22-139.178.68.195:49210.service. Feb 13 10:18:09.392386 systemd-logind[1452]: Removed session 28. Feb 13 10:18:09.428958 sshd[2113]: Accepted publickey for core from 139.178.68.195 port 49210 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:09.429645 sshd[2113]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:09.432006 systemd-logind[1452]: New session 29 of user core. Feb 13 10:18:09.432716 systemd[1]: Started session-29.scope. Feb 13 10:18:09.485588 sshd[2113]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:09.486828 systemd[1]: sshd@27-139.178.70.43:22-139.178.68.195:49210.service: Deactivated successfully. Feb 13 10:18:09.487248 systemd[1]: session-29.scope: Deactivated successfully. Feb 13 10:18:09.487605 systemd-logind[1452]: Session 29 logged out. Waiting for processes to exit. Feb 13 10:18:09.488126 systemd-logind[1452]: Removed session 29. Feb 13 10:18:19.495669 systemd[1]: Started sshd@28-139.178.70.43:22-139.178.68.195:51142.service. Feb 13 10:18:19.532833 sshd[2122]: Accepted publickey for core from 139.178.68.195 port 51142 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:19.533702 sshd[2122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:19.536755 systemd-logind[1452]: New session 30 of user core. Feb 13 10:18:19.537302 systemd[1]: Started session-30.scope. Feb 13 10:18:19.591378 sshd[2122]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:19.592869 systemd[1]: sshd@28-139.178.70.43:22-139.178.68.195:51142.service: Deactivated successfully. Feb 13 10:18:19.593171 systemd[1]: session-30.scope: Deactivated successfully. Feb 13 10:18:19.593436 systemd-logind[1452]: Session 30 logged out. Waiting for processes to exit. Feb 13 10:18:19.593951 systemd[1]: Started sshd@29-139.178.70.43:22-139.178.68.195:51150.service. Feb 13 10:18:19.594343 systemd-logind[1452]: Removed session 30. Feb 13 10:18:19.631453 sshd[2128]: Accepted publickey for core from 139.178.68.195 port 51150 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:19.632090 sshd[2128]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:19.634657 systemd-logind[1452]: New session 31 of user core. Feb 13 10:18:19.635159 systemd[1]: Started session-31.scope. Feb 13 10:18:19.694498 sshd[2128]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:19.699711 systemd[1]: sshd@29-139.178.70.43:22-139.178.68.195:51150.service: Deactivated successfully. Feb 13 10:18:19.701256 systemd[1]: session-31.scope: Deactivated successfully. Feb 13 10:18:19.702776 systemd-logind[1452]: Session 31 logged out. Waiting for processes to exit. Feb 13 10:18:19.705049 systemd-logind[1452]: Removed session 31. Feb 13 10:18:29.702370 systemd[1]: Started sshd@30-139.178.70.43:22-139.178.68.195:49768.service. Feb 13 10:18:29.739795 sshd[2138]: Accepted publickey for core from 139.178.68.195 port 49768 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:29.740696 sshd[2138]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:29.744006 systemd-logind[1452]: New session 32 of user core. Feb 13 10:18:29.744569 systemd[1]: Started session-32.scope. Feb 13 10:18:29.800115 sshd[2138]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:29.801841 systemd[1]: sshd@30-139.178.70.43:22-139.178.68.195:49768.service: Deactivated successfully. Feb 13 10:18:29.802124 systemd[1]: session-32.scope: Deactivated successfully. Feb 13 10:18:29.802394 systemd-logind[1452]: Session 32 logged out. Waiting for processes to exit. Feb 13 10:18:29.802917 systemd[1]: Started sshd@31-139.178.70.43:22-139.178.68.195:49782.service. Feb 13 10:18:29.803291 systemd-logind[1452]: Removed session 32. Feb 13 10:18:29.839839 sshd[2144]: Accepted publickey for core from 139.178.68.195 port 49782 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:29.840637 sshd[2144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:29.843408 systemd-logind[1452]: New session 33 of user core. Feb 13 10:18:29.843953 systemd[1]: Started session-33.scope. Feb 13 10:18:29.897046 sshd[2144]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:29.898265 systemd[1]: sshd@31-139.178.70.43:22-139.178.68.195:49782.service: Deactivated successfully. Feb 13 10:18:29.898671 systemd[1]: session-33.scope: Deactivated successfully. Feb 13 10:18:29.899073 systemd-logind[1452]: Session 33 logged out. Waiting for processes to exit. Feb 13 10:18:29.899624 systemd-logind[1452]: Removed session 33. Feb 13 10:18:39.905995 systemd[1]: Started sshd@32-139.178.70.43:22-139.178.68.195:36294.service. Feb 13 10:18:39.943204 sshd[2150]: Accepted publickey for core from 139.178.68.195 port 36294 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:39.944192 sshd[2150]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:39.947367 systemd-logind[1452]: New session 34 of user core. Feb 13 10:18:39.948134 systemd[1]: Started session-34.scope. Feb 13 10:18:40.004589 sshd[2150]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:40.006019 systemd[1]: sshd@32-139.178.70.43:22-139.178.68.195:36294.service: Deactivated successfully. Feb 13 10:18:40.006307 systemd[1]: session-34.scope: Deactivated successfully. Feb 13 10:18:40.006721 systemd-logind[1452]: Session 34 logged out. Waiting for processes to exit. Feb 13 10:18:40.007176 systemd[1]: Started sshd@33-139.178.70.43:22-139.178.68.195:36296.service. Feb 13 10:18:40.007505 systemd-logind[1452]: Removed session 34. Feb 13 10:18:40.044581 sshd[2156]: Accepted publickey for core from 139.178.68.195 port 36296 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:40.045488 sshd[2156]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:40.048594 systemd-logind[1452]: New session 35 of user core. Feb 13 10:18:40.049234 systemd[1]: Started session-35.scope. Feb 13 10:18:40.103627 sshd[2156]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:40.104876 systemd[1]: sshd@33-139.178.70.43:22-139.178.68.195:36296.service: Deactivated successfully. Feb 13 10:18:40.105268 systemd[1]: session-35.scope: Deactivated successfully. Feb 13 10:18:40.105699 systemd-logind[1452]: Session 35 logged out. Waiting for processes to exit. Feb 13 10:18:40.106291 systemd-logind[1452]: Removed session 35. Feb 13 10:18:50.112459 systemd[1]: Started sshd@34-139.178.70.43:22-139.178.68.195:50904.service. Feb 13 10:18:50.149815 sshd[2162]: Accepted publickey for core from 139.178.68.195 port 50904 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:50.150429 sshd[2162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:50.152817 systemd-logind[1452]: New session 36 of user core. Feb 13 10:18:50.153241 systemd[1]: Started session-36.scope. Feb 13 10:18:50.204559 sshd[2162]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:50.206280 systemd[1]: sshd@34-139.178.70.43:22-139.178.68.195:50904.service: Deactivated successfully. Feb 13 10:18:50.206657 systemd[1]: session-36.scope: Deactivated successfully. Feb 13 10:18:50.206994 systemd-logind[1452]: Session 36 logged out. Waiting for processes to exit. Feb 13 10:18:50.207561 systemd[1]: Started sshd@35-139.178.70.43:22-139.178.68.195:50920.service. Feb 13 10:18:50.208022 systemd-logind[1452]: Removed session 36. Feb 13 10:18:50.245274 sshd[2168]: Accepted publickey for core from 139.178.68.195 port 50920 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:18:50.246025 sshd[2168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:18:50.248533 systemd-logind[1452]: New session 37 of user core. Feb 13 10:18:50.249042 systemd[1]: Started session-37.scope. Feb 13 10:18:50.311302 sshd[2168]: pam_unix(sshd:session): session closed for user core Feb 13 10:18:50.317089 systemd[1]: sshd@35-139.178.70.43:22-139.178.68.195:50920.service: Deactivated successfully. Feb 13 10:18:50.319029 systemd[1]: session-37.scope: Deactivated successfully. Feb 13 10:18:50.320802 systemd-logind[1452]: Session 37 logged out. Waiting for processes to exit. Feb 13 10:18:50.322893 systemd-logind[1452]: Removed session 37. Feb 13 10:18:56.095456 systemd[1]: Started sshd@36-139.178.70.43:22-186.67.248.6:33035.service. Feb 13 10:18:56.909175 sshd[2174]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:18:59.336877 sshd[2174]: Failed password for root from 186.67.248.6 port 33035 ssh2 Feb 13 10:19:00.320842 systemd[1]: Started sshd@37-139.178.70.43:22-139.178.68.195:53240.service. Feb 13 10:19:00.357976 sshd[2177]: Accepted publickey for core from 139.178.68.195 port 53240 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:00.358703 sshd[2177]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:00.361053 systemd-logind[1452]: New session 38 of user core. Feb 13 10:19:00.361735 systemd[1]: Started session-38.scope. Feb 13 10:19:00.392814 sshd[2174]: Received disconnect from 186.67.248.6 port 33035:11: Bye Bye [preauth] Feb 13 10:19:00.392814 sshd[2174]: Disconnected from authenticating user root 186.67.248.6 port 33035 [preauth] Feb 13 10:19:00.393463 systemd[1]: sshd@36-139.178.70.43:22-186.67.248.6:33035.service: Deactivated successfully. Feb 13 10:19:00.411996 sshd[2177]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:00.413638 systemd[1]: sshd@37-139.178.70.43:22-139.178.68.195:53240.service: Deactivated successfully. Feb 13 10:19:00.413986 systemd[1]: session-38.scope: Deactivated successfully. Feb 13 10:19:00.414297 systemd-logind[1452]: Session 38 logged out. Waiting for processes to exit. Feb 13 10:19:00.414876 systemd[1]: Started sshd@38-139.178.70.43:22-139.178.68.195:53250.service. Feb 13 10:19:00.415310 systemd-logind[1452]: Removed session 38. Feb 13 10:19:00.452169 sshd[2184]: Accepted publickey for core from 139.178.68.195 port 53250 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:00.453060 sshd[2184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:00.456178 systemd-logind[1452]: New session 39 of user core. Feb 13 10:19:00.457172 systemd[1]: Started session-39.scope. Feb 13 10:19:00.511571 sshd[2184]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:00.512668 systemd[1]: sshd@38-139.178.70.43:22-139.178.68.195:53250.service: Deactivated successfully. Feb 13 10:19:00.513036 systemd[1]: session-39.scope: Deactivated successfully. Feb 13 10:19:00.513347 systemd-logind[1452]: Session 39 logged out. Waiting for processes to exit. Feb 13 10:19:00.513957 systemd-logind[1452]: Removed session 39. Feb 13 10:19:10.521442 systemd[1]: Started sshd@39-139.178.70.43:22-139.178.68.195:52846.service. Feb 13 10:19:10.558855 sshd[2190]: Accepted publickey for core from 139.178.68.195 port 52846 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:10.559758 sshd[2190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:10.562851 systemd-logind[1452]: New session 40 of user core. Feb 13 10:19:10.563502 systemd[1]: Started session-40.scope. Feb 13 10:19:10.618730 sshd[2190]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:10.620477 systemd[1]: sshd@39-139.178.70.43:22-139.178.68.195:52846.service: Deactivated successfully. Feb 13 10:19:10.620855 systemd[1]: session-40.scope: Deactivated successfully. Feb 13 10:19:10.621195 systemd-logind[1452]: Session 40 logged out. Waiting for processes to exit. Feb 13 10:19:10.621760 systemd[1]: Started sshd@40-139.178.70.43:22-139.178.68.195:52854.service. Feb 13 10:19:10.622217 systemd-logind[1452]: Removed session 40. Feb 13 10:19:10.659575 sshd[2196]: Accepted publickey for core from 139.178.68.195 port 52854 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:10.660585 sshd[2196]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:10.663876 systemd-logind[1452]: New session 41 of user core. Feb 13 10:19:10.664970 systemd[1]: Started session-41.scope. Feb 13 10:19:10.720555 sshd[2196]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:10.721841 systemd[1]: sshd@40-139.178.70.43:22-139.178.68.195:52854.service: Deactivated successfully. Feb 13 10:19:10.722274 systemd[1]: session-41.scope: Deactivated successfully. Feb 13 10:19:10.722636 systemd-logind[1452]: Session 41 logged out. Waiting for processes to exit. Feb 13 10:19:10.723086 systemd-logind[1452]: Removed session 41. Feb 13 10:19:20.730643 systemd[1]: Started sshd@41-139.178.70.43:22-139.178.68.195:48650.service. Feb 13 10:19:20.767661 sshd[2202]: Accepted publickey for core from 139.178.68.195 port 48650 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:20.768320 sshd[2202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:20.770654 systemd-logind[1452]: New session 42 of user core. Feb 13 10:19:20.771321 systemd[1]: Started session-42.scope. Feb 13 10:19:20.823564 sshd[2202]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:20.824980 systemd[1]: sshd@41-139.178.70.43:22-139.178.68.195:48650.service: Deactivated successfully. Feb 13 10:19:20.825280 systemd[1]: session-42.scope: Deactivated successfully. Feb 13 10:19:20.825605 systemd-logind[1452]: Session 42 logged out. Waiting for processes to exit. Feb 13 10:19:20.826116 systemd[1]: Started sshd@42-139.178.70.43:22-139.178.68.195:48656.service. Feb 13 10:19:20.826479 systemd-logind[1452]: Removed session 42. Feb 13 10:19:20.863262 sshd[2208]: Accepted publickey for core from 139.178.68.195 port 48656 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:20.864145 sshd[2208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:20.867319 systemd-logind[1452]: New session 43 of user core. Feb 13 10:19:20.867984 systemd[1]: Started session-43.scope. Feb 13 10:19:20.931793 sshd[2208]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:20.937022 systemd[1]: sshd@42-139.178.70.43:22-139.178.68.195:48656.service: Deactivated successfully. Feb 13 10:19:20.938722 systemd[1]: session-43.scope: Deactivated successfully. Feb 13 10:19:20.940323 systemd-logind[1452]: Session 43 logged out. Waiting for processes to exit. Feb 13 10:19:20.942501 systemd-logind[1452]: Removed session 43. Feb 13 10:19:30.940192 systemd[1]: Started sshd@43-139.178.70.43:22-139.178.68.195:56702.service. Feb 13 10:19:30.977365 sshd[2215]: Accepted publickey for core from 139.178.68.195 port 56702 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:30.978245 sshd[2215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:30.981150 systemd-logind[1452]: New session 44 of user core. Feb 13 10:19:30.981711 systemd[1]: Started session-44.scope. Feb 13 10:19:31.035987 sshd[2215]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:31.037544 systemd[1]: sshd@43-139.178.70.43:22-139.178.68.195:56702.service: Deactivated successfully. Feb 13 10:19:31.037850 systemd[1]: session-44.scope: Deactivated successfully. Feb 13 10:19:31.038197 systemd-logind[1452]: Session 44 logged out. Waiting for processes to exit. Feb 13 10:19:31.038713 systemd[1]: Started sshd@44-139.178.70.43:22-139.178.68.195:56718.service. Feb 13 10:19:31.039116 systemd-logind[1452]: Removed session 44. Feb 13 10:19:31.076392 sshd[2221]: Accepted publickey for core from 139.178.68.195 port 56718 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:31.077247 sshd[2221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:31.080150 systemd-logind[1452]: New session 45 of user core. Feb 13 10:19:31.080684 systemd[1]: Started session-45.scope. Feb 13 10:19:31.134825 sshd[2221]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:31.136092 systemd[1]: sshd@44-139.178.70.43:22-139.178.68.195:56718.service: Deactivated successfully. Feb 13 10:19:31.136473 systemd[1]: session-45.scope: Deactivated successfully. Feb 13 10:19:31.136904 systemd-logind[1452]: Session 45 logged out. Waiting for processes to exit. Feb 13 10:19:31.137393 systemd-logind[1452]: Removed session 45. Feb 13 10:19:41.144800 systemd[1]: Started sshd@45-139.178.70.43:22-139.178.68.195:50664.service. Feb 13 10:19:41.181668 sshd[2227]: Accepted publickey for core from 139.178.68.195 port 50664 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:41.182590 sshd[2227]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:41.185966 systemd-logind[1452]: New session 46 of user core. Feb 13 10:19:41.186577 systemd[1]: Started session-46.scope. Feb 13 10:19:41.241369 sshd[2227]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:41.242968 systemd[1]: sshd@45-139.178.70.43:22-139.178.68.195:50664.service: Deactivated successfully. Feb 13 10:19:41.243265 systemd[1]: session-46.scope: Deactivated successfully. Feb 13 10:19:41.243598 systemd-logind[1452]: Session 46 logged out. Waiting for processes to exit. Feb 13 10:19:41.244020 systemd[1]: Started sshd@46-139.178.70.43:22-139.178.68.195:50674.service. Feb 13 10:19:41.244351 systemd-logind[1452]: Removed session 46. Feb 13 10:19:41.281395 sshd[2233]: Accepted publickey for core from 139.178.68.195 port 50674 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:41.282373 sshd[2233]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:41.285691 systemd-logind[1452]: New session 47 of user core. Feb 13 10:19:41.286390 systemd[1]: Started session-47.scope. Feb 13 10:19:41.351883 sshd[2233]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:41.357384 systemd[1]: sshd@46-139.178.70.43:22-139.178.68.195:50674.service: Deactivated successfully. Feb 13 10:19:41.358949 systemd[1]: session-47.scope: Deactivated successfully. Feb 13 10:19:41.360531 systemd-logind[1452]: Session 47 logged out. Waiting for processes to exit. Feb 13 10:19:41.362745 systemd-logind[1452]: Removed session 47. Feb 13 10:19:51.360985 systemd[1]: Started sshd@47-139.178.70.43:22-139.178.68.195:41662.service. Feb 13 10:19:51.397935 sshd[2239]: Accepted publickey for core from 139.178.68.195 port 41662 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:51.398807 sshd[2239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:51.401814 systemd-logind[1452]: New session 48 of user core. Feb 13 10:19:51.402437 systemd[1]: Started session-48.scope. Feb 13 10:19:51.456657 sshd[2239]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:51.458303 systemd[1]: sshd@47-139.178.70.43:22-139.178.68.195:41662.service: Deactivated successfully. Feb 13 10:19:51.458679 systemd[1]: session-48.scope: Deactivated successfully. Feb 13 10:19:51.459060 systemd-logind[1452]: Session 48 logged out. Waiting for processes to exit. Feb 13 10:19:51.459533 systemd[1]: Started sshd@48-139.178.70.43:22-139.178.68.195:41678.service. Feb 13 10:19:51.459947 systemd-logind[1452]: Removed session 48. Feb 13 10:19:51.496880 sshd[2245]: Accepted publickey for core from 139.178.68.195 port 41678 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:19:51.497883 sshd[2245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:19:51.501261 systemd-logind[1452]: New session 49 of user core. Feb 13 10:19:51.502012 systemd[1]: Started session-49.scope. Feb 13 10:19:51.557413 sshd[2245]: pam_unix(sshd:session): session closed for user core Feb 13 10:19:51.558794 systemd[1]: sshd@48-139.178.70.43:22-139.178.68.195:41678.service: Deactivated successfully. Feb 13 10:19:51.559195 systemd[1]: session-49.scope: Deactivated successfully. Feb 13 10:19:51.559490 systemd-logind[1452]: Session 49 logged out. Waiting for processes to exit. Feb 13 10:19:51.560099 systemd-logind[1452]: Removed session 49. Feb 13 10:20:01.567226 systemd[1]: Started sshd@49-139.178.70.43:22-139.178.68.195:58478.service. Feb 13 10:20:01.604751 sshd[2251]: Accepted publickey for core from 139.178.68.195 port 58478 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:01.605635 sshd[2251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:01.608534 systemd-logind[1452]: New session 50 of user core. Feb 13 10:20:01.609275 systemd[1]: Started session-50.scope. Feb 13 10:20:01.663711 sshd[2251]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:01.665414 systemd[1]: sshd@49-139.178.70.43:22-139.178.68.195:58478.service: Deactivated successfully. Feb 13 10:20:01.665812 systemd[1]: session-50.scope: Deactivated successfully. Feb 13 10:20:01.666173 systemd-logind[1452]: Session 50 logged out. Waiting for processes to exit. Feb 13 10:20:01.666780 systemd[1]: Started sshd@50-139.178.70.43:22-139.178.68.195:58490.service. Feb 13 10:20:01.667251 systemd-logind[1452]: Removed session 50. Feb 13 10:20:01.704246 sshd[2257]: Accepted publickey for core from 139.178.68.195 port 58490 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:01.704880 sshd[2257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:01.707149 systemd-logind[1452]: New session 51 of user core. Feb 13 10:20:01.707611 systemd[1]: Started session-51.scope. Feb 13 10:20:01.759125 sshd[2257]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:01.760424 systemd[1]: sshd@50-139.178.70.43:22-139.178.68.195:58490.service: Deactivated successfully. Feb 13 10:20:01.760812 systemd[1]: session-51.scope: Deactivated successfully. Feb 13 10:20:01.761192 systemd-logind[1452]: Session 51 logged out. Waiting for processes to exit. Feb 13 10:20:01.761881 systemd-logind[1452]: Removed session 51. Feb 13 10:20:11.768394 systemd[1]: Started sshd@51-139.178.70.43:22-139.178.68.195:36440.service. Feb 13 10:20:11.805710 sshd[2263]: Accepted publickey for core from 139.178.68.195 port 36440 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:11.806587 sshd[2263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:11.809503 systemd-logind[1452]: New session 52 of user core. Feb 13 10:20:11.810130 systemd[1]: Started session-52.scope. Feb 13 10:20:11.863910 sshd[2263]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:11.865487 systemd[1]: sshd@51-139.178.70.43:22-139.178.68.195:36440.service: Deactivated successfully. Feb 13 10:20:11.865789 systemd[1]: session-52.scope: Deactivated successfully. Feb 13 10:20:11.866130 systemd-logind[1452]: Session 52 logged out. Waiting for processes to exit. Feb 13 10:20:11.866641 systemd[1]: Started sshd@52-139.178.70.43:22-139.178.68.195:36452.service. Feb 13 10:20:11.867120 systemd-logind[1452]: Removed session 52. Feb 13 10:20:11.903875 sshd[2269]: Accepted publickey for core from 139.178.68.195 port 36452 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:11.904848 sshd[2269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:11.908233 systemd-logind[1452]: New session 53 of user core. Feb 13 10:20:11.908935 systemd[1]: Started session-53.scope. Feb 13 10:20:11.973672 sshd[2269]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:11.978893 systemd[1]: sshd@52-139.178.70.43:22-139.178.68.195:36452.service: Deactivated successfully. Feb 13 10:20:11.980441 systemd[1]: session-53.scope: Deactivated successfully. Feb 13 10:20:11.982132 systemd-logind[1452]: Session 53 logged out. Waiting for processes to exit. Feb 13 10:20:11.984378 systemd-logind[1452]: Removed session 53. Feb 13 10:20:21.983550 systemd[1]: Started sshd@53-139.178.70.43:22-139.178.68.195:52700.service. Feb 13 10:20:22.020858 sshd[2277]: Accepted publickey for core from 139.178.68.195 port 52700 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:22.021518 sshd[2277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:22.023900 systemd-logind[1452]: New session 54 of user core. Feb 13 10:20:22.024311 systemd[1]: Started session-54.scope. Feb 13 10:20:22.076071 sshd[2277]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:22.077710 systemd[1]: sshd@53-139.178.70.43:22-139.178.68.195:52700.service: Deactivated successfully. Feb 13 10:20:22.078069 systemd[1]: session-54.scope: Deactivated successfully. Feb 13 10:20:22.078393 systemd-logind[1452]: Session 54 logged out. Waiting for processes to exit. Feb 13 10:20:22.078914 systemd[1]: Started sshd@54-139.178.70.43:22-139.178.68.195:52702.service. Feb 13 10:20:22.079284 systemd-logind[1452]: Removed session 54. Feb 13 10:20:22.115829 sshd[2283]: Accepted publickey for core from 139.178.68.195 port 52702 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:22.116664 sshd[2283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:22.119484 systemd-logind[1452]: New session 55 of user core. Feb 13 10:20:22.120069 systemd[1]: Started session-55.scope. Feb 13 10:20:22.173274 sshd[2283]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:22.174437 systemd[1]: sshd@54-139.178.70.43:22-139.178.68.195:52702.service: Deactivated successfully. Feb 13 10:20:22.174824 systemd[1]: session-55.scope: Deactivated successfully. Feb 13 10:20:22.175194 systemd-logind[1452]: Session 55 logged out. Waiting for processes to exit. Feb 13 10:20:22.175885 systemd-logind[1452]: Removed session 55. Feb 13 10:20:32.181457 systemd[1]: Started sshd@55-139.178.70.43:22-139.178.68.195:49492.service. Feb 13 10:20:32.218809 sshd[2289]: Accepted publickey for core from 139.178.68.195 port 49492 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:32.219461 sshd[2289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:32.221786 systemd-logind[1452]: New session 56 of user core. Feb 13 10:20:32.222170 systemd[1]: Started