Feb 13 09:53:49.551884 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 13 09:53:49.551898 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 09:53:49.551904 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 09:53:49.551909 kernel: BIOS-provided physical RAM map: Feb 13 09:53:49.551912 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 09:53:49.551916 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 09:53:49.551920 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 09:53:49.551925 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 09:53:49.551929 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 09:53:49.551933 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006f0cafff] usable Feb 13 09:53:49.551937 kernel: BIOS-e820: [mem 0x000000006f0cb000-0x000000006f0cbfff] ACPI NVS Feb 13 09:53:49.551940 kernel: BIOS-e820: [mem 0x000000006f0cc000-0x000000006f0ccfff] reserved Feb 13 09:53:49.551944 kernel: BIOS-e820: [mem 0x000000006f0cd000-0x0000000077fc6fff] usable Feb 13 09:53:49.551948 kernel: BIOS-e820: [mem 0x0000000077fc7000-0x00000000790a9fff] reserved Feb 13 09:53:49.551954 kernel: BIOS-e820: [mem 0x00000000790aa000-0x0000000079232fff] usable Feb 13 09:53:49.551958 kernel: BIOS-e820: [mem 0x0000000079233000-0x0000000079664fff] ACPI NVS Feb 13 09:53:49.551962 kernel: BIOS-e820: [mem 0x0000000079665000-0x000000007befefff] reserved Feb 13 09:53:49.551966 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 13 09:53:49.551970 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 13 09:53:49.551975 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 09:53:49.551979 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 09:53:49.551983 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 09:53:49.551987 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 09:53:49.551992 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 09:53:49.551996 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 13 09:53:49.552000 kernel: NX (Execute Disable) protection: active Feb 13 09:53:49.552004 kernel: SMBIOS 3.2.1 present. Feb 13 09:53:49.552008 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 13 09:53:49.552013 kernel: tsc: Detected 3400.000 MHz processor Feb 13 09:53:49.552017 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 09:53:49.552021 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 09:53:49.552026 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 09:53:49.552030 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 13 09:53:49.552035 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 09:53:49.552039 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 13 09:53:49.552044 kernel: Using GB pages for direct mapping Feb 13 09:53:49.552048 kernel: ACPI: Early table checksum verification disabled Feb 13 09:53:49.552052 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 09:53:49.552057 kernel: ACPI: XSDT 0x00000000795460C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 09:53:49.552061 kernel: ACPI: FACP 0x0000000079582620 000114 (v06 01072009 AMI 00010013) Feb 13 09:53:49.552067 kernel: ACPI: DSDT 0x0000000079546268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 09:53:49.552073 kernel: ACPI: FACS 0x0000000079664F80 000040 Feb 13 09:53:49.552078 kernel: ACPI: APIC 0x0000000079582738 00012C (v04 01072009 AMI 00010013) Feb 13 09:53:49.552083 kernel: ACPI: FPDT 0x0000000079582868 000044 (v01 01072009 AMI 00010013) Feb 13 09:53:49.552087 kernel: ACPI: FIDT 0x00000000795828B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 09:53:49.552092 kernel: ACPI: MCFG 0x0000000079582950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 09:53:49.552096 kernel: ACPI: SPMI 0x0000000079582990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 09:53:49.552102 kernel: ACPI: SSDT 0x00000000795829D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 09:53:49.552106 kernel: ACPI: SSDT 0x00000000795844F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 09:53:49.552111 kernel: ACPI: SSDT 0x00000000795876C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 09:53:49.552116 kernel: ACPI: HPET 0x00000000795899F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 09:53:49.552121 kernel: ACPI: SSDT 0x0000000079589A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 09:53:49.552125 kernel: ACPI: SSDT 0x000000007958A9D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 09:53:49.552130 kernel: ACPI: UEFI 0x000000007958B2D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 09:53:49.552135 kernel: ACPI: LPIT 0x000000007958B318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 09:53:49.552139 kernel: ACPI: SSDT 0x000000007958B3B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 09:53:49.552145 kernel: ACPI: SSDT 0x000000007958DB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 09:53:49.552149 kernel: ACPI: DBGP 0x000000007958F078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 09:53:49.552154 kernel: ACPI: DBG2 0x000000007958F0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 09:53:49.552158 kernel: ACPI: SSDT 0x000000007958F108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 09:53:49.552163 kernel: ACPI: DMAR 0x0000000079590C70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 13 09:53:49.552168 kernel: ACPI: SSDT 0x0000000079590D18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 09:53:49.552172 kernel: ACPI: TPM2 0x0000000079590E60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 09:53:49.552177 kernel: ACPI: SSDT 0x0000000079590E98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 09:53:49.552182 kernel: ACPI: WSMT 0x0000000079591C28 000028 (v01 ?o 01072009 AMI 00010013) Feb 13 09:53:49.552187 kernel: ACPI: EINJ 0x0000000079591C50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 09:53:49.552192 kernel: ACPI: ERST 0x0000000079591D80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 09:53:49.552196 kernel: ACPI: BERT 0x0000000079591FB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 09:53:49.552201 kernel: ACPI: HEST 0x0000000079591FE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 09:53:49.552206 kernel: ACPI: SSDT 0x0000000079592260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 09:53:49.552211 kernel: ACPI: Reserving FACP table memory at [mem 0x79582620-0x79582733] Feb 13 09:53:49.552215 kernel: ACPI: Reserving DSDT table memory at [mem 0x79546268-0x7958261e] Feb 13 09:53:49.552220 kernel: ACPI: Reserving FACS table memory at [mem 0x79664f80-0x79664fbf] Feb 13 09:53:49.552225 kernel: ACPI: Reserving APIC table memory at [mem 0x79582738-0x79582863] Feb 13 09:53:49.552230 kernel: ACPI: Reserving FPDT table memory at [mem 0x79582868-0x795828ab] Feb 13 09:53:49.552235 kernel: ACPI: Reserving FIDT table memory at [mem 0x795828b0-0x7958294b] Feb 13 09:53:49.552239 kernel: ACPI: Reserving MCFG table memory at [mem 0x79582950-0x7958298b] Feb 13 09:53:49.552244 kernel: ACPI: Reserving SPMI table memory at [mem 0x79582990-0x795829d0] Feb 13 09:53:49.552248 kernel: ACPI: Reserving SSDT table memory at [mem 0x795829d8-0x795844f3] Feb 13 09:53:49.552253 kernel: ACPI: Reserving SSDT table memory at [mem 0x795844f8-0x795876bd] Feb 13 09:53:49.552258 kernel: ACPI: Reserving SSDT table memory at [mem 0x795876c0-0x795899ea] Feb 13 09:53:49.552262 kernel: ACPI: Reserving HPET table memory at [mem 0x795899f0-0x79589a27] Feb 13 09:53:49.552267 kernel: ACPI: Reserving SSDT table memory at [mem 0x79589a28-0x7958a9d5] Feb 13 09:53:49.552272 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958a9d8-0x7958b2ce] Feb 13 09:53:49.552277 kernel: ACPI: Reserving UEFI table memory at [mem 0x7958b2d0-0x7958b311] Feb 13 09:53:49.552281 kernel: ACPI: Reserving LPIT table memory at [mem 0x7958b318-0x7958b3ab] Feb 13 09:53:49.552286 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958b3b0-0x7958db8d] Feb 13 09:53:49.552291 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958db90-0x7958f071] Feb 13 09:53:49.552295 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958f078-0x7958f0ab] Feb 13 09:53:49.552300 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958f0b0-0x7958f103] Feb 13 09:53:49.552304 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958f108-0x79590c6e] Feb 13 09:53:49.552310 kernel: ACPI: Reserving DMAR table memory at [mem 0x79590c70-0x79590d17] Feb 13 09:53:49.552315 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590d18-0x79590e5b] Feb 13 09:53:49.552319 kernel: ACPI: Reserving TPM2 table memory at [mem 0x79590e60-0x79590e93] Feb 13 09:53:49.552324 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590e98-0x79591c26] Feb 13 09:53:49.552328 kernel: ACPI: Reserving WSMT table memory at [mem 0x79591c28-0x79591c4f] Feb 13 09:53:49.552333 kernel: ACPI: Reserving EINJ table memory at [mem 0x79591c50-0x79591d7f] Feb 13 09:53:49.552338 kernel: ACPI: Reserving ERST table memory at [mem 0x79591d80-0x79591faf] Feb 13 09:53:49.552342 kernel: ACPI: Reserving BERT table memory at [mem 0x79591fb0-0x79591fdf] Feb 13 09:53:49.552347 kernel: ACPI: Reserving HEST table memory at [mem 0x79591fe0-0x7959225b] Feb 13 09:53:49.552352 kernel: ACPI: Reserving SSDT table memory at [mem 0x79592260-0x795923c1] Feb 13 09:53:49.552357 kernel: No NUMA configuration found Feb 13 09:53:49.552361 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 13 09:53:49.552366 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 13 09:53:49.552371 kernel: Zone ranges: Feb 13 09:53:49.552376 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 09:53:49.552380 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 09:53:49.552385 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 13 09:53:49.552389 kernel: Movable zone start for each node Feb 13 09:53:49.552395 kernel: Early memory node ranges Feb 13 09:53:49.552399 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 09:53:49.552404 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 09:53:49.552411 kernel: node 0: [mem 0x0000000040400000-0x000000006f0cafff] Feb 13 09:53:49.552416 kernel: node 0: [mem 0x000000006f0cd000-0x0000000077fc6fff] Feb 13 09:53:49.552420 kernel: node 0: [mem 0x00000000790aa000-0x0000000079232fff] Feb 13 09:53:49.552425 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 13 09:53:49.552443 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 13 09:53:49.552447 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 13 09:53:49.552455 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 09:53:49.552460 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 09:53:49.552465 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 09:53:49.552471 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 09:53:49.552476 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 13 09:53:49.552480 kernel: On node 0, zone DMA32: 11468 pages in unavailable ranges Feb 13 09:53:49.552485 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 13 09:53:49.552490 