session-56.scope. Feb 13 10:20:32.273635 sshd[2289]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:32.275695 systemd[1]: sshd@55-139.178.70.43:22-139.178.68.195:49492.service: Deactivated successfully. Feb 13 10:20:32.276076 systemd[1]: session-56.scope: Deactivated successfully. Feb 13 10:20:32.276405 systemd-logind[1452]: Session 56 logged out. Waiting for processes to exit. Feb 13 10:20:32.276946 systemd[1]: Started sshd@56-139.178.70.43:22-139.178.68.195:49498.service. Feb 13 10:20:32.277398 systemd-logind[1452]: Removed session 56. Feb 13 10:20:32.314204 sshd[2295]: Accepted publickey for core from 139.178.68.195 port 49498 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:32.315159 sshd[2295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:32.318306 systemd-logind[1452]: New session 57 of user core. Feb 13 10:20:32.319362 systemd[1]: Started session-57.scope. Feb 13 10:20:32.374287 sshd[2295]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:32.375391 systemd[1]: sshd@56-139.178.70.43:22-139.178.68.195:49498.service: Deactivated successfully. Feb 13 10:20:32.375799 systemd[1]: session-57.scope: Deactivated successfully. Feb 13 10:20:32.376166 systemd-logind[1452]: Session 57 logged out. Waiting for processes to exit. Feb 13 10:20:32.376803 systemd-logind[1452]: Removed session 57. Feb 13 10:20:42.382512 systemd[1]: Started sshd@57-139.178.70.43:22-139.178.68.195:58830.service. Feb 13 10:20:42.419672 sshd[2301]: Accepted publickey for core from 139.178.68.195 port 58830 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:42.420560 sshd[2301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:42.423735 systemd-logind[1452]: New session 58 of user core. Feb 13 10:20:42.424359 systemd[1]: Started session-58.scope. Feb 13 10:20:42.480125 sshd[2301]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:42.481683 systemd[1]: sshd@57-139.178.70.43:22-139.178.68.195:58830.service: Deactivated successfully. Feb 13 10:20:42.482048 systemd[1]: session-58.scope: Deactivated successfully. Feb 13 10:20:42.482363 systemd-logind[1452]: Session 58 logged out. Waiting for processes to exit. Feb 13 10:20:42.482887 systemd[1]: Started sshd@58-139.178.70.43:22-139.178.68.195:58842.service. Feb 13 10:20:42.483280 systemd-logind[1452]: Removed session 58. Feb 13 10:20:42.519867 sshd[2307]: Accepted publickey for core from 139.178.68.195 port 58842 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:42.520681 sshd[2307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:42.523464 systemd-logind[1452]: New session 59 of user core. Feb 13 10:20:42.524030 systemd[1]: Started session-59.scope. Feb 13 10:20:42.576755 sshd[2307]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:42.578042 systemd[1]: sshd@58-139.178.70.43:22-139.178.68.195:58842.service: Deactivated successfully. Feb 13 10:20:42.578408 systemd[1]: session-59.scope: Deactivated successfully. Feb 13 10:20:42.578835 systemd-logind[1452]: Session 59 logged out. Waiting for processes to exit. Feb 13 10:20:42.579380 systemd-logind[1452]: Removed session 59. Feb 13 10:20:52.585268 systemd[1]: Started sshd@59-139.178.70.43:22-139.178.68.195:43362.service. Feb 13 10:20:52.622658 sshd[2315]: Accepted publickey for core from 139.178.68.195 port 43362 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:52.623608 sshd[2315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:52.626905 systemd-logind[1452]: New session 60 of user core. Feb 13 10:20:52.627537 systemd[1]: Started session-60.scope. Feb 13 10:20:52.682131 sshd[2315]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:52.683652 systemd[1]: sshd@59-139.178.70.43:22-139.178.68.195:43362.service: Deactivated successfully. Feb 13 10:20:52.683948 systemd[1]: session-60.scope: Deactivated successfully. Feb 13 10:20:52.684260 systemd-logind[1452]: Session 60 logged out. Waiting for processes to exit. Feb 13 10:20:52.684729 systemd[1]: Started sshd@60-139.178.70.43:22-139.178.68.195:43376.service. Feb 13 10:20:52.685136 systemd-logind[1452]: Removed session 60. Feb 13 10:20:52.721952 sshd[2321]: Accepted publickey for core from 139.178.68.195 port 43376 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:20:52.722946 sshd[2321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:20:52.726280 systemd-logind[1452]: New session 61 of user core. Feb 13 10:20:52.726971 systemd[1]: Started session-61.scope. Feb 13 10:20:52.781913 sshd[2321]: pam_unix(sshd:session): session closed for user core Feb 13 10:20:52.783120 systemd[1]: sshd@60-139.178.70.43:22-139.178.68.195:43376.service: Deactivated successfully. Feb 13 10:20:52.783509 systemd[1]: session-61.scope: Deactivated successfully. Feb 13 10:20:52.783918 systemd-logind[1452]: Session 61 logged out. Waiting for processes to exit. Feb 13 10:20:52.784419 systemd-logind[1452]: Removed session 61. Feb 13 10:21:02.790485 systemd[1]: Started sshd@61-139.178.70.43:22-139.178.68.195:45504.service. Feb 13 10:21:02.827935 sshd[2328]: Accepted publickey for core from 139.178.68.195 port 45504 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:02.828608 sshd[2328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:02.831075 systemd-logind[1452]: New session 62 of user core. Feb 13 10:21:02.831477 systemd[1]: Started session-62.scope. Feb 13 10:21:02.885150 sshd[2328]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:02.886688 systemd[1]: sshd@61-139.178.70.43:22-139.178.68.195:45504.service: Deactivated successfully. Feb 13 10:21:02.886989 systemd[1]: session-62.scope: Deactivated successfully. Feb 13 10:21:02.887284 systemd-logind[1452]: Session 62 logged out. Waiting for processes to exit. Feb 13 10:21:02.887821 systemd[1]: Started sshd@62-139.178.70.43:22-139.178.68.195:45518.service. Feb 13 10:21:02.888275 systemd-logind[1452]: Removed session 62. Feb 13 10:21:02.925317 sshd[2334]: Accepted publickey for core from 139.178.68.195 port 45518 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:02.926250 sshd[2334]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:02.929311 systemd-logind[1452]: New session 63 of user core. Feb 13 10:21:02.929960 systemd[1]: Started session-63.scope. Feb 13 10:21:02.984887 sshd[2334]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:02.986187 systemd[1]: sshd@62-139.178.70.43:22-139.178.68.195:45518.service: Deactivated successfully. Feb 13 10:21:02.986580 systemd[1]: session-63.scope: Deactivated successfully. Feb 13 10:21:02.986993 systemd-logind[1452]: Session 63 logged out. Waiting for processes to exit. Feb 13 10:21:02.987442 systemd-logind[1452]: Removed session 63. Feb 13 10:21:12.994112 systemd[1]: Started sshd@63-139.178.70.43:22-139.178.68.195:41756.service. Feb 13 10:21:13.031707 sshd[2342]: Accepted publickey for core from 139.178.68.195 port 41756 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:13.032319 sshd[2342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:13.034833 systemd-logind[1452]: New session 64 of user core. Feb 13 10:21:13.035231 systemd[1]: Started session-64.scope. Feb 13 10:21:13.087338 sshd[2342]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:13.091302 systemd[1]: sshd@63-139.178.70.43:22-139.178.68.195:41756.service: Deactivated successfully. Feb 13 10:21:13.092354 systemd[1]: session-64.scope: Deactivated successfully. Feb 13 10:21:13.093333 systemd-logind[1452]: Session 64 logged out. Waiting for processes to exit. Feb 13 10:21:13.094173 systemd[1]: Started sshd@64-139.178.70.43:22-139.178.68.195:41758.service. Feb 13 10:21:13.094686 systemd-logind[1452]: Removed session 64. Feb 13 10:21:13.130931 sshd[2349]: Accepted publickey for core from 139.178.68.195 port 41758 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:13.131762 sshd[2349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:13.134638 systemd-logind[1452]: New session 65 of user core. Feb 13 10:21:13.135634 systemd[1]: Started session-65.scope. Feb 13 10:21:13.199196 sshd[2349]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:13.204156 systemd[1]: sshd@64-139.178.70.43:22-139.178.68.195:41758.service: Deactivated successfully. Feb 13 10:21:13.205716 systemd[1]: session-65.scope: Deactivated successfully. Feb 13 10:21:13.207279 systemd-logind[1452]: Session 65 logged out. Waiting for processes to exit. Feb 13 10:21:13.209509 systemd-logind[1452]: Removed session 65. Feb 13 10:21:23.205976 systemd[1]: Started sshd@65-139.178.70.43:22-139.178.68.195:49704.service. Feb 13 10:21:23.242861 sshd[2356]: Accepted publickey for core from 139.178.68.195 port 49704 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:23.243753 sshd[2356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:23.246797 systemd-logind[1452]: New session 66 of user core. Feb 13 10:21:23.247349 systemd[1]: Started session-66.scope. Feb 13 10:21:23.301871 sshd[2356]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:23.303326 systemd[1]: sshd@65-139.178.70.43:22-139.178.68.195:49704.service: Deactivated successfully. Feb 13 10:21:23.303630 systemd[1]: session-66.scope: Deactivated successfully. Feb 13 10:21:23.304006 systemd-logind[1452]: Session 66 logged out. Waiting for processes to exit. Feb 13 10:21:23.304492 systemd[1]: Started sshd@66-139.178.70.43:22-139.178.68.195:49708.service. Feb 13 10:21:23.304921 systemd-logind[1452]: Removed session 66. Feb 13 10:21:23.341921 sshd[2362]: Accepted publickey for core from 139.178.68.195 port 49708 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:23.342910 sshd[2362]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:23.346432 systemd-logind[1452]: New session 67 of user core. Feb 13 10:21:23.347138 systemd[1]: Started session-67.scope. Feb 13 10:21:23.403082 sshd[2362]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:23.404129 systemd[1]: sshd@66-139.178.70.43:22-139.178.68.195:49708.service: Deactivated successfully. Feb 13 10:21:23.404500 systemd[1]: session-67.scope: Deactivated successfully. Feb 13 10:21:23.404885 systemd-logind[1452]: Session 67 logged out. Waiting for processes to exit. Feb 13 10:21:23.405424 systemd-logind[1452]: Removed session 67. Feb 13 10:21:33.412269 systemd[1]: Started sshd@67-139.178.70.43:22-139.178.68.195:59546.service. Feb 13 10:21:33.449780 sshd[2369]: Accepted publickey for core from 139.178.68.195 port 59546 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:33.450719 sshd[2369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:33.454058 systemd-logind[1452]: New session 68 of user core. Feb 13 10:21:33.454665 systemd[1]: Started session-68.scope. Feb 13 10:21:33.509634 sshd[2369]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:33.511108 systemd[1]: sshd@67-139.178.70.43:22-139.178.68.195:59546.service: Deactivated successfully. Feb 13 10:21:33.511405 systemd[1]: session-68.scope: Deactivated successfully. Feb 13 10:21:33.511808 systemd-logind[1452]: Session 68 logged out. Waiting for processes to exit. Feb 13 10:21:33.512255 systemd[1]: Started sshd@68-139.178.70.43:22-139.178.68.195:59562.service. Feb 13 10:21:33.512662 systemd-logind[1452]: Removed session 68. Feb 13 10:21:33.549882 sshd[2375]: Accepted publickey for core from 139.178.68.195 port 59562 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:33.550882 sshd[2375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:33.554402 systemd-logind[1452]: New session 69 of user core. Feb 13 10:21:33.555088 systemd[1]: Started session-69.scope. Feb 13 10:21:33.610792 sshd[2375]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:33.612060 systemd[1]: sshd@68-139.178.70.43:22-139.178.68.195:59562.service: Deactivated successfully. Feb 13 10:21:33.612430 systemd[1]: session-69.scope: Deactivated successfully. Feb 13 10:21:33.612849 systemd-logind[1452]: Session 69 logged out. Waiting for processes to exit. Feb 13 10:21:33.613399 systemd-logind[1452]: Removed session 69. Feb 13 10:21:43.620378 systemd[1]: Started sshd@69-139.178.70.43:22-139.178.68.195:50748.service. Feb 13 10:21:43.657844 sshd[2381]: Accepted publickey for core from 139.178.68.195 port 50748 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:43.658887 sshd[2381]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:43.662378 systemd-logind[1452]: New session 70 of user core. Feb 13 10:21:43.663106 systemd[1]: Started session-70.scope. Feb 13 10:21:43.719829 sshd[2381]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:43.721470 systemd[1]: sshd@69-139.178.70.43:22-139.178.68.195:50748.service: Deactivated successfully. Feb 13 10:21:43.721890 systemd[1]: session-70.scope: Deactivated successfully. Feb 13 10:21:43.722210 systemd-logind[1452]: Session 70 logged out. Waiting for processes to exit. Feb 13 10:21:43.722814 systemd[1]: Started sshd@70-139.178.70.43:22-139.178.68.195:50750.service. Feb 13 10:21:43.723282 systemd-logind[1452]: Removed session 70. Feb 13 10:21:43.760188 sshd[2387]: Accepted publickey for core from 139.178.68.195 port 50750 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:43.761112 sshd[2387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:43.764220 systemd-logind[1452]: New session 71 of user core. Feb 13 10:21:43.765230 systemd[1]: Started session-71.scope. Feb 13 10:21:43.830851 sshd[2387]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:43.836615 systemd[1]: sshd@70-139.178.70.43:22-139.178.68.195:50750.service: Deactivated successfully. Feb 13 10:21:43.838415 systemd[1]: session-71.scope: Deactivated successfully. Feb 13 10:21:43.840128 systemd-logind[1452]: Session 71 logged out. Waiting for processes to exit. Feb 13 10:21:43.842276 systemd-logind[1452]: Removed session 71. Feb 13 10:21:53.840263 systemd[1]: Started sshd@71-139.178.70.43:22-139.178.68.195:36076.service. Feb 13 10:21:53.877708 sshd[2393]: Accepted publickey for core from 139.178.68.195 port 36076 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:53.878409 sshd[2393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:53.880789 systemd-logind[1452]: New session 72 of user core. Feb 13 10:21:53.881578 systemd[1]: Started session-72.scope. Feb 13 10:21:53.934316 sshd[2393]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:53.936174 systemd[1]: sshd@71-139.178.70.43:22-139.178.68.195:36076.service: Deactivated successfully. Feb 13 10:21:53.936539 systemd[1]: session-72.scope: Deactivated successfully. Feb 13 10:21:53.936872 systemd-logind[1452]: Session 72 logged out. Waiting for processes to exit. Feb 13 10:21:53.937427 systemd[1]: Started sshd@72-139.178.70.43:22-139.178.68.195:36090.service. Feb 13 10:21:53.937947 systemd-logind[1452]: Removed session 72. Feb 13 10:21:53.974748 sshd[2399]: Accepted publickey for core from 139.178.68.195 port 36090 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:21:53.975657 sshd[2399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:21:53.978515 systemd-logind[1452]: New session 73 of user core. Feb 13 10:21:53.979464 systemd[1]: Started session-73.scope. Feb 13 10:21:54.034083 sshd[2399]: pam_unix(sshd:session): session closed for user core Feb 13 10:21:54.035163 systemd[1]: sshd@72-139.178.70.43:22-139.178.68.195:36090.service: Deactivated successfully. Feb 13 10:21:54.035567 systemd[1]: session-73.scope: Deactivated successfully. Feb 13 10:21:54.035940 systemd-logind[1452]: Session 73 logged out. Waiting for processes to exit. Feb 13 10:21:54.036433 systemd-logind[1452]: Removed session 73. Feb 13 10:22:04.043121 systemd[1]: Started sshd@73-139.178.70.43:22-139.178.68.195:59764.service. Feb 13 10:22:04.080200 sshd[2405]: Accepted publickey for core from 139.178.68.195 port 59764 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:04.081084 sshd[2405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:04.084120 systemd-logind[1452]: New session 74 of user core. Feb 13 10:22:04.084677 systemd[1]: Started session-74.scope. Feb 13 10:22:04.138660 sshd[2405]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:04.140223 systemd[1]: sshd@73-139.178.70.43:22-139.178.68.195:59764.service: Deactivated successfully. Feb 13 10:22:04.140586 systemd[1]: session-74.scope: Deactivated successfully. Feb 13 10:22:04.140946 systemd-logind[1452]: Session 74 logged out. Waiting for processes to exit. Feb 13 10:22:04.141434 systemd[1]: Started sshd@74-139.178.70.43:22-139.178.68.195:59780.service. Feb 13 10:22:04.141879 systemd-logind[1452]: Removed session 74. Feb 13 10:22:04.178743 sshd[2411]: Accepted publickey for core from 139.178.68.195 port 59780 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:04.179708 sshd[2411]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:04.183025 systemd-logind[1452]: New session 75 of user core. Feb 13 10:22:04.183678 systemd[1]: Started session-75.scope. Feb 13 10:22:04.238997 sshd[2411]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:04.240169 systemd[1]: sshd@74-139.178.70.43:22-139.178.68.195:59780.service: Deactivated successfully. Feb 13 10:22:04.240548 systemd[1]: session-75.scope: Deactivated successfully. Feb 13 10:22:04.240997 systemd-logind[1452]: Session 75 logged out. Waiting for processes to exit. Feb 13 10:22:04.241447 systemd-logind[1452]: Removed session 75. Feb 13 10:22:11.781898 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:22:11.781Z","caller":"v2discovery/discovery.go:361","msg":"error while waiting for peers","discovery-url":"https://discovery.etcd.io","error":"client: etcd cluster is unavailable or misconfigured; error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n","err-detail":"error #0: client: etcd member https://discovery.etcd.io returns server error [Gateway Timeout]\n"} Feb 13 10:22:11.781898 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:22:11.781Z","caller":"v2discovery/discovery.go:297","msg":"retry connecting to discovery service","url":"https://discovery.etcd.io","reason":"waiting for other nodes","backoff":"2s"} Feb 13 10:22:13.874153 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:22:13.873Z","caller":"v2discovery/discovery.go:342","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"83f86b6f5ec2fb21"} Feb 13 10:22:13.874153 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:22:13.873Z","caller":"v2discovery/discovery.go:336","msg":"found self from discovery server","discovery-url":"https://discovery.etcd.io","self":"83dfd9cf481830e7"} Feb 13 10:22:13.874153 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:22:13.873Z","caller":"v2discovery/discovery.go:352","msg":"found peers from discovery server; waiting for more","discovery-url":"https://discovery.etcd.io","found-peers":2,"needed-peers":1} Feb 13 10:22:14.248078 systemd[1]: Started sshd@75-139.178.70.43:22-139.178.68.195:41066.service. Feb 13 10:22:14.285854 sshd[2418]: Accepted publickey for core from 139.178.68.195 port 41066 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:14.286561 sshd[2418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:14.288959 systemd-logind[1452]: New session 76 of user core. Feb 13 10:22:14.289434 systemd[1]: Started session-76.scope. Feb 13 10:22:14.342119 sshd[2418]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:14.343642 systemd[1]: sshd@75-139.178.70.43:22-139.178.68.195:41066.service: Deactivated successfully. Feb 13 10:22:14.343952 systemd[1]: session-76.scope: Deactivated successfully. Feb 13 10:22:14.344299 systemd-logind[1452]: Session 76 logged out. Waiting for processes to exit. Feb 13 10:22:14.344813 systemd[1]: Started sshd@76-139.178.70.43:22-139.178.68.195:41072.service. Feb 13 10:22:14.345273 systemd-logind[1452]: Removed session 76. Feb 13 10:22:14.382316 sshd[2424]: Accepted publickey for core from 139.178.68.195 port 41072 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:14.383187 sshd[2424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:14.386230 systemd-logind[1452]: New session 77 of user core. Feb 13 10:22:14.386839 systemd[1]: Started session-77.scope. Feb 13 10:22:14.452359 sshd[2424]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:14.458075 systemd[1]: sshd@76-139.178.70.43:22-139.178.68.195:41072.service: Deactivated successfully. Feb 13 10:22:14.459781 systemd[1]: session-77.scope: Deactivated successfully. Feb 13 10:22:14.461444 systemd-logind[1452]: Session 77 logged out. Waiting for processes to exit. Feb 13 10:22:14.463774 systemd-logind[1452]: Removed session 77. Feb 13 10:22:24.398692 systemd[1]: Started sshd@77-139.178.70.43:22-49.43.249.179:14312.service. Feb 13 10:22:24.457174 systemd[1]: Started sshd@78-139.178.70.43:22-139.178.68.195:56562.service. Feb 13 10:22:24.497654 sshd[2434]: Accepted publickey for core from 139.178.68.195 port 56562 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:24.498483 sshd[2434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:24.501193 systemd-logind[1452]: New session 78 of user core. Feb 13 10:22:24.501791 systemd[1]: Started session-78.scope. Feb 13 10:22:24.555748 sshd[2434]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:24.557232 systemd[1]: sshd@78-139.178.70.43:22-139.178.68.195:56562.service: Deactivated successfully. Feb 13 10:22:24.557550 systemd[1]: session-78.scope: Deactivated successfully. Feb 13 10:22:24.557939 systemd-logind[1452]: Session 78 logged out. Waiting for processes to exit. Feb 13 10:22:24.558440 systemd[1]: Started sshd@79-139.178.70.43:22-139.178.68.195:56574.service. Feb 13 10:22:24.558889 systemd-logind[1452]: Removed session 78. Feb 13 10:22:24.596615 sshd[2440]: Accepted publickey for core from 139.178.68.195 port 56574 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:24.597703 sshd[2440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:24.601308 systemd-logind[1452]: New session 79 of user core. Feb 13 10:22:24.602059 systemd[1]: Started session-79.scope. Feb 13 10:22:24.658211 sshd[2440]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:24.659434 systemd[1]: sshd@79-139.178.70.43:22-139.178.68.195:56574.service: Deactivated successfully. Feb 13 10:22:24.659847 systemd[1]: session-79.scope: Deactivated successfully. Feb 13 10:22:24.660212 systemd-logind[1452]: Session 79 logged out. Waiting for processes to exit. Feb 13 10:22:24.660818 systemd-logind[1452]: Removed session 79. Feb 13 10:22:25.511066 sshd[2431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:22:27.963851 sshd[2431]: Failed password for root from 49.43.249.179 port 14312 ssh2 Feb 13 10:22:29.056526 sshd[2431]: Received disconnect from 49.43.249.179 port 14312:11: Bye Bye [preauth] Feb 13 10:22:29.056526 sshd[2431]: Disconnected from authenticating user root 49.43.249.179 port 14312 [preauth] Feb 13 10:22:29.059062 systemd[1]: sshd@77-139.178.70.43:22-49.43.249.179:14312.service: Deactivated successfully. Feb 13 10:22:34.667023 systemd[1]: Started sshd@80-139.178.70.43:22-139.178.68.195:60054.service. Feb 13 10:22:34.704561 sshd[2448]: Accepted publickey for core from 139.178.68.195 port 60054 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:34.705214 sshd[2448]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:34.707507 systemd-logind[1452]: New session 80 of user core. Feb 13 10:22:34.707952 systemd[1]: Started session-80.scope. Feb 13 10:22:34.759394 sshd[2448]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:34.760943 systemd[1]: sshd@80-139.178.70.43:22-139.178.68.195:60054.service: Deactivated successfully. Feb 13 10:22:34.761243 systemd[1]: session-80.scope: Deactivated successfully. Feb 13 10:22:34.761571 systemd-logind[1452]: Session 80 logged out. Waiting for processes to exit. Feb 13 10:22:34.762009 systemd[1]: Started sshd@81-139.178.70.43:22-139.178.68.195:60064.service. Feb 13 10:22:34.762377 systemd-logind[1452]: Removed session 80. Feb 13 10:22:34.799596 sshd[2454]: Accepted publickey for core from 139.178.68.195 port 60064 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:34.800227 sshd[2454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:34.802476 systemd-logind[1452]: New session 81 of user core. Feb 13 10:22:34.802977 systemd[1]: Started session-81.scope. Feb 13 10:22:34.854305 sshd[2454]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:34.856923 systemd[1]: sshd@81-139.178.70.43:22-139.178.68.195:60064.service: Deactivated successfully. Feb 13 10:22:34.857789 systemd[1]: session-81.scope: Deactivated successfully. Feb 13 10:22:34.858509 systemd-logind[1452]: Session 81 logged out. Waiting for processes to exit. Feb 13 10:22:34.859706 systemd-logind[1452]: Removed session 81. Feb 13 10:22:44.863100 systemd[1]: Started sshd@82-139.178.70.43:22-139.178.68.195:46344.service. Feb 13 10:22:44.900586 sshd[2460]: Accepted publickey for core from 139.178.68.195 port 46344 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:44.901485 sshd[2460]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:44.904410 systemd-logind[1452]: New session 82 of user core. Feb 13 10:22:44.905081 systemd[1]: Started session-82.scope. Feb 13 10:22:44.959662 sshd[2460]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:44.961555 systemd[1]: sshd@82-139.178.70.43:22-139.178.68.195:46344.service: Deactivated successfully. Feb 13 10:22:44.961930 systemd[1]: session-82.scope: Deactivated successfully. Feb 13 10:22:44.962276 systemd-logind[1452]: Session 82 logged out. Waiting for processes to exit. Feb 13 10:22:44.962845 systemd[1]: Started sshd@83-139.178.70.43:22-139.178.68.195:46348.service. Feb 13 10:22:44.963320 systemd-logind[1452]: Removed session 82. Feb 13 10:22:45.000791 sshd[2466]: Accepted publickey for core from 139.178.68.195 port 46348 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:45.001839 sshd[2466]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:45.005333 systemd-logind[1452]: New session 83 of user core. Feb 13 10:22:45.006499 systemd[1]: Started session-83.scope. Feb 13 10:22:45.061410 sshd[2466]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:45.062789 systemd[1]: sshd@83-139.178.70.43:22-139.178.68.195:46348.service: Deactivated successfully. Feb 13 10:22:45.063216 systemd[1]: session-83.scope: Deactivated successfully. Feb 13 10:22:45.063574 systemd-logind[1452]: Session 83 logged out. Waiting for processes to exit. Feb 13 10:22:45.064022 systemd-logind[1452]: Removed session 83. Feb 13 10:22:55.071343 systemd[1]: Started sshd@84-139.178.70.43:22-139.178.68.195:51680.service. Feb 13 10:22:55.108840 sshd[2472]: Accepted publickey for core from 139.178.68.195 port 51680 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:55.109571 sshd[2472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:55.111913 systemd-logind[1452]: New session 84 of user core. Feb 13 10:22:55.112686 systemd[1]: Started session-84.scope. Feb 13 10:22:55.166086 sshd[2472]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:55.168019 systemd[1]: sshd@84-139.178.70.43:22-139.178.68.195:51680.service: Deactivated successfully. Feb 13 10:22:55.168391 systemd[1]: session-84.scope: Deactivated successfully. Feb 13 10:22:55.168736 systemd-logind[1452]: Session 84 logged out. Waiting for processes to exit. Feb 13 10:22:55.169307 systemd[1]: Started sshd@85-139.178.70.43:22-139.178.68.195:51692.service. Feb 13 10:22:55.169853 systemd-logind[1452]: Removed session 84. Feb 13 10:22:55.206832 sshd[2478]: Accepted publickey for core from 139.178.68.195 port 51692 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:22:55.207505 sshd[2478]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:22:55.209897 systemd-logind[1452]: New session 85 of user core. Feb 13 10:22:55.210616 systemd[1]: Started session-85.scope. Feb 13 10:22:55.269450 sshd[2478]: pam_unix(sshd:session): session closed for user core Feb 13 10:22:55.274790 systemd[1]: sshd@85-139.178.70.43:22-139.178.68.195:51692.service: Deactivated successfully. Feb 13 10:22:55.276763 systemd[1]: session-85.scope: Deactivated successfully. Feb 13 10:22:55.278424 systemd-logind[1452]: Session 85 logged out. Waiting for processes to exit. Feb 13 10:22:55.280556 systemd-logind[1452]: Removed session 85. Feb 13 10:23:05.278730 systemd[1]: Started sshd@86-139.178.70.43:22-139.178.68.195:39912.service. Feb 13 10:23:05.316256 sshd[2484]: Accepted publickey for core from 139.178.68.195 port 39912 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:05.316900 sshd[2484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:05.319261 systemd-logind[1452]: New session 86 of user core. Feb 13 10:23:05.320007 systemd[1]: Started session-86.scope. Feb 13 10:23:05.372317 sshd[2484]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:05.374052 systemd[1]: sshd@86-139.178.70.43:22-139.178.68.195:39912.service: Deactivated successfully. Feb 13 10:23:05.374423 systemd[1]: session-86.scope: Deactivated successfully. Feb 13 10:23:05.374800 systemd-logind[1452]: Session 86 logged out. Waiting for processes to exit. Feb 13 10:23:05.375313 systemd[1]: Started sshd@87-139.178.70.43:22-139.178.68.195:39924.service. Feb 13 10:23:05.375774 systemd-logind[1452]: Removed session 86. Feb 13 10:23:05.412798 sshd[2490]: Accepted publickey for core from 139.178.68.195 port 39924 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:05.413775 sshd[2490]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:05.417072 systemd-logind[1452]: New session 87 of user core. Feb 13 10:23:05.417730 systemd[1]: Started session-87.scope. Feb 13 10:23:05.473115 sshd[2490]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:05.474304 systemd[1]: sshd@87-139.178.70.43:22-139.178.68.195:39924.service: Deactivated successfully. Feb 13 10:23:05.474702 systemd[1]: session-87.scope: Deactivated successfully. Feb 13 10:23:05.475068 systemd-logind[1452]: Session 87 logged out. Waiting for processes to exit. Feb 13 10:23:05.475547 systemd-logind[1452]: Removed session 87. Feb 13 10:23:15.482604 systemd[1]: Started sshd@88-139.178.70.43:22-139.178.68.195:59020.service. Feb 13 10:23:15.519753 sshd[2496]: Accepted publickey for core from 139.178.68.195 port 59020 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:15.520682 sshd[2496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:15.523998 systemd-logind[1452]: New session 88 of user core. Feb 13 10:23:15.524613 systemd[1]: Started session-88.scope. Feb 13 10:23:15.579369 sshd[2496]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:15.581021 systemd[1]: sshd@88-139.178.70.43:22-139.178.68.195:59020.service: Deactivated successfully. Feb 13 10:23:15.581327 systemd[1]: session-88.scope: Deactivated successfully. Feb 13 10:23:15.581755 systemd-logind[1452]: Session 88 logged out. Waiting for processes to exit. Feb 13 10:23:15.582229 systemd[1]: Started sshd@89-139.178.70.43:22-139.178.68.195:59034.service. Feb 13 10:23:15.582647 systemd-logind[1452]: Removed session 88. Feb 13 10:23:15.619546 sshd[2502]: Accepted publickey for core from 139.178.68.195 port 59034 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:15.620546 sshd[2502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:15.623793 systemd-logind[1452]: New session 89 of user core. Feb 13 10:23:15.624514 systemd[1]: Started session-89.scope. Feb 13 10:23:15.680244 sshd[2502]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:15.681430 systemd[1]: sshd@89-139.178.70.43:22-139.178.68.195:59034.service: Deactivated successfully. Feb 13 10:23:15.681817 systemd[1]: session-89.scope: Deactivated successfully. Feb 13 10:23:15.682205 systemd-logind[1452]: Session 89 logged out. Waiting for processes to exit. Feb 13 10:23:15.682813 systemd-logind[1452]: Removed session 89. Feb 13 10:23:18.559541 systemd[1]: Started sshd@90-139.178.70.43:22-154.8.204.139:49116.service. Feb 13 10:23:25.690056 systemd[1]: Started sshd@91-139.178.70.43:22-139.178.68.195:52100.service. Feb 13 10:23:25.727563 sshd[2511]: Accepted publickey for core from 139.178.68.195 port 52100 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:25.728422 sshd[2511]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:25.731315 systemd-logind[1452]: New session 90 of user core. Feb 13 10:23:25.731930 systemd[1]: Started session-90.scope. Feb 13 10:23:25.786627 sshd[2511]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:25.788126 systemd[1]: sshd@91-139.178.70.43:22-139.178.68.195:52100.service: Deactivated successfully. Feb 13 10:23:25.788433 systemd[1]: session-90.scope: Deactivated successfully. Feb 13 10:23:25.788847 systemd-logind[1452]: Session 90 logged out. Waiting for processes to exit. Feb 13 10:23:25.789318 systemd[1]: Started sshd@92-139.178.70.43:22-139.178.68.195:52112.service. Feb 13 10:23:25.789787 systemd-logind[1452]: Removed session 90. Feb 13 10:23:25.826703 sshd[2517]: Accepted publickey for core from 139.178.68.195 port 52112 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:25.827817 sshd[2517]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:25.831293 systemd-logind[1452]: New session 91 of user core. Feb 13 10:23:25.832001 systemd[1]: Started session-91.scope. Feb 13 10:23:25.896235 sshd[2517]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:25.901424 systemd[1]: sshd@92-139.178.70.43:22-139.178.68.195:52112.service: Deactivated successfully. Feb 13 10:23:25.903012 systemd[1]: session-91.scope: Deactivated successfully. Feb 13 10:23:25.904576 systemd-logind[1452]: Session 91 logged out. Waiting for processes to exit. Feb 13 10:23:25.906813 systemd-logind[1452]: Removed session 91. Feb 13 10:23:35.904576 systemd[1]: Started sshd@93-139.178.70.43:22-139.178.68.195:34808.service. Feb 13 10:23:35.942293 sshd[2524]: Accepted publickey for core from 139.178.68.195 port 34808 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:35.945198 sshd[2524]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:35.954637 systemd-logind[1452]: New session 92 of user core. Feb 13 10:23:35.956859 systemd[1]: Started session-92.scope. Feb 13 10:23:36.024619 sshd[2524]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:36.026170 systemd[1]: sshd@93-139.178.70.43:22-139.178.68.195:34808.service: Deactivated successfully. Feb 13 10:23:36.026463 systemd[1]: session-92.scope: Deactivated successfully. Feb 13 10:23:36.026889 systemd-logind[1452]: Session 92 logged out. Waiting for processes to exit. Feb 13 10:23:36.027320 systemd[1]: Started sshd@94-139.178.70.43:22-139.178.68.195:52116.service. Feb 13 10:23:36.027809 systemd-logind[1452]: Removed session 92. Feb 13 10:23:36.064764 sshd[2530]: Accepted publickey for core from 139.178.68.195 port 52116 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:36.065695 sshd[2530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:36.068817 systemd-logind[1452]: New session 93 of user core. Feb 13 10:23:36.069434 systemd[1]: Started session-93.scope. Feb 13 10:23:36.123617 sshd[2530]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:36.124922 systemd[1]: sshd@94-139.178.70.43:22-139.178.68.195:52116.service: Deactivated successfully. Feb 13 10:23:36.125320 systemd[1]: session-93.scope: Deactivated successfully. Feb 13 10:23:36.125707 systemd-logind[1452]: Session 93 logged out. Waiting for processes to exit. Feb 13 10:23:36.126278 systemd-logind[1452]: Removed session 93. Feb 13 10:23:46.133517 systemd[1]: Started sshd@95-139.178.70.43:22-139.178.68.195:34660.service. Feb 13 10:23:46.170575 sshd[2537]: Accepted publickey for core from 139.178.68.195 port 34660 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:46.171224 sshd[2537]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:46.173768 systemd-logind[1452]: New session 94 of user core. Feb 13 10:23:46.174154 systemd[1]: Started session-94.scope. Feb 13 10:23:46.225010 sshd[2537]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:46.226482 systemd[1]: sshd@95-139.178.70.43:22-139.178.68.195:34660.service: Deactivated successfully. Feb 13 10:23:46.226829 systemd[1]: session-94.scope: Deactivated successfully. Feb 13 10:23:46.227166 systemd-logind[1452]: Session 94 logged out. Waiting for processes to exit. Feb 13 10:23:46.227678 systemd[1]: Started sshd@96-139.178.70.43:22-139.178.68.195:34670.service. Feb 13 10:23:46.228150 systemd-logind[1452]: Removed session 94. Feb 13 10:23:46.292452 sshd[2543]: Accepted publickey for core from 139.178.68.195 port 34670 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:46.295573 sshd[2543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:46.304990 systemd-logind[1452]: New session 95 of user core. Feb 13 10:23:46.307270 systemd[1]: Started session-95.scope. Feb 13 10:23:46.376184 sshd[2543]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:46.377318 systemd[1]: sshd@96-139.178.70.43:22-139.178.68.195:34670.service: Deactivated successfully. Feb 13 10:23:46.377709 systemd[1]: session-95.scope: Deactivated successfully. Feb 13 10:23:46.378141 systemd-logind[1452]: Session 95 logged out. Waiting for processes to exit. Feb 13 10:23:46.378704 systemd-logind[1452]: Removed session 95. Feb 13 10:23:55.838913 systemd[1]: Started sshd@97-139.178.70.43:22-49.43.249.179:6795.service. Feb 13 10:23:56.385600 systemd[1]: Started sshd@98-139.178.70.43:22-139.178.68.195:58110.service. Feb 13 10:23:56.422860 sshd[2552]: Accepted publickey for core from 139.178.68.195 port 58110 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:56.423742 sshd[2552]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:56.426745 systemd-logind[1452]: New session 96 of user core. Feb 13 10:23:56.427407 systemd[1]: Started session-96.scope. Feb 13 10:23:56.482270 sshd[2552]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:56.483668 systemd[1]: sshd@98-139.178.70.43:22-139.178.68.195:58110.service: Deactivated successfully. Feb 13 10:23:56.483988 systemd[1]: session-96.scope: Deactivated successfully. Feb 13 10:23:56.484285 systemd-logind[1452]: Session 96 logged out. Waiting for processes to exit. Feb 13 10:23:56.484808 systemd[1]: Started sshd@99-139.178.70.43:22-139.178.68.195:58126.service. Feb 13 10:23:56.485225 systemd-logind[1452]: Removed session 96. Feb 13 10:23:56.521868 sshd[2561]: Accepted publickey for core from 139.178.68.195 port 58126 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:23:56.522777 sshd[2561]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:23:56.526037 systemd-logind[1452]: New session 97 of user core. Feb 13 10:23:56.526656 systemd[1]: Started session-97.scope. Feb 13 10:23:56.591441 sshd[2561]: pam_unix(sshd:session): session closed for user core Feb 13 10:23:56.596708 systemd[1]: sshd@99-139.178.70.43:22-139.178.68.195:58126.service: Deactivated successfully. Feb 13 10:23:56.598273 systemd[1]: session-97.scope: Deactivated successfully. Feb 13 10:23:56.599770 systemd-logind[1452]: Session 97 logged out. Waiting for processes to exit. Feb 13 10:23:56.602020 systemd-logind[1452]: Removed session 97. Feb 13 10:23:57.516361 sshd[2549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:23:59.597997 sshd[2549]: Failed password for root from 49.43.249.179 port 6795 ssh2 Feb 13 10:24:01.063187 sshd[2549]: Received disconnect from 49.43.249.179 port 6795:11: Bye Bye [preauth] Feb 13 10:24:01.063187 sshd[2549]: Disconnected from authenticating user root 49.43.249.179 port 6795 [preauth] Feb 13 10:24:01.065681 systemd[1]: sshd@97-139.178.70.43:22-49.43.249.179:6795.service: Deactivated successfully. Feb 13 10:24:06.600440 systemd[1]: Started sshd@100-139.178.70.43:22-139.178.68.195:49410.service. Feb 13 10:24:06.637368 sshd[2568]: Accepted publickey for core from 139.178.68.195 port 49410 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:06.638317 sshd[2568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:06.641308 systemd-logind[1452]: New session 98 of user core. Feb 13 10:24:06.642373 systemd[1]: Started session-98.scope. Feb 13 10:24:06.706622 sshd[2568]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:06.713385 systemd[1]: sshd@100-139.178.70.43:22-139.178.68.195:49410.service: Deactivated successfully. Feb 13 10:24:06.713791 systemd[1]: session-98.scope: Deactivated successfully. Feb 13 10:24:06.714115 systemd-logind[1452]: Session 98 logged out. Waiting for processes to exit. Feb 13 10:24:06.714701 systemd[1]: Started sshd@101-139.178.70.43:22-139.178.68.195:49414.service. Feb 13 10:24:06.715205 systemd-logind[1452]: Removed session 98. Feb 13 10:24:06.751860 sshd[2574]: Accepted publickey for core from 139.178.68.195 port 49414 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:06.752792 sshd[2574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:06.755842 systemd-logind[1452]: New session 99 of user core. Feb 13 10:24:06.756491 systemd[1]: Started session-99.scope. Feb 13 10:24:06.811149 sshd[2574]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:06.812214 systemd[1]: sshd@101-139.178.70.43:22-139.178.68.195:49414.service: Deactivated successfully. Feb 13 10:24:06.812607 systemd[1]: session-99.scope: Deactivated successfully. Feb 13 10:24:06.812991 systemd-logind[1452]: Session 99 logged out. Waiting for processes to exit. Feb 13 10:24:06.813441 systemd-logind[1452]: Removed session 99. Feb 13 10:24:15.072576 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.071Z","caller":"v2discovery/discovery.go:371","msg":"found peer from discovery server","discovery-url":"https://discovery.etcd.io","peer":"e57ce77741589b2a"} Feb 13 10:24:15.072576 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.071Z","caller":"v2discovery/discovery.go:378","msg":"found all needed peers from discovery server","discovery-url":"https://discovery.etcd.io","found-peers":3} Feb 13 10:24:15.076143 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.075Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"83dfd9cf481830e7","cluster-id":"83859d7861decb67"} Feb 13 10:24:15.076143 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.075Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=()"} Feb 13 10:24:15.076143 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.075Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 became follower at term 0"} Feb 13 10:24:15.076143 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.075Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 83dfd9cf481830e7 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Feb 13 10:24:15.076143 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.075Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 became follower at term 1"} Feb 13 10:24:15.076982 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.076Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=(9502553223066038503)"} Feb 13 10:24:15.076982 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.076Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=(9502553223066038503 9509468739268180769)"} Feb 13 10:24:15.076982 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.076Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=(9502553223066038503 9509468739268180769 16536346431181069098)"} Feb 13 10:24:15.077489 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:15.077Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Feb 13 10:24:15.079860 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.079Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Feb 13 10:24:15.081146 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.080Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Feb 13 10:24:15.081730 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.081Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.081730 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.081Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.082456 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.082Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.082972 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.082Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.083419 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.083Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.083419 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.083Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.083419 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.083Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21","remote-peer-urls":["http://10.67.80.51:2380"]} Feb 13 10:24:15.083972 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.083Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.083972 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.083Z","caller":"rafthttp/peer.go:133","msg":"starting remote peer","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.083972 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.083Z","caller":"rafthttp/pipeline.go:72","msg":"started HTTP pipelining with remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.085302 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.084Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.086369 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.085Z","caller":"rafthttp/stream.go:169","msg":"started stream writer with remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.088559 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","caller":"rafthttp/peer.go:137","msg":"started remote peer","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.088559 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.088559 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","caller":"rafthttp/stream.go:395","msg":"started stream reader with remote peer","stream-reader-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.088559 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","caller":"rafthttp/transport.go:317","msg":"added remote peer","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a","remote-peer-urls":["http://10.67.80.83:2380"]} Feb 13 10:24:15.088559 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"83dfd9cf481830e7","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Feb 13 10:24:15.089069 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","caller":"etcdserver/server.go:744","msg":"starting initial election tick advance","election-ticks":10} Feb 13 10:24:15.089148 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.088Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=(9502553223066038503 9509468739268180769 16536346431181069098)"} Feb 13 10:24:15.089148 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.089Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"83859d7861decb67","local-member-id":"83dfd9cf481830e7","added-peer-id":"83dfd9cf481830e7","added-peer-peer-urls":["http://10.67.80.63:2380"]} Feb 13 10:24:15.089283 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.089Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=(9502553223066038503 9509468739268180769 16536346431181069098)"} Feb 13 10:24:15.089283 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.089Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"83859d7861decb67","local-member-id":"83dfd9cf481830e7","added-peer-id":"83f86b6f5ec2fb21","added-peer-peer-urls":["http://10.67.80.51:2380"]} Feb 13 10:24:15.089352 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.089Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 switched to configuration voters=(9502553223066038503 9509468739268180769 16536346431181069098)"} Feb 13 10:24:15.089352 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.089Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"83859d7861decb67","local-member-id":"83dfd9cf481830e7","added-peer-id":"e57ce77741589b2a","added-peer-peer-urls":["http://10.67.80.83:2380"]} Feb 13 10:24:15.090181 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.090Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"10.67.80.63:2380"} Feb 13 10:24:15.090181 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.090Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"10.67.80.63:2380"} Feb 13 10:24:15.090181 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.090Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"83dfd9cf481830e7","initial-advertise-peer-urls":["http://10.67.80.63:2380"],"listen-peer-urls":["http://10.67.80.63:2380"],"advertise-client-urls":["http://10.67.80.63:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Feb 13 10:24:15.091041 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.090Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.091041 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.090Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.091041 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.090Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.091402 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.091Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"83dfd9cf481830e7","to":"83f86b6f5ec2fb21","stream-type":"stream Message"} Feb 13 10:24:15.091402 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.091Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.091489 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.091Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"83dfd9cf481830e7","to":"83f86b6f5ec2fb21","stream-type":"stream MsgApp v2"} Feb 13 10:24:15.091489 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.091Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"83f86b6f5ec2fb21"} Feb 13 10:24:15.259608 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.259Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"83dfd9cf481830e7","to":"e57ce77741589b2a","stream-type":"stream Message"} Feb 13 10:24:15.259608 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.259Z","caller":"rafthttp/stream.go:249","msg":"set message encoder","from":"83dfd9cf481830e7","to":"e57ce77741589b2a","stream-type":"stream MsgApp v2"} Feb 13 10:24:15.259608 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.259Z","caller":"rafthttp/peer_status.go:53","msg":"peer became active","peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.259608 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.259Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.259608 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.259Z","caller":"rafthttp/stream.go:274","msg":"established TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.262885 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.262Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.262885 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.262Z","caller":"rafthttp/stream.go:412","msg":"established TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:15.291684 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.291Z","caller":"etcdserver/server.go:767","msg":"initialized peer connections; fast-forwarding election ticks","local-member-id":"83dfd9cf481830e7","forward-ticks":8,"forward-duration":"800ms","election-ticks":10,"election-timeout":"1s","active-remote-members":2} Feb 13 10:24:15.677432 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.676Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 83f86b6f5ec2fb21 [logterm: 1, index: 3] at term 1"} Feb 13 10:24:15.678771 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.678Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 [term: 1] received a MsgVote message with higher term from 83f86b6f5ec2fb21 [term: 2]"} Feb 13 10:24:15.678771 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.678Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 became follower at term 2"} Feb 13 10:24:15.678771 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.678Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"83dfd9cf481830e7 [logterm: 1, index: 3, vote: 0] cast MsgVote for 83f86b6f5ec2fb21 [logterm: 1, index: 3] at term 2"} Feb 13 10:24:15.680504 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.680Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 83dfd9cf481830e7 elected leader 83f86b6f5ec2fb21 at term 2"} Feb 13 10:24:15.684370 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.683Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"83dfd9cf481830e7","local-member-attributes":"{Name:309e73d6af774bfdbaa5827581236c04 ClientURLs:[http://10.67.80.63:2379]}","request-path":"/0/members/83dfd9cf481830e7/attributes","cluster-id":"83859d7861decb67","publish-timeout":"7s"} Feb 13 10:24:15.684370 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.683Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Feb 13 10:24:15.684771 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.684Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Feb 13 10:24:15.684901 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.684Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Feb 13 10:24:15.684951 systemd[1]: Started etcd-member.service. Feb 13 10:24:15.685785 systemd[1]: Reached target multi-user.target. Feb 13 10:24:15.686195 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.685Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Feb 13 10:24:15.688168 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.687Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"83859d7861decb67","local-member-id":"83dfd9cf481830e7","cluster-version":"3.5"} Feb 13 10:24:15.688168 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:24:15.687Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Feb 13 10:24:15.689319 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 10:24:15.693830 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 10:24:15.693910 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 10:24:15.694032 systemd[1]: Startup finished in 1.900s (kernel) + 16.749s (initrd) + 8min 23.116s (userspace) = 8min 41.766s. Feb 13 10:24:16.820491 systemd[1]: Started sshd@102-139.178.70.43:22-139.178.68.195:51674.service. Feb 13 10:24:16.857839 sshd[2583]: Accepted publickey for core from 139.178.68.195 port 51674 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:16.858734 sshd[2583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:16.861733 systemd-logind[1452]: New session 100 of user core. Feb 13 10:24:16.862449 systemd[1]: Started session-100.scope. Feb 13 10:24:16.917511 sshd[2583]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:16.918946 systemd[1]: sshd@102-139.178.70.43:22-139.178.68.195:51674.service: Deactivated successfully. Feb 13 10:24:16.919252 systemd[1]: session-100.scope: Deactivated successfully. Feb 13 10:24:16.919603 systemd-logind[1452]: Session 100 logged out. Waiting for processes to exit. Feb 13 10:24:16.920043 systemd[1]: Started sshd@103-139.178.70.43:22-139.178.68.195:51676.service. Feb 13 10:24:16.920405 systemd-logind[1452]: Removed session 100. Feb 13 10:24:16.957840 sshd[2589]: Accepted publickey for core from 139.178.68.195 port 51676 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:16.958740 sshd[2589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:16.961779 systemd-logind[1452]: New session 101 of user core. Feb 13 10:24:16.962394 systemd[1]: Started session-101.scope. Feb 13 10:24:17.015953 sshd[2589]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:17.022129 systemd[1]: sshd@103-139.178.70.43:22-139.178.68.195:51676.service: Deactivated successfully. Feb 13 10:24:17.023633 systemd[1]: session-101.scope: Deactivated successfully. Feb 13 10:24:17.025178 systemd-logind[1452]: Session 101 logged out. Waiting for processes to exit. Feb 13 10:24:17.027640 systemd[1]: Started sshd@104-139.178.70.43:22-139.178.68.195:51680.service. Feb 13 10:24:17.029734 systemd-logind[1452]: Removed session 101. Feb 13 10:24:17.068038 sshd[2595]: Accepted publickey for core from 139.178.68.195 port 51680 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:17.068732 sshd[2595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:17.071081 systemd-logind[1452]: New session 102 of user core. Feb 13 10:24:17.071598 systemd[1]: Started session-102.scope. Feb 13 10:24:17.125213 sshd[2595]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:17.126708 systemd[1]: sshd@104-139.178.70.43:22-139.178.68.195:51680.service: Deactivated successfully. Feb 13 10:24:17.127024 systemd[1]: session-102.scope: Deactivated successfully. Feb 13 10:24:17.127328 systemd-logind[1452]: Session 102 logged out. Waiting for processes to exit. Feb 13 10:24:17.127887 systemd[1]: Started sshd@105-139.178.70.43:22-139.178.68.195:51688.service. Feb 13 10:24:17.128281 systemd-logind[1452]: Removed session 102. Feb 13 10:24:17.165881 sshd[2602]: Accepted publickey for core from 139.178.68.195 port 51688 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:17.166918 sshd[2602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:17.170454 systemd-logind[1452]: New session 103 of user core. Feb 13 10:24:17.171174 systemd[1]: Started session-103.scope. Feb 13 10:24:17.268573 sudo[2605]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 10:24:17.269130 sudo[2605]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 10:24:17.285860 dbus-daemon[1424]: \xd0\xdd]bQV: received setenforce notice (enforcing=1939304112) Feb 13 10:24:17.290324 sudo[2605]: pam_unix(sudo:session): session closed for user root Feb 13 10:24:17.295587 sshd[2602]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:17.301988 systemd[1]: sshd@105-139.178.70.43:22-139.178.68.195:51688.service: Deactivated successfully. Feb 13 10:24:17.303530 systemd[1]: session-103.scope: Deactivated successfully. Feb 13 10:24:17.305170 systemd-logind[1452]: Session 103 logged out. Waiting for processes to exit. Feb 13 10:24:17.307635 systemd[1]: Started sshd@106-139.178.70.43:22-139.178.68.195:51694.service. Feb 13 10:24:17.309747 systemd-logind[1452]: Removed session 103. Feb 13 10:24:17.414488 sshd[2615]: Accepted publickey for core from 139.178.68.195 port 51694 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:24:17.416173 sshd[2615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:24:17.421627 systemd-logind[1452]: New session 104 of user core. Feb 13 10:24:17.422830 systemd[1]: Started session-104.scope. Feb 13 10:24:17.489285 sudo[2619]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 10:24:17.489837 sudo[2619]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 10:24:17.496858 sudo[2619]: pam_unix(sudo:session): session closed for user root Feb 13 10:24:17.504199 sudo[2618]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 10:24:17.504296 sudo[2618]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 10:24:17.509427 systemd[1]: Stopping audit-rules.service... Feb 13 10:24:17.508000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 10:24:17.510331 auditctl[2622]: No rules Feb 13 10:24:17.510506 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 10:24:17.510602 systemd[1]: Stopped audit-rules.service. Feb 13 10:24:17.511387 systemd[1]: Starting audit-rules.service... Feb 13 10:24:17.515705 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 13 10:24:17.515755 kernel: audit: type=1305 audit(1707819857.508:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 10:24:17.521422 augenrules[2639]: No rules Feb 13 10:24:17.521738 systemd[1]: Finished audit-rules.service. Feb 13 10:24:17.522189 sudo[2618]: pam_unix(sudo:session): session closed for user root Feb 13 10:24:17.523055 sshd[2615]: pam_unix(sshd:session): session closed for user core Feb 13 10:24:17.524576 systemd[1]: sshd@106-139.178.70.43:22-139.178.68.195:51694.service: Deactivated successfully. Feb 13 10:24:17.524974 systemd[1]: session-104.scope: Deactivated successfully. Feb 13 10:24:17.525324 systemd-logind[1452]: Session 104 logged out. Waiting for processes to exit. Feb 13 10:24:17.525992 systemd-logind[1452]: Removed session 104. Feb 13 10:24:17.508000 audit[2622]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc71cbe420 a2=420 a3=0 items=0 ppid=1 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:24:17.562304 kernel: audit: type=1300 audit(1707819857.508:173): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc71cbe420 a2=420 a3=0 items=0 ppid=1 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:24:17.562335 kernel: audit: type=1327 audit(1707819857.508:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 10:24:17.508000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 10:24:17.571867 kernel: audit: type=1131 audit(1707819857.509:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.594310 kernel: audit: type=1130 audit(1707819857.520:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.616752 kernel: audit: type=1106 audit(1707819857.520:176): pid=2618 uid=500 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.520000 audit[2618]: USER_END pid=2618 uid=500 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.520000 audit[2618]: CRED_DISP pid=2618 uid=500 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.666619 kernel: audit: type=1104 audit(1707819857.520:177): pid=2618 uid=500 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.666650 kernel: audit: type=1106 audit(1707819857.522:178): pid=2615 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:24:17.522000 audit[2615]: USER_END pid=2615 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:24:17.699013 kernel: audit: type=1104 audit(1707819857.522:179): pid=2615 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:24:17.522000 audit[2615]: CRED_DISP pid=2615 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:24:17.725151 kernel: audit: type=1131 audit(1707819857.523:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.70.43:22-139.178.68.195:51694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:24:17.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.70.43:22-139.178.68.195:51694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:24:19.187251 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:19.186Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a","error":"EOF"} Feb 13 10:24:19.188657 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:19.187Z","caller":"rafthttp/stream.go:421","msg":"lost TCP streaming connection with remote peer","stream-reader-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a","error":"EOF"} Feb 13 10:24:19.193248 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:19.192Z","caller":"rafthttp/peer_status.go:66","msg":"peer became inactive (message send to peer failed)","peer-id":"e57ce77741589b2a","error":"failed to dial e57ce77741589b2a on stream Message (peer e57ce77741589b2a failed to find local node 83dfd9cf481830e7)"} Feb 13 10:24:25.086599 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:25.085Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream MsgApp v2","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:25.086599 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:25.086Z","caller":"rafthttp/stream.go:194","msg":"lost TCP streaming connection with remote peer","stream-writer-type":"stream Message","local-member-id":"83dfd9cf481830e7","remote-peer-id":"e57ce77741589b2a"} Feb 13 10:24:50.090301 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:50.089Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:24:50.090301 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:50.089Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:24:55.090616 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:55.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:24:55.090616 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:24:55.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:24:56.944370 update_engine[1454]: I0213 10:24:56.944175 1454 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 10:24:56.944370 update_engine[1454]: I0213 10:24:56.944254 1454 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 10:24:56.945556 update_engine[1454]: I0213 10:24:56.945096 1454 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 10:24:56.946128 update_engine[1454]: I0213 10:24:56.946036 1454 omaha_request_params.cc:62] Current group set to lts Feb 13 10:24:56.946373 update_engine[1454]: I0213 10:24:56.946314 1454 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 10:24:56.946373 update_engine[1454]: I0213 10:24:56.946333 1454 update_attempter.cc:643] Scheduling an action processor start. Feb 13 10:24:56.946373 update_engine[1454]: I0213 10:24:56.946365 1454 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 10:24:56.946766 update_engine[1454]: I0213 10:24:56.946429 1454 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 10:24:56.946766 update_engine[1454]: I0213 10:24:56.946588 1454 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 10:24:56.946766 update_engine[1454]: I0213 10:24:56.946605 1454 omaha_request_action.cc:271] Request: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: Feb 13 10:24:56.946766 update_engine[1454]: I0213 10:24:56.946615 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:24:56.947842 locksmithd[1492]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 10:24:56.949849 update_engine[1454]: I0213 10:24:56.949755 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:24:56.950057 update_engine[1454]: E0213 10:24:56.950013 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:24:56.950207 update_engine[1454]: I0213 10:24:56.950170 1454 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 10:25:00.091344 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:00.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:00.091344 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:00.090Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:05.091661 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:05.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:05.091661 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:05.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:06.938691 update_engine[1454]: I0213 10:25:06.938566 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:25:06.939557 update_engine[1454]: I0213 10:25:06.939036 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:25:06.939557 update_engine[1454]: E0213 10:25:06.939234 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:25:06.939557 update_engine[1454]: I0213 10:25:06.939407 1454 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 10:25:10.092287 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:10.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:10.092287 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:10.091Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:15.093121 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:15.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:15.093121 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:15.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:16.938668 update_engine[1454]: I0213 10:25:16.938549 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:25:16.939537 update_engine[1454]: I0213 10:25:16.939015 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:25:16.939537 update_engine[1454]: E0213 10:25:16.939210 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:25:16.939537 update_engine[1454]: I0213 10:25:16.939379 1454 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 10:25:18.564820 sshd[2509]: Timeout before authentication for 154.8.204.139 port 49116 Feb 13 10:25:18.566290 systemd[1]: sshd@90-139.178.70.43:22-154.8.204.139:49116.service: Deactivated successfully. Feb 13 10:25:18.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.70.43:22-154.8.204.139:49116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:25:18.592515 kernel: audit: type=1131 audit(1707819918.566:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.70.43:22-154.8.204.139:49116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:25:20.093408 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:20.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:20.093408 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:20.092Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:25.093941 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:25.093Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:25.093941 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:25.093Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:26.938967 update_engine[1454]: I0213 10:25:26.938849 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939321 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:25:26.939934 update_engine[1454]: E0213 10:25:26.939555 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939710 1454 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939725 1454 omaha_request_action.cc:621] Omaha request response: Feb 13 10:25:26.939934 update_engine[1454]: E0213 10:25:26.939864 1454 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939891 1454 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939901 1454 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939909 1454 update_attempter.cc:306] Processing Done. Feb 13 10:25:26.939934 update_engine[1454]: E0213 10:25:26.939935 1454 update_attempter.cc:619] Update failed. Feb 13 10:25:26.939934 update_engine[1454]: I0213 10:25:26.939945 1454 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.939955 1454 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.939965 1454 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940114 1454 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940164 1454 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940173 1454 omaha_request_action.cc:271] Request: Feb 13 10:25:26.940906 update_engine[1454]: Feb 13 10:25:26.940906 update_engine[1454]: Feb 13 10:25:26.940906 update_engine[1454]: Feb 13 10:25:26.940906 update_engine[1454]: Feb 13 10:25:26.940906 update_engine[1454]: Feb 13 10:25:26.940906 update_engine[1454]: Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940183 1454 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940516 1454 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:25:26.940906 update_engine[1454]: E0213 10:25:26.940677 1454 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940809 1454 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940824 1454 omaha_request_action.cc:621] Omaha request response: Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940833 1454 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940840 1454 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 10:25:26.940906 update_engine[1454]: I0213 10:25:26.940847 1454 update_attempter.cc:306] Processing Done. Feb 13 10:25:26.942569 locksmithd[1492]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 10:25:26.942569 locksmithd[1492]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 10:25:26.943208 update_engine[1454]: I0213 10:25:26.940855 1454 update_attempter.cc:310] Error event sent. Feb 13 10:25:26.943208 update_engine[1454]: I0213 10:25:26.940876 1454 update_check_scheduler.cc:74] Next update check in 41m34s Feb 13 10:25:28.520259 systemd[1]: Started sshd@107-139.178.70.43:22-49.43.249.179:63154.service. Feb 13 10:25:28.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.43:22-49.43.249.179:63154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:25:28.597676 kernel: audit: type=1130 audit(1707819928.518:182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.43:22-49.43.249.179:63154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:25:30.007588 sshd[2646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:25:30.006000 audit[2646]: USER_AUTH pid=2646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:25:30.087640 kernel: audit: type=1100 audit(1707819930.006:183): pid=2646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:25:30.094774 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:30.094Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:30.094774 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:30.094Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:31.858140 sshd[2646]: Failed password for root from 49.43.249.179 port 63154 ssh2 Feb 13 10:25:33.626954 sshd[2646]: Received disconnect from 49.43.249.179 port 63154:11: Bye Bye [preauth] Feb 13 10:25:33.626954 sshd[2646]: Disconnected from authenticating user root 49.43.249.179 port 63154 [preauth] Feb 13 10:25:33.629458 systemd[1]: sshd@107-139.178.70.43:22-49.43.249.179:63154.service: Deactivated successfully. Feb 13 10:25:33.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.43:22-49.43.249.179:63154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:25:33.711657 kernel: audit: type=1131 audit(1707819933.628:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.43:22-49.43.249.179:63154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:25:35.095596 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:35.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:35.095596 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:35.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:40.096507 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:40.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:40.096507 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:40.095Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:45.096965 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:45.096Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:45.096965 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:45.096Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:50.098164 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:50.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:50.098164 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:50.097Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:55.099211 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:55.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:25:55.099211 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:25:55.098Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:00.100459 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:00.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:00.100459 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:00.099Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:05.101508 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:05.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:05.101508 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:05.100Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:10.101878 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:10.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:10.101878 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:10.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:15.102430 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:15.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:15.102430 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:15.101Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:20.102828 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:20.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:20.102828 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:20.102Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:25.103873 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:25.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:25.103873 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:25.103Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:30.105132 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:30.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:30.105132 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:30.104Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:35.105961 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:35.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:35.105961 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:35.105Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:40.107154 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:40.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:40.107154 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:40.106Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:45.107829 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:45.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:45.107829 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:45.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:50.108156 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:50.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:50.108156 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:50.107Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:55.109137 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:55.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:26:55.109137 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:26:55.108Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:00.109757 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:00.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:00.109757 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:00.109Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:05.110756 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:05.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:05.110756 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:05.110Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:10.111675 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:10.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:10.111675 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:10.111Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:15.112754 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:15.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:15.112754 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:15.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:20.113426 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:20.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:20.113426 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:20.112Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:25.114280 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:25.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:25.114280 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:25.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:30.114504 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:30.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:30.114504 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:30.113Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:35.114990 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:35.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:35.114990 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:35.114Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:40.116023 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:40.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:40.116023 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:40.115Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:45.117214 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:45.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:45.117214 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:45.116Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:50.118230 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:50.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:50.118230 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:50.117Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:55.118673 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:55.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:27:55.118673 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:27:55.118Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:00.119838 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:00.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:00.119838 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:00.119Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:05.120982 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:05.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:05.120982 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:05.120Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:10.122139 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:10.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:10.122139 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:10.121Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:15.122670 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:15.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:15.122670 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:15.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:20.123600 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:20.122Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:20.123600 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:20.123Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:25.124623 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:25.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:25.124623 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:25.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:30.124787 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:30.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:30.124787 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:30.124Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:33.390115 systemd[1]: Started sshd@108-139.178.70.43:22-186.67.248.6:36676.service. Feb 13 10:28:33.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.70.43:22-186.67.248.6:36676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:33.476473 kernel: audit: type=1130 audit(1707820113.389:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.70.43:22-186.67.248.6:36676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:34.225750 sshd[2653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:28:34.225000 audit[2653]: USER_AUTH pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:28:34.314525 kernel: audit: type=1100 audit(1707820114.225:186): pid=2653 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:28:35.125841 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:35.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:35.125841 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:35.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:36.337107 sshd[2653]: Failed password for root from 186.67.248.6 port 36676 ssh2 Feb 13 10:28:37.711272 sshd[2653]: Received disconnect from 186.67.248.6 port 36676:11: Bye Bye [preauth] Feb 13 10:28:37.711272 sshd[2653]: Disconnected from authenticating user root 186.67.248.6 port 36676 [preauth] Feb 13 10:28:37.713750 systemd[1]: sshd@108-139.178.70.43:22-186.67.248.6:36676.service: Deactivated successfully. Feb 13 10:28:37.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.70.43:22-186.67.248.6:36676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:37.805663 kernel: audit: type=1131 audit(1707820117.713:187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.70.43:22-186.67.248.6:36676 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:40.126792 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:40.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:40.126792 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:40.125Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:45.126747 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:45.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:45.126747 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:45.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:48.014334 systemd[1]: Started sshd@109-139.178.70.43:22-49.43.249.179:16271.service. Feb 13 10:28:48.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.43:22-49.43.249.179:16271 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:48.106655 kernel: audit: type=1130 audit(1707820128.013:188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.43:22-49.43.249.179:16271 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:49.500239 sshd[2658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:28:49.500000 audit[2658]: USER_AUTH pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:28:49.592647 kernel: audit: type=1100 audit(1707820129.500:189): pid=2658 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:28:50.127391 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:50.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:50.127391 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:50.126Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:51.671684 sshd[2658]: Failed password for root from 49.43.249.179 port 16271 ssh2 Feb 13 10:28:53.118807 sshd[2658]: Received disconnect from 49.43.249.179 port 16271:11: Bye Bye [preauth] Feb 13 10:28:53.118807 sshd[2658]: Disconnected from authenticating user root 49.43.249.179 port 16271 [preauth] Feb 13 10:28:53.121287 systemd[1]: sshd@109-139.178.70.43:22-49.43.249.179:16271.service: Deactivated successfully. Feb 13 10:28:53.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.43:22-49.43.249.179:16271 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:53.213635 kernel: audit: type=1131 audit(1707820133.121:190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.43:22-49.43.249.179:16271 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:28:55.128568 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:55.127Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:28:55.128568 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:28:55.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:00.129519 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:00.128Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:00.129519 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:00.129Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:05.130787 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:05.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:05.130787 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:05.130Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:10.131918 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:10.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:10.131918 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:10.131Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:15.132957 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:15.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:15.132957 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:15.132Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:20.134139 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:20.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:20.134139 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:20.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:25.134373 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:25.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:25.134373 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:25.133Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:30.135199 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:30.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:30.135199 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:30.134Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:35.135642 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:35.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:35.135642 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:35.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:40.136138 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:40.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:40.136138 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:40.135Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:45.137015 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:45.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:45.137015 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:45.136Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:50.137957 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:50.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:50.137957 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:50.137Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:55.138552 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:55.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:29:55.138552 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:29:55.138Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:00.139853 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:00.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:00.139853 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:00.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:05.140420 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:05.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:05.140420 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:05.139Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:10.141448 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:10.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:10.141448 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:10.140Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:15.142148 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:15.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:15.142148 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:15.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:17.677871 systemd[1]: Started sshd@110-139.178.70.43:22-49.43.249.179:20108.service. Feb 13 10:30:17.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.70.43:22-49.43.249.179:20108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:17.771660 kernel: audit: type=1130 audit(1707820217.677:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.70.43:22-49.43.249.179:20108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:18.911203 sshd[2666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:30:18.911000 audit[2666]: USER_AUTH pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:30:19.004652 kernel: audit: type=1100 audit(1707820218.911:192): pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:30:20.142556 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:20.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:20.142556 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:20.141Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:20.967244 sshd[2666]: Failed password for root from 49.43.249.179 port 20108 ssh2 Feb 13 10:30:22.027505 systemd[1]: Started sshd@111-139.178.70.43:22-186.67.248.6:43215.service. Feb 13 10:30:22.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.43:22-186.67.248.6:43215 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:22.119662 kernel: audit: type=1130 audit(1707820222.027:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.43:22-186.67.248.6:43215 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:22.478993 sshd[2666]: Received disconnect from 49.43.249.179 port 20108:11: Bye Bye [preauth] Feb 13 10:30:22.478993 sshd[2666]: Disconnected from authenticating user root 49.43.249.179 port 20108 [preauth] Feb 13 10:30:22.481450 systemd[1]: sshd@110-139.178.70.43:22-49.43.249.179:20108.service: Deactivated successfully. Feb 13 10:30:22.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.70.43:22-49.43.249.179:20108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:22.575664 kernel: audit: type=1131 audit(1707820222.481:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.70.43:22-49.43.249.179:20108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:22.863497 sshd[2669]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:30:22.863000 audit[2669]: USER_AUTH pid=2669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:30:22.959656 kernel: audit: type=1100 audit(1707820222.863:195): pid=2669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:30:24.467997 sshd[2669]: Failed password for root from 186.67.248.6 port 43215 ssh2 Feb 13 10:30:24.674323 sshd[2669]: Received disconnect from 186.67.248.6 port 43215:11: Bye Bye [preauth] Feb 13 10:30:24.674323 sshd[2669]: Disconnected from authenticating user root 186.67.248.6 port 43215 [preauth] Feb 13 10:30:24.676821 systemd[1]: sshd@111-139.178.70.43:22-186.67.248.6:43215.service: Deactivated successfully. Feb 13 10:30:24.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.43:22-186.67.248.6:43215 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:24.770655 kernel: audit: type=1131 audit(1707820224.676:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.43:22-186.67.248.6:43215 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:30:25.142705 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:25.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:25.142705 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:25.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:30.143310 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:30.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:30.143310 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:30.142Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:35.144590 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:35.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:35.144590 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:35.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:40.145607 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:40.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:40.145607 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:40.144Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:45.146287 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:45.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:45.146287 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:45.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:50.146519 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:50.145Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:50.146519 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:50.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:55.146774 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:55.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:30:55.146774 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:30:55.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:00.147701 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:00.146Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:00.147701 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:00.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:00.151909 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 10:31:00.163606 systemd-tmpfiles[2675]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 10:31:00.163821 systemd-tmpfiles[2675]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 10:31:00.164488 systemd-tmpfiles[2675]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 10:31:00.181564 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 10:31:00.181962 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 10:31:00.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:31:00.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:31:00.273357 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 10:31:00.361284 kernel: audit: type=1130 audit(1707820260.181:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:31:00.361328 kernel: audit: type=1131 audit(1707820260.181:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:31:05.148161 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:05.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:05.148161 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:05.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:10.148303 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:10.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:10.148303 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:10.147Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:15.149512 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:15.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:15.149512 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:15.148Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:20.150094 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:20.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:20.150094 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:20.149Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:25.150874 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:25.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:25.150874 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:25.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:30.151332 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:30.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:30.151332 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:30.150Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:35.152042 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:35.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:35.152042 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:35.151Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:40.153178 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:40.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:40.153178 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:40.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:45.153428 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:45.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:45.153428 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:45.152Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:50.154293 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:50.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:50.154293 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:50.153Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:55.154744 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:55.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:31:55.154744 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:31:55.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:00.155569 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:00.154Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:00.155569 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:00.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:03.773664 systemd[1]: Started sshd@112-139.178.70.43:22-210.18.182.28:15197.service. Feb 13 10:32:03.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.70.43:22-210.18.182.28:15197 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:03.867691 kernel: audit: type=1130 audit(1707820323.772:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.70.43:22-210.18.182.28:15197 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:04.930021 sshd[2681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.18.182.28 user=root Feb 13 10:32:04.928000 audit[2681]: USER_AUTH pid=2681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.18.182.28 addr=210.18.182.28 terminal=ssh res=failed' Feb 13 10:32:05.022531 kernel: audit: type=1100 audit(1707820324.928:200): pid=2681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.18.182.28 addr=210.18.182.28 terminal=ssh res=failed' Feb 13 10:32:05.156303 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:05.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:05.156303 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:05.155Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:06.870730 sshd[2681]: Failed password for root from 210.18.182.28 port 15197 ssh2 Feb 13 10:32:08.480846 sshd[2681]: Received disconnect from 210.18.182.28 port 15197:11: Bye Bye [preauth] Feb 13 10:32:08.480846 sshd[2681]: Disconnected from authenticating user root 210.18.182.28 port 15197 [preauth] Feb 13 10:32:08.483349 systemd[1]: sshd@112-139.178.70.43:22-210.18.182.28:15197.service: Deactivated successfully. Feb 13 10:32:08.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.70.43:22-210.18.182.28:15197 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:08.576478 kernel: audit: type=1131 audit(1707820328.482:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.70.43:22-210.18.182.28:15197 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:10.156827 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:10.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:10.156827 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:10.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:10.394694 systemd[1]: Started sshd@113-139.178.70.43:22-186.67.248.6:49705.service. Feb 13 10:32:10.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.43:22-186.67.248.6:49705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:10.488664 kernel: audit: type=1130 audit(1707820330.393:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.43:22-186.67.248.6:49705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:11.208309 sshd[2686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:32:11.207000 audit[2686]: USER_AUTH pid=2686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:32:11.300534 kernel: audit: type=1100 audit(1707820331.207:203): pid=2686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:32:13.444837 sshd[2686]: Failed password for root from 186.67.248.6 port 49705 ssh2 Feb 13 10:32:14.693246 sshd[2686]: Received disconnect from 186.67.248.6 port 49705:11: Bye Bye [preauth] Feb 13 10:32:14.693246 sshd[2686]: Disconnected from authenticating user root 186.67.248.6 port 49705 [preauth] Feb 13 10:32:14.695763 systemd[1]: sshd@113-139.178.70.43:22-186.67.248.6:49705.service: Deactivated successfully. Feb 13 10:32:14.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.43:22-186.67.248.6:49705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:14.788655 kernel: audit: type=1131 audit(1707820334.694:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.43:22-186.67.248.6:49705 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:32:15.157451 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:15.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:15.157451 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:15.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:20.157612 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:20.156Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:20.157612 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:20.157Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:25.158834 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:25.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:25.158834 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:25.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:30.159562 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:30.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:30.159562 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:30.158Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:35.160125 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:35.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:35.160125 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:35.159Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:40.160986 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:40.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:40.160986 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:40.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:45.161291 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:45.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:45.161291 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:45.160Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:50.161990 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:50.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:50.161990 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:50.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:55.162577 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:55.161Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:32:55.162577 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:32:55.162Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:00.163639 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:00.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:00.163639 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:00.163Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:05.164751 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:05.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:05.164751 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:05.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:10.165047 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:10.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:10.165047 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:10.164Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:15.166180 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:15.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:15.166180 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:15.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:20.166359 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:20.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:20.166359 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:20.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:25.166581 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:25.165Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:25.166581 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:25.166Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:30.167668 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:30.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:30.167668 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:30.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:35.168414 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:35.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:35.168414 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:35.167Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:39.875277 systemd[1]: Started sshd@114-139.178.70.43:22-49.43.249.179:55183.service. Feb 13 10:33:39.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.70.43:22-49.43.249.179:55183 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:33:39.968475 kernel: audit: type=1130 audit(1707820419.873:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.70.43:22-49.43.249.179:55183 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:33:40.169670 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:40.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:40.169670 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:40.168Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:41.025287 sshd[2691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:33:41.024000 audit[2691]: USER_AUTH pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:33:41.118660 kernel: audit: type=1100 audit(1707820421.024:206): pid=2691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:33:43.281767 sshd[2691]: Failed password for root from 49.43.249.179 port 55183 ssh2 Feb 13 10:33:44.576575 sshd[2691]: Received disconnect from 49.43.249.179 port 55183:11: Bye Bye [preauth] Feb 13 10:33:44.576575 sshd[2691]: Disconnected from authenticating user root 49.43.249.179 port 55183 [preauth] Feb 13 10:33:44.579061 systemd[1]: sshd@114-139.178.70.43:22-49.43.249.179:55183.service: Deactivated successfully. Feb 13 10:33:44.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.70.43:22-49.43.249.179:55183 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:33:44.673658 kernel: audit: type=1131 audit(1707820424.579:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.70.43:22-49.43.249.179:55183 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:33:45.169651 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:45.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:45.169651 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:45.169Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:50.170678 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:50.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:50.170678 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:50.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:55.171020 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:55.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:33:55.171020 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:33:55.170Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:00.172069 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:00.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:00.172069 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:00.171Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:05.172749 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:05.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:05.172749 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:05.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:09.523948 systemd[1]: Started sshd@115-139.178.70.43:22-186.67.248.6:55840.service. Feb 13 10:34:09.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.43:22-186.67.248.6:55840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:09.617648 kernel: audit: type=1130 audit(1707820449.522:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.43:22-186.67.248.6:55840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:10.173263 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:10.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:10.173263 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:10.172Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:10.352426 sshd[2695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:34:10.351000 audit[2695]: USER_AUTH pid=2695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:34:10.444525 kernel: audit: type=1100 audit(1707820450.351:209): pid=2695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:34:12.257830 sshd[2695]: Failed password for root from 186.67.248.6 port 55840 ssh2 Feb 13 10:34:13.837411 sshd[2695]: Received disconnect from 186.67.248.6 port 55840:11: Bye Bye [preauth] Feb 13 10:34:13.837411 sshd[2695]: Disconnected from authenticating user root 186.67.248.6 port 55840 [preauth] Feb 13 10:34:13.839903 systemd[1]: sshd@115-139.178.70.43:22-186.67.248.6:55840.service: Deactivated successfully. Feb 13 10:34:13.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.43:22-186.67.248.6:55840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:13.933662 kernel: audit: type=1131 audit(1707820453.838:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.43:22-186.67.248.6:55840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:15.174028 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:15.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:15.174028 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:15.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:20.174420 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:20.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:20.174420 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:20.173Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:20.214239 systemd[1]: Started sshd@116-139.178.70.43:22-43.153.168.2:36538.service. Feb 13 10:34:20.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.70.43:22-43.153.168.2:36538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:20.308662 kernel: audit: type=1130 audit(1707820460.213:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.70.43:22-43.153.168.2:36538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:21.125042 sshd[2704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.168.2 user=root Feb 13 10:34:21.123000 audit[2704]: USER_AUTH pid=2704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.153.168.2 addr=43.153.168.2 terminal=ssh res=failed' Feb 13 10:34:21.216646 kernel: audit: type=1100 audit(1707820461.123:212): pid=2704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.153.168.2 addr=43.153.168.2 terminal=ssh res=failed' Feb 13 10:34:23.542155 sshd[2704]: Failed password for root from 43.153.168.2 port 36538 ssh2 Feb 13 10:34:24.625773 sshd[2704]: Received disconnect from 43.153.168.2 port 36538:11: Bye Bye [preauth] Feb 13 10:34:24.625773 sshd[2704]: Disconnected from authenticating user root 43.153.168.2 port 36538 [preauth] Feb 13 10:34:24.628236 systemd[1]: sshd@116-139.178.70.43:22-43.153.168.2:36538.service: Deactivated successfully. Feb 13 10:34:24.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.70.43:22-43.153.168.2:36538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:24.721546 kernel: audit: type=1131 audit(1707820464.627:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.70.43:22-43.153.168.2:36538 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:34:25.175060 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:25.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:25.175060 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:25.174Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:30.176059 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:30.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:30.176059 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:30.175Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:35.177161 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:35.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:35.177161 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:35.176Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:40.178633 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:40.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:40.178633 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:40.177Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:45.179053 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:45.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:45.179053 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:45.178Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:50.179790 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:50.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:50.179790 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:50.179Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:55.180970 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:55.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:34:55.180970 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:34:55.180Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:00.181970 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:00.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:00.181970 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:00.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:05.182392 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:05.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:05.182392 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:05.181Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:10.183229 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:10.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:10.183229 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:10.182Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:15.183660 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:15.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:15.183660 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:15.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:20.184423 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:20.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:20.184423 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:20.183Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:25.185392 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:25.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:25.185392 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:25.184Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:30.186311 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:30.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:30.186311 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:30.185Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:35.186827 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:35.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:35.186827 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:35.186Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:40.187897 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:40.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:40.187897 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:40.187Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:45.188740 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:45.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:45.188740 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:45.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:50.188922 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:50.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:50.188922 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:50.188Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:55.189764 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:55.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:55.189764 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:35:55.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:35:59.344113 systemd[1]: Started sshd@117-139.178.70.43:22-186.67.248.6:34420.service. Feb 13 10:35:59.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.70.43:22-186.67.248.6:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:35:59.436490 kernel: audit: type=1130 audit(1707820559.343:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.70.43:22-186.67.248.6:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:00.172125 sshd[2710]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:36:00.171000 audit[2710]: USER_AUTH pid=2710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:36:00.190013 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:00.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:00.190013 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:00.189Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:00.264659 kernel: audit: type=1100 audit(1707820560.171:215): pid=2710 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:36:02.177653 sshd[2710]: Failed password for root from 186.67.248.6 port 34420 ssh2 Feb 13 10:36:03.656755 sshd[2710]: Received disconnect from 186.67.248.6 port 34420:11: Bye Bye [preauth] Feb 13 10:36:03.656755 sshd[2710]: Disconnected from authenticating user root 186.67.248.6 port 34420 [preauth] Feb 13 10:36:03.659239 systemd[1]: sshd@117-139.178.70.43:22-186.67.248.6:34420.service: Deactivated successfully. Feb 13 10:36:03.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.70.43:22-186.67.248.6:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:03.752658 kernel: audit: type=1131 audit(1707820563.659:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.70.43:22-186.67.248.6:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:05.191045 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:05.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:05.191045 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:05.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:10.191379 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:10.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:10.191379 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:10.190Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:15.192686 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:15.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:15.192686 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:15.192Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:20.193708 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:20.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:20.193708 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:20.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:23.862004 systemd[1]: Started sshd@118-139.178.70.43:22-103.10.44.45:54340.service. Feb 13 10:36:23.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.70.43:22-103.10.44.45:54340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:23.954661 kernel: audit: type=1130 audit(1707820583.861:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.70.43:22-103.10.44.45:54340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:24.971639 sshd[2717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.44.45 user=root Feb 13 10:36:24.971000 audit[2717]: USER_AUTH pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.10.44.45 addr=103.10.44.45 terminal=ssh res=failed' Feb 13 10:36:25.063630 kernel: audit: type=1100 audit(1707820584.971:218): pid=2717 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.10.44.45 addr=103.10.44.45 terminal=ssh res=failed' Feb 13 10:36:25.194279 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:25.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:25.194279 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:25.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:25.695893 systemd[1]: Started sshd@119-139.178.70.43:22-82.157.235.246:33698.service. Feb 13 10:36:25.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.43:22-82.157.235.246:33698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:25.789655 kernel: audit: type=1130 audit(1707820585.695:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.43:22-82.157.235.246:33698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:26.606129 sshd[2717]: Failed password for root from 103.10.44.45 port 54340 ssh2 Feb 13 10:36:26.736520 sshd[2720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.157.235.246 user=root Feb 13 10:36:26.736000 audit[2720]: USER_AUTH pid=2720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=82.157.235.246 addr=82.157.235.246 terminal=ssh res=failed' Feb 13 10:36:26.829651 kernel: audit: type=1100 audit(1707820586.736:220): pid=2720 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=82.157.235.246 addr=82.157.235.246 terminal=ssh res=failed' Feb 13 10:36:26.837076 sshd[2717]: Received disconnect from 103.10.44.45 port 54340:11: Bye Bye [preauth] Feb 13 10:36:26.837076 sshd[2717]: Disconnected from authenticating user root 103.10.44.45 port 54340 [preauth] Feb 13 10:36:26.837633 systemd[1]: sshd@118-139.178.70.43:22-103.10.44.45:54340.service: Deactivated successfully. Feb 13 10:36:26.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.70.43:22-103.10.44.45:54340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:26.930657 kernel: audit: type=1131 audit(1707820586.837:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.70.43:22-103.10.44.45:54340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:28.310971 sshd[2720]: Failed password for root from 82.157.235.246 port 33698 ssh2 Feb 13 10:36:28.589574 sshd[2720]: Received disconnect from 82.157.235.246 port 33698:11: Bye Bye [preauth] Feb 13 10:36:28.589574 sshd[2720]: Disconnected from authenticating user root 82.157.235.246 port 33698 [preauth] Feb 13 10:36:28.591902 systemd[1]: sshd@119-139.178.70.43:22-82.157.235.246:33698.service: Deactivated successfully. Feb 13 10:36:28.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.43:22-82.157.235.246:33698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:28.685531 kernel: audit: type=1131 audit(1707820588.591:222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.43:22-82.157.235.246:33698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:30.194569 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:30.193Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:30.194569 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:30.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:35.194833 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:35.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:35.194833 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:35.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:40.195290 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:40.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:40.195290 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:40.194Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:45.195695 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:45.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:45.195695 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:45.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:50.196349 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:50.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:50.196349 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:50.195Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:55.197544 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:55.196Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:55.197544 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:36:55.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:36:56.769583 systemd[1]: Started sshd@120-139.178.70.43:22-210.18.182.28:14223.service. Feb 13 10:36:56.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.70.43:22-210.18.182.28:14223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:56.862525 kernel: audit: type=1130 audit(1707820616.768:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.70.43:22-210.18.182.28:14223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:36:58.192062 sshd[2726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.18.182.28 user=root Feb 13 10:36:58.190000 audit[2726]: USER_AUTH pid=2726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.18.182.28 addr=210.18.182.28 terminal=ssh res=failed' Feb 13 10:36:58.284524 kernel: audit: type=1100 audit(1707820618.190:224): pid=2726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.18.182.28 addr=210.18.182.28 terminal=ssh res=failed' Feb 13 10:36:59.826675 sshd[2726]: Failed password for root from 210.18.182.28 port 14223 ssh2 Feb 13 10:37:00.124087 sshd[2726]: Received disconnect from 210.18.182.28 port 14223:11: Bye Bye [preauth] Feb 13 10:37:00.124087 sshd[2726]: Disconnected from authenticating user root 210.18.182.28 port 14223 [preauth] Feb 13 10:37:00.126433 systemd[1]: sshd@120-139.178.70.43:22-210.18.182.28:14223.service: Deactivated successfully. Feb 13 10:37:00.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.70.43:22-210.18.182.28:14223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:00.198046 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:00.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:00.198046 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:00.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:00.220659 kernel: audit: type=1131 audit(1707820620.125:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.70.43:22-210.18.182.28:14223 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:05.198579 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:05.197Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:05.198579 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:05.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:10.198737 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:10.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:10.198737 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:10.198Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:15.199622 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:15.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:15.199622 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:15.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:20.200209 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:20.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:20.200209 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:20.199Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:25.201279 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:25.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:25.201279 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:25.200Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:30.201886 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:30.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:30.201886 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:30.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:35.202345 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:35.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:35.202345 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:35.201Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:40.203643 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:40.202Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:40.203643 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:40.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:42.310146 systemd[1]: Started sshd@121-139.178.70.43:22-186.67.248.6:42295.service. Feb 13 10:37:42.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.43:22-186.67.248.6:42295 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:42.403658 kernel: audit: type=1130 audit(1707820662.309:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.43:22-186.67.248.6:42295 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:43.138349 sshd[2730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:37:43.137000 audit[2730]: ANOM_LOGIN_FAILURES pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:43.138603 sshd[2730]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 10:37:43.137000 audit[2730]: USER_AUTH pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:37:43.294856 kernel: audit: type=2100 audit(1707820663.137:227): pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:43.294890 kernel: audit: type=1100 audit(1707820663.137:228): pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:37:45.204014 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:45.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:45.204014 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:45.203Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:45.284843 sshd[2730]: Failed password for root from 186.67.248.6 port 42295 ssh2 Feb 13 10:37:46.623394 sshd[2730]: Received disconnect from 186.67.248.6 port 42295:11: Bye Bye [preauth] Feb 13 10:37:46.623394 sshd[2730]: Disconnected from authenticating user root 186.67.248.6 port 42295 [preauth] Feb 13 10:37:46.625867 systemd[1]: sshd@121-139.178.70.43:22-186.67.248.6:42295.service: Deactivated successfully. Feb 13 10:37:46.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.43:22-186.67.248.6:42295 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:46.719669 kernel: audit: type=1131 audit(1707820666.625:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.43:22-186.67.248.6:42295 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:37:50.204876 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:50.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:50.204876 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:50.204Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:55.206039 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:55.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:37:55.206039 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:37:55.205Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:00.206891 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:00.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:00.206891 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:00.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:05.207196 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:05.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:05.207196 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:05.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:10.207409 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:10.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:10.207409 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:10.206Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:15.207579 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:15.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:15.207579 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:15.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:20.208143 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:20.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:20.208143 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:20.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:25.208611 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:25.207Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:25.208611 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:25.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:30.209559 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:30.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:30.209559 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:30.208Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:30.997433 systemd[1]: Started sshd@122-139.178.70.43:22-49.43.249.179:40291.service. Feb 13 10:38:30.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.70.43:22-49.43.249.179:40291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:38:31.090572 kernel: audit: type=1130 audit(1707820710.997:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.70.43:22-49.43.249.179:40291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:38:32.157869 sshd[2735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:38:32.157000 audit[2735]: USER_AUTH pid=2735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:38:32.249494 kernel: audit: type=1100 audit(1707820712.157:231): pid=2735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:38:33.697087 sshd[2735]: Failed password for root from 49.43.249.179 port 40291 ssh2 Feb 13 10:38:34.037689 sshd[2735]: Received disconnect from 49.43.249.179 port 40291:11: Bye Bye [preauth] Feb 13 10:38:34.037689 sshd[2735]: Disconnected from authenticating user root 49.43.249.179 port 40291 [preauth] Feb 13 10:38:34.040136 systemd[1]: sshd@122-139.178.70.43:22-49.43.249.179:40291.service: Deactivated successfully. Feb 13 10:38:34.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.70.43:22-49.43.249.179:40291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:38:34.133659 kernel: audit: type=1131 audit(1707820714.040:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.70.43:22-49.43.249.179:40291 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:38:35.210269 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:35.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:35.210269 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:35.209Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:40.211326 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:40.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:40.211326 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:40.210Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:45.212049 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:45.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:45.212049 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:45.211Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:50.213007 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:50.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:50.213007 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:50.212Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:52.870940 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:38:52.870Z","caller":"traceutil/trace.go:171","msg":"trace[1105826919] linearizableReadLoop","detail":"{readStateIndex:10; appliedIndex:10; }","duration":"149.835863ms","start":"2024-02-13T10:38:52.720Z","end":"2024-02-13T10:38:52.870Z","steps":["trace[1105826919] 'read index received' (duration: 149.827664ms)","trace[1105826919] 'applied index is now lower than readState.Index' (duration: 6.464µs)"],"step_count":2} Feb 13 10:38:52.870940 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:52.870Z","caller":"etcdserver/util.go:166","msg":"apply request took too long","took":"150.091645ms","expected-duration":"100ms","prefix":"read-only range ","request":"key:\"health\" ","response":"range_response_count:0 size:4"} Feb 13 10:38:52.870940 etcd-wrapper[1724]: {"level":"info","ts":"2024-02-13T10:38:52.870Z","caller":"traceutil/trace.go:171","msg":"trace[1968464466] range","detail":"{range_begin:health; range_end:; response_count:0; response_revision:1; }","duration":"150.206145ms","start":"2024-02-13T10:38:52.720Z","end":"2024-02-13T10:38:52.870Z","steps":["trace[1968464466] 'agreement among raft nodes before linearized reading' (duration: 150.056261ms)"],"step_count":1} Feb 13 10:38:55.213998 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:55.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:38:55.213998 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:38:55.213Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:00.214872 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:00.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:00.214872 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:00.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:05.215574 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:05.214Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:05.215574 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:05.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:10.216288 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:10.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:10.216288 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:10.215Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:15.217053 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:15.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:15.217053 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:15.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:20.217285 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:20.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:20.217285 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:20.216Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:25.218137 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:25.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:25.218137 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:25.217Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:26.009206 systemd[1]: Started sshd@123-139.178.70.43:22-186.67.248.6:44145.service. Feb 13 10:39:26.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.43:22-186.67.248.6:44145 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:39:26.102649 kernel: audit: type=1130 audit(1707820766.008:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.43:22-186.67.248.6:44145 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:39:26.841085 sshd[2743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:39:26.840000 audit[2743]: USER_AUTH pid=2743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:39:26.932639 kernel: audit: type=1100 audit(1707820766.840:234): pid=2743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:39:28.124676 sshd[2743]: Failed password for root from 186.67.248.6 port 44145 ssh2 Feb 13 10:39:28.655763 sshd[2743]: Received disconnect from 186.67.248.6 port 44145:11: Bye Bye [preauth] Feb 13 10:39:28.655763 sshd[2743]: Disconnected from authenticating user root 186.67.248.6 port 44145 [preauth] Feb 13 10:39:28.658275 systemd[1]: sshd@123-139.178.70.43:22-186.67.248.6:44145.service: Deactivated successfully. Feb 13 10:39:28.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.43:22-186.67.248.6:44145 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:39:28.751655 kernel: audit: type=1131 audit(1707820768.658:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.43:22-186.67.248.6:44145 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:39:30.219138 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:30.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:30.219138 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:30.218Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:35.219705 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:35.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:35.219705 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:35.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:40.220606 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:40.219Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:40.220606 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:40.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:45.221255 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:45.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:45.221255 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:45.220Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:50.222226 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:50.221Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:50.222226 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:50.221Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:55.222616 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:55.221Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:55.222616 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:39:55.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:39:59.900733 systemd[1]: Started sshd@124-139.178.70.43:22-104.199.162.173:49972.service. Feb 13 10:39:59.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.70.43:22-104.199.162.173:49972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:39:59.993660 kernel: audit: type=1130 audit(1707820799.899:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.70.43:22-104.199.162.173:49972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:00.223215 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:00.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:00.223215 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:00.222Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:00.695397 sshd[2748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.162.173 user=root Feb 13 10:40:00.694000 audit[2748]: USER_AUTH pid=2748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.199.162.173 addr=104.199.162.173 terminal=ssh res=failed' Feb 13 10:40:00.788646 kernel: audit: type=1100 audit(1707820800.694:237): pid=2748 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.199.162.173 addr=104.199.162.173 terminal=ssh res=failed' Feb 13 10:40:03.318063 sshd[2748]: Failed password for root from 104.199.162.173 port 49972 ssh2 Feb 13 10:40:04.174047 sshd[2748]: Received disconnect from 104.199.162.173 port 49972:11: Bye Bye [preauth] Feb 13 10:40:04.174047 sshd[2748]: Disconnected from authenticating user root 104.199.162.173 port 49972 [preauth] Feb 13 10:40:04.176553 systemd[1]: sshd@124-139.178.70.43:22-104.199.162.173:49972.service: Deactivated successfully. Feb 13 10:40:04.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.70.43:22-104.199.162.173:49972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:04.269472 kernel: audit: type=1131 audit(1707820804.175:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.70.43:22-104.199.162.173:49972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:05.223622 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:05.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:05.223622 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:05.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:10.224202 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:10.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:10.224202 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:10.223Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:15.225253 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:15.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:15.225253 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:15.224Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:20.226307 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:20.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:20.226307 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:20.225Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:22.359946 systemd[1]: Started sshd@125-139.178.70.43:22-170.64.130.116:49694.service. Feb 13 10:40:22.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.43:22-170.64.130.116:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:22.453664 kernel: audit: type=1130 audit(1707820822.358:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.43:22-170.64.130.116:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:23.224273 sshd[2753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.130.116 user=root Feb 13 10:40:23.223000 audit[2753]: USER_AUTH pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.64.130.116 addr=170.64.130.116 terminal=ssh res=failed' Feb 13 10:40:23.316647 kernel: audit: type=1100 audit(1707820823.223:240): pid=2753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.64.130.116 addr=170.64.130.116 terminal=ssh res=failed' Feb 13 10:40:25.227358 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:25.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:25.227358 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:25.226Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:25.671059 sshd[2753]: Failed password for root from 170.64.130.116 port 49694 ssh2 Feb 13 10:40:26.716765 sshd[2753]: Received disconnect from 170.64.130.116 port 49694:11: Bye Bye [preauth] Feb 13 10:40:26.716765 sshd[2753]: Disconnected from authenticating user root 170.64.130.116 port 49694 [preauth] Feb 13 10:40:26.719217 systemd[1]: sshd@125-139.178.70.43:22-170.64.130.116:49694.service: Deactivated successfully. Feb 13 10:40:26.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.43:22-170.64.130.116:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:26.813680 kernel: audit: type=1131 audit(1707820826.718:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.43:22-170.64.130.116:49694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:30.228624 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:30.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:30.228624 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:30.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:34.409594 systemd[1]: Started sshd@126-139.178.70.43:22-114.36.109.37:43773.service. Feb 13 10:40:34.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.43:22-114.36.109.37:43773 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:34.502473 kernel: audit: type=1130 audit(1707820834.408:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.43:22-114.36.109.37:43773 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:35.181505 sshd[2758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.36.109.37 user=root Feb 13 10:40:35.180000 audit[2758]: USER_AUTH pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=114.36.109.37 addr=114.36.109.37 terminal=ssh res=failed' Feb 13 10:40:35.228385 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:35.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:35.229433 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:35.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:35.273657 kernel: audit: type=1100 audit(1707820835.180:243): pid=2758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=114.36.109.37 addr=114.36.109.37 terminal=ssh res=failed' Feb 13 10:40:37.608663 sshd[2758]: Failed password for root from 114.36.109.37 port 43773 ssh2 Feb 13 10:40:38.656219 sshd[2758]: Received disconnect from 114.36.109.37 port 43773:11: Bye Bye [preauth] Feb 13 10:40:38.656219 sshd[2758]: Disconnected from authenticating user root 114.36.109.37 port 43773 [preauth] Feb 13 10:40:38.658714 systemd[1]: sshd@126-139.178.70.43:22-114.36.109.37:43773.service: Deactivated successfully. Feb 13 10:40:38.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.43:22-114.36.109.37:43773 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:38.752665 kernel: audit: type=1131 audit(1707820838.657:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.43:22-114.36.109.37:43773 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:40.229205 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:40.228Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:40.230530 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:40.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:45.229737 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:45.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:45.230813 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:45.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:50.229998 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:50.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:50.231010 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:50.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:50.653550 systemd[1]: Started sshd@127-139.178.70.43:22-117.50.210.148:22116.service. Feb 13 10:40:50.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.43:22-117.50.210.148:22116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:50.746489 kernel: audit: type=1130 audit(1707820850.652:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.43:22-117.50.210.148:22116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:51.682333 sshd[2762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.50.210.148 user=root Feb 13 10:40:51.681000 audit[2762]: ANOM_LOGIN_FAILURES pid=2762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:51.682589 sshd[2762]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 13 10:40:51.681000 audit[2762]: USER_AUTH pid=2762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=117.50.210.148 addr=117.50.210.148 terminal=ssh res=failed' Feb 13 10:40:51.838784 kernel: audit: type=2100 audit(1707820851.681:246): pid=2762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:51.838819 kernel: audit: type=1100 audit(1707820851.681:247): pid=2762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=117.50.210.148 addr=117.50.210.148 terminal=ssh res=failed' Feb 13 10:40:53.638083 sshd[2762]: Failed password for root from 117.50.210.148 port 22116 ssh2 Feb 13 10:40:55.207204 sshd[2762]: Received disconnect from 117.50.210.148 port 22116:11: Bye Bye [preauth] Feb 13 10:40:55.207204 sshd[2762]: Disconnected from authenticating user root 117.50.210.148 port 22116 [preauth] Feb 13 10:40:55.209693 systemd[1]: sshd@127-139.178.70.43:22-117.50.210.148:22116.service: Deactivated successfully. Feb 13 10:40:55.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.43:22-117.50.210.148:22116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:40:55.229964 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:55.229Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:55.230991 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:40:55.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:40:55.303656 kernel: audit: type=1131 audit(1707820855.208:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.43:22-117.50.210.148:22116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:00.231100 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:00.230Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:00.232250 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:00.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:01.942149 systemd[1]: Started sshd@128-139.178.70.43:22-175.178.56.243:52752.service. Feb 13 10:41:01.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.43:22-175.178.56.243:52752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:02.035657 kernel: audit: type=1130 audit(1707820861.940:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.43:22-175.178.56.243:52752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:02.872698 sshd[2766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.178.56.243 user=root Feb 13 10:41:02.871000 audit[2766]: USER_AUTH pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=175.178.56.243 addr=175.178.56.243 terminal=ssh res=failed' Feb 13 10:41:02.965633 kernel: audit: type=1100 audit(1707820862.871:250): pid=2766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=175.178.56.243 addr=175.178.56.243 terminal=ssh res=failed' Feb 13 10:41:05.004116 sshd[2766]: Failed password for root from 175.178.56.243 port 52752 ssh2 Feb 13 10:41:05.231966 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:05.231Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:05.237794 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:05.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:06.377545 sshd[2766]: Received disconnect from 175.178.56.243 port 52752:11: Bye Bye [preauth] Feb 13 10:41:06.377545 sshd[2766]: Disconnected from authenticating user root 175.178.56.243 port 52752 [preauth] Feb 13 10:41:06.380128 systemd[1]: sshd@128-139.178.70.43:22-175.178.56.243:52752.service: Deactivated successfully. Feb 13 10:41:06.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.43:22-175.178.56.243:52752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:06.474656 kernel: audit: type=1131 audit(1707820866.379:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.43:22-175.178.56.243:52752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:10.073952 systemd[1]: Started sshd@129-139.178.70.43:22-154.85.62.32:38804.service. Feb 13 10:41:10.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.43:22-154.85.62.32:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:10.167473 kernel: audit: type=1130 audit(1707820870.072:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.43:22-154.85.62.32:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:10.232779 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:10.232Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:10.233814 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:10.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:10.982454 sshd[2771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.85.62.32 user=root Feb 13 10:41:10.981000 audit[2771]: USER_AUTH pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=154.85.62.32 addr=154.85.62.32 terminal=ssh res=failed' Feb 13 10:41:11.074525 kernel: audit: type=1100 audit(1707820870.981:253): pid=2771 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=154.85.62.32 addr=154.85.62.32 terminal=ssh res=failed' Feb 13 10:41:11.915608 systemd[1]: Started sshd@130-139.178.70.43:22-186.67.248.6:51905.service. Feb 13 10:41:11.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.43:22-186.67.248.6:51905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:12.009664 kernel: audit: type=1130 audit(1707820871.914:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.43:22-186.67.248.6:51905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:12.732456 sshd[2774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.248.6 user=root Feb 13 10:41:12.731000 audit[2774]: USER_AUTH pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:41:12.825647 kernel: audit: type=1100 audit(1707820872.731:255): pid=2774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=186.67.248.6 addr=186.67.248.6 terminal=ssh res=failed' Feb 13 10:41:13.213984 sshd[2771]: Failed password for root from 154.85.62.32 port 38804 ssh2 Feb 13 10:41:14.483658 sshd[2771]: Received disconnect from 154.85.62.32 port 38804:11: Bye Bye [preauth] Feb 13 10:41:14.483658 sshd[2771]: Disconnected from authenticating user root 154.85.62.32 port 38804 [preauth] Feb 13 10:41:14.486034 systemd[1]: sshd@129-139.178.70.43:22-154.85.62.32:38804.service: Deactivated successfully. Feb 13 10:41:14.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.43:22-154.85.62.32:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:14.580664 kernel: audit: type=1131 audit(1707820874.485:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.43:22-154.85.62.32:38804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:14.904004 sshd[2774]: Failed password for root from 186.67.248.6 port 51905 ssh2 Feb 13 10:41:15.234339 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:15.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:15.234339 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:15.233Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:16.217293 sshd[2774]: Received disconnect from 186.67.248.6 port 51905:11: Bye Bye [preauth] Feb 13 10:41:16.217293 sshd[2774]: Disconnected from authenticating user root 186.67.248.6 port 51905 [preauth] Feb 13 10:41:16.219855 systemd[1]: sshd@130-139.178.70.43:22-186.67.248.6:51905.service: Deactivated successfully. Feb 13 10:41:16.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.43:22-186.67.248.6:51905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:16.313661 kernel: audit: type=1131 audit(1707820876.218:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.43:22-186.67.248.6:51905 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:19.857764 systemd[1]: Started sshd@131-139.178.70.43:22-43.153.168.2:37336.service. Feb 13 10:41:19.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.70.43:22-43.153.168.2:37336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:19.950637 kernel: audit: type=1130 audit(1707820879.856:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.70.43:22-43.153.168.2:37336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:20.235498 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:20.234Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:20.235498 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:20.235Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:20.504846 sshd[2780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.153.168.2 user=root Feb 13 10:41:20.503000 audit[2780]: USER_AUTH pid=2780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.153.168.2 addr=43.153.168.2 terminal=ssh res=failed' Feb 13 10:41:20.597655 kernel: audit: type=1100 audit(1707820880.503:259): pid=2780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.153.168.2 addr=43.153.168.2 terminal=ssh res=failed' Feb 13 10:41:23.443750 sshd[2780]: Failed password for root from 43.153.168.2 port 37336 ssh2 Feb 13 10:41:23.952832 sshd[2780]: Received disconnect from 43.153.168.2 port 37336:11: Bye Bye [preauth] Feb 13 10:41:23.952832 sshd[2780]: Disconnected from authenticating user root 43.153.168.2 port 37336 [preauth] Feb 13 10:41:23.955315 systemd[1]: sshd@131-139.178.70.43:22-43.153.168.2:37336.service: Deactivated successfully. Feb 13 10:41:23.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.70.43:22-43.153.168.2:37336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:24.048546 kernel: audit: type=1131 audit(1707820883.954:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.70.43:22-43.153.168.2:37336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:24.661046 systemd[1]: Started sshd@132-139.178.70.43:22-167.172.82.57:48658.service. Feb 13 10:41:24.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.43:22-167.172.82.57:48658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:24.754664 kernel: audit: type=1130 audit(1707820884.659:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.43:22-167.172.82.57:48658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:25.236644 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:25.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:25.236644 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:25.236Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:25.680519 sshd[2784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.82.57 user=root Feb 13 10:41:25.679000 audit[2784]: USER_AUTH pid=2784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=167.172.82.57 addr=167.172.82.57 terminal=ssh res=failed' Feb 13 10:41:25.772472 kernel: audit: type=1100 audit(1707820885.679:262): pid=2784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=167.172.82.57 addr=167.172.82.57 terminal=ssh res=failed' Feb 13 10:41:28.303624 sshd[2784]: Failed password for root from 167.172.82.57 port 48658 ssh2 Feb 13 10:41:29.204048 sshd[2784]: Received disconnect from 167.172.82.57 port 48658:11: Bye Bye [preauth] Feb 13 10:41:29.204048 sshd[2784]: Disconnected from authenticating user root 167.172.82.57 port 48658 [preauth] Feb 13 10:41:29.206557 systemd[1]: sshd@132-139.178.70.43:22-167.172.82.57:48658.service: Deactivated successfully. Feb 13 10:41:29.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.43:22-167.172.82.57:48658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:29.299650 kernel: audit: type=1131 audit(1707820889.205:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.43:22-167.172.82.57:48658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:30.237871 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:30.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:30.237871 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:30.237Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:35.238998 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:35.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:35.238998 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:35.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:38.666395 systemd[1]: Started sshd@133-139.178.70.43:22-103.10.44.45:42674.service. Feb 13 10:41:38.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.70.43:22-103.10.44.45:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:38.758505 kernel: audit: type=1130 audit(1707820898.664:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.70.43:22-103.10.44.45:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:39.753179 sshd[2788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.10.44.45 user=root Feb 13 10:41:39.751000 audit[2788]: USER_AUTH pid=2788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.10.44.45 addr=103.10.44.45 terminal=ssh res=failed' Feb 13 10:41:39.843472 kernel: audit: type=1100 audit(1707820899.751:265): pid=2788 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.10.44.45 addr=103.10.44.45 terminal=ssh res=failed' Feb 13 10:41:40.239689 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:40.238Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:40.239689 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:40.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:40.965895 sshd[2788]: Failed password for root from 103.10.44.45 port 42674 ssh2 Feb 13 10:41:41.615175 sshd[2788]: Received disconnect from 103.10.44.45 port 42674:11: Bye Bye [preauth] Feb 13 10:41:41.615175 sshd[2788]: Disconnected from authenticating user root 103.10.44.45 port 42674 [preauth] Feb 13 10:41:41.617689 systemd[1]: sshd@133-139.178.70.43:22-103.10.44.45:42674.service: Deactivated successfully. Feb 13 10:41:41.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.70.43:22-103.10.44.45:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:41.710642 kernel: audit: type=1131 audit(1707820901.616:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.70.43:22-103.10.44.45:42674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:45.240011 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:45.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:45.240011 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:45.239Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:45.253156 systemd[1]: Started sshd@134-139.178.70.43:22-219.142.106.167:52708.service. Feb 13 10:41:45.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.70.43:22-219.142.106.167:52708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:45.344652 kernel: audit: type=1130 audit(1707820905.251:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.70.43:22-219.142.106.167:52708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:47.581228 systemd[1]: Started sshd@135-139.178.70.43:22-104.199.162.173:45308.service. Feb 13 10:41:47.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.70.43:22-104.199.162.173:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:47.674671 kernel: audit: type=1130 audit(1707820907.579:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.70.43:22-104.199.162.173:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:48.379292 sshd[2794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.199.162.173 user=root Feb 13 10:41:48.378000 audit[2794]: USER_AUTH pid=2794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.199.162.173 addr=104.199.162.173 terminal=ssh res=failed' Feb 13 10:41:48.471474 kernel: audit: type=1100 audit(1707820908.378:269): pid=2794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.199.162.173 addr=104.199.162.173 terminal=ssh res=failed' Feb 13 10:41:50.240959 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:50.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:50.240959 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:50.240Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:50.826702 sshd[2794]: Failed password for root from 104.199.162.173 port 45308 ssh2 Feb 13 10:41:51.858030 sshd[2794]: Received disconnect from 104.199.162.173 port 45308:11: Bye Bye [preauth] Feb 13 10:41:51.858030 sshd[2794]: Disconnected from authenticating user root 104.199.162.173 port 45308 [preauth] Feb 13 10:41:51.860457 systemd[1]: sshd@135-139.178.70.43:22-104.199.162.173:45308.service: Deactivated successfully. Feb 13 10:41:51.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.70.43:22-104.199.162.173:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:51.953657 kernel: audit: type=1131 audit(1707820911.859:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.70.43:22-104.199.162.173:45308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:53.351954 systemd[1]: Started sshd@136-139.178.70.43:22-42.192.41.124:50632.service. Feb 13 10:41:53.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.70.43:22-42.192.41.124:50632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:53.444647 kernel: audit: type=1130 audit(1707820913.350:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.70.43:22-42.192.41.124:50632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:55.242296 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:55.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:55.242296 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:41:55.241Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:41:55.491155 systemd[1]: Started sshd@137-139.178.70.43:22-170.64.130.116:51722.service. Feb 13 10:41:55.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.70.43:22-170.64.130.116:51722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:55.583521 kernel: audit: type=1130 audit(1707820915.489:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.70.43:22-170.64.130.116:51722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:56.328822 sshd[2800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.64.130.116 user=root Feb 13 10:41:56.327000 audit[2800]: USER_AUTH pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.64.130.116 addr=170.64.130.116 terminal=ssh res=failed' Feb 13 10:41:56.420646 kernel: audit: type=1100 audit(1707820916.327:273): pid=2800 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=170.64.130.116 addr=170.64.130.116 terminal=ssh res=failed' Feb 13 10:41:59.207806 sshd[2800]: Failed password for root from 170.64.130.116 port 51722 ssh2 Feb 13 10:41:59.793137 systemd[1]: Started sshd@138-139.178.70.43:22-49.43.249.179:32483.service. Feb 13 10:41:59.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.43:22-49.43.249.179:32483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:59.814662 sshd[2800]: Received disconnect from 170.64.130.116 port 51722:11: Bye Bye [preauth] Feb 13 10:41:59.814662 sshd[2800]: Disconnected from authenticating user root 170.64.130.116 port 51722 [preauth] Feb 13 10:41:59.815150 systemd[1]: sshd@137-139.178.70.43:22-170.64.130.116:51722.service: Deactivated successfully. Feb 13 10:41:59.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.70.43:22-170.64.130.116:51722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:59.977664 kernel: audit: type=1130 audit(1707820919.791:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.43:22-49.43.249.179:32483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:41:59.977723 kernel: audit: type=1131 audit(1707820919.813:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.70.43:22-170.64.130.116:51722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:00.242936 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:00.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:00.242936 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:00.242Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:01.287082 sshd[2803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.43.249.179 user=root Feb 13 10:42:01.285000 audit[2803]: USER_AUTH pid=2803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:42:01.379652 kernel: audit: type=1100 audit(1707820921.285:276): pid=2803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.43.249.179 addr=49.43.249.179 terminal=ssh res=failed' Feb 13 10:42:03.187138 sshd[2803]: Failed password for root from 49.43.249.179 port 32483 ssh2 Feb 13 10:42:04.198618 systemd[1]: Started sshd@139-139.178.70.43:22-194.152.206.17:16551.service. Feb 13 10:42:04.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.70.43:22-194.152.206.17:16551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:04.291475 kernel: audit: type=1130 audit(1707820924.197:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.70.43:22-194.152.206.17:16551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:04.908434 sshd[2803]: Received disconnect from 49.43.249.179 port 32483:11: Bye Bye [preauth] Feb 13 10:42:04.908434 sshd[2803]: Disconnected from authenticating user root 49.43.249.179 port 32483 [preauth] Feb 13 10:42:04.910899 systemd[1]: sshd@138-139.178.70.43:22-49.43.249.179:32483.service: Deactivated successfully. Feb 13 10:42:04.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.43:22-49.43.249.179:32483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:05.003657 kernel: audit: type=1131 audit(1707820924.909:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.43:22-49.43.249.179:32483 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:05.189178 sshd[2807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.152.206.17 user=root Feb 13 10:42:05.187000 audit[2807]: USER_AUTH pid=2807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=194.152.206.17 addr=194.152.206.17 terminal=ssh res=failed' Feb 13 10:42:05.243466 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:05.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:05.243466 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:05.243Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:05.287651 kernel: audit: type=1100 audit(1707820925.187:279): pid=2807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=194.152.206.17 addr=194.152.206.17 terminal=ssh res=failed' Feb 13 10:42:06.969070 sshd[2807]: Failed password for root from 194.152.206.17 port 16551 ssh2 Feb 13 10:42:08.821704 sshd[2807]: Received disconnect from 194.152.206.17 port 16551:11: Bye Bye [preauth] Feb 13 10:42:08.821704 sshd[2807]: Disconnected from authenticating user root 194.152.206.17 port 16551 [preauth] Feb 13 10:42:08.824120 systemd[1]: sshd@139-139.178.70.43:22-194.152.206.17:16551.service: Deactivated successfully. Feb 13 10:42:08.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.70.43:22-194.152.206.17:16551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:08.916651 kernel: audit: type=1131 audit(1707820928.823:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.70.43:22-194.152.206.17:16551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:42:10.244895 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:10.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:10.244895 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:10.244Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:15.246086 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:15.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_RAFT_MESSAGE","remote-peer-id":"e57ce77741589b2a","rtt":"192.22µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"} Feb 13 10:42:15.246086 etcd-wrapper[1724]: {"level":"warn","ts":"2024-02-13T10:42:15.245Z","caller":"rafthttp/probing_status.go:68","msg":"prober detected unhealthy status","round-tripper-name":"ROUND_TRIPPER_SNAPSHOT","remote-peer-id":"e57ce77741589b2a","rtt":"203.273µs","error":"dial tcp 10.67.80.83:2380: i/o timeout"}