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 13 09:53:49.552496 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 09:53:49.552501 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 09:53:49.552506 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 09:53:49.552510 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 09:53:49.552515 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 09:53:49.552520 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 09:53:49.552525 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 09:53:49.552529 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 09:53:49.552534 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 09:53:49.552540 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 09:53:49.552545 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 09:53:49.552549 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 09:53:49.552554 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 09:53:49.552559 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 09:53:49.552564 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 09:53:49.552569 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 09:53:49.552573 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 09:53:49.552578 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 09:53:49.552584 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 09:53:49.552589 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 09:53:49.552594 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 09:53:49.552598 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 09:53:49.552603 kernel: TSC deadline timer available Feb 13 09:53:49.552608 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 09:53:49.552613 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 13 09:53:49.552618 kernel: Booting paravirtualized kernel on bare hardware Feb 13 09:53:49.552623 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 09:53:49.552628 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 09:53:49.552633 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 09:53:49.552638 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 09:53:49.552643 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 09:53:49.552648 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222329 Feb 13 09:53:49.552652 kernel: Policy zone: Normal Feb 13 09:53:49.552658 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 09:53:49.552663 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 09:53:49.552669 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 09:53:49.552673 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 09:53:49.552678 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 09:53:49.552683 kernel: Memory: 32683736K/33411996K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 09:53:49.552688 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 09:53:49.552693 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 09:53:49.552698 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 09:53:49.552703 kernel: rcu: Hierarchical RCU implementation. Feb 13 09:53:49.552708 kernel: rcu: RCU event tracing is enabled. Feb 13 09:53:49.552714 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 09:53:49.552719 kernel: Rude variant of Tasks RCU enabled. Feb 13 09:53:49.552724 kernel: Tracing variant of Tasks RCU enabled. Feb 13 09:53:49.552728 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 09:53:49.552733 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 09:53:49.552738 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 09:53:49.552743 kernel: random: crng init done Feb 13 09:53:49.552748 kernel: Console: colour dummy device 80x25 Feb 13 09:53:49.552752 kernel: printk: console [tty0] enabled Feb 13 09:53:49.552758 kernel: printk: console [ttyS1] enabled Feb 13 09:53:49.552763 kernel: ACPI: Core revision 20210730 Feb 13 09:53:49.552768 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 13 09:53:49.552773 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 09:53:49.552778 kernel: DMAR: Host address width 39 Feb 13 09:53:49.552782 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 13 09:53:49.552787 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 13 09:53:49.552792 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 09:53:49.552797 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 09:53:49.552803 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 13 09:53:49.552808 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 13 09:53:49.552812 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 13 09:53:49.552817 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 09:53:49.552822 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 09:53:49.552827 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 09:53:49.552832 kernel: x2apic enabled Feb 13 09:53:49.552837 kernel: Switched APIC routing to cluster x2apic. Feb 13 09:53:49.552841 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 13 09:53:49.552847 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 09:53:49.552852 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 09:53:49.552857 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 09:53:49.552862 kernel: process: using mwait in idle threads Feb 13 09:53:49.552867 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 09:53:49.552871 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 09:53:49.552876 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 09:53:49.552881 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 09:53:49.552886 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 09:53:49.552892 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 09:53:49.552897 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 09:53:49.552901 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 09:53:49.552906 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 09:53:49.552911 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 09:53:49.552916 kernel: TAA: Mitigation: TSX disabled Feb 13 09:53:49.552921 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 09:53:49.552926 kernel: SRBDS: Mitigation: Microcode Feb 13 09:53:49.552931 kernel: GDS: Vulnerable: No microcode Feb 13 09:53:49.552936 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 09:53:49.552941 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 09:53:49.552946 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 09:53:49.552951 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 09:53:49.552956 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 09:53:49.552961 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 09:53:49.552965 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 09:53:49.552970 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 09:53:49.552975 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 09:53:49.552981 kernel: Freeing SMP alternatives memory: 32K Feb 13 09:53:49.552986 kernel: pid_max: default: 32768 minimum: 301 Feb 13 09:53:49.552990 kernel: LSM: Security Framework initializing Feb 13 09:53:49.552995 kernel: SELinux: Initializing. Feb 13 09:53:49.553000 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 09:53:49.553005 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 09:53:49.553010 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 09:53:49.553015 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 09:53:49.553020 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 09:53:49.553025 kernel: ... version: 4 Feb 13 09:53:49.553030 kernel: ... bit width: 48 Feb 13 09:53:49.553035 kernel: ... generic registers: 4 Feb 13 09:53:49.553040 kernel: ... value mask: 0000ffffffffffff Feb 13 09:53:49.553045 kernel: ... max period: 00007fffffffffff Feb 13 09:53:49.553049 kernel: ... fixed-purpose events: 3 Feb 13 09:53:49.553054 kernel: ... event mask: 000000070000000f Feb 13 09:53:49.553059 kernel: signal: max sigframe size: 2032 Feb 13 09:53:49.553064 kernel: rcu: Hierarchical SRCU implementation. Feb 13 09:53:49.553070 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 09:53:49.553075 kernel: smp: Bringing up secondary CPUs ... Feb 13 09:53:49.553080 kernel: x86: Booting SMP configuration: Feb 13 09:53:49.553084 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 09:53:49.553089 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 09:53:49.553094 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 09:53:49.553099 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 09:53:49.553104 kernel: smpboot: Max logical packages: 1 Feb 13 09:53:49.553110 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 09:53:49.553115 kernel: devtmpfs: initialized Feb 13 09:53:49.553119 kernel: x86/mm: Memory block size: 128MB Feb 13 09:53:49.553124 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6f0cb000-0x6f0cbfff] (4096 bytes) Feb 13 09:53:49.553129 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79233000-0x79664fff] (4399104 bytes) Feb 13 09:53:49.553134 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 09:53:49.553139 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 09:53:49.553144 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 09:53:49.553149 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 09:53:49.553154 kernel: audit: initializing netlink subsys (disabled) Feb 13 09:53:49.553159 kernel: audit: type=2000 audit(1707818023.120:1): state=initialized audit_enabled=0 res=1 Feb 13 09:53:49.553164 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 09:53:49.553169 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 09:53:49.553174 kernel: cpuidle: using governor menu Feb 13 09:53:49.553178 kernel: ACPI: bus type PCI registered Feb 13 09:53:49.553183 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 09:53:49.553188 kernel: dca service started, version 1.12.1 Feb 13 09:53:49.553193 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 09:53:49.553199 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 09:53:49.553203 kernel: PCI: Using configuration type 1 for base access Feb 13 09:53:49.553208 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 09:53:49.553213 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 09:53:49.553218 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 09:53:49.553223 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 09:53:49.553227 kernel: ACPI: Added _OSI(Module Device) Feb 13 09:53:49.553232 kernel: ACPI: Added _OSI(Processor Device) Feb 13 09:53:49.553237 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 09:53:49.553243 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 09:53:49.553247 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 09:53:49.553252 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 09:53:49.553257 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 09:53:49.553262 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 09:53:49.553267 kernel: ACPI: Dynamic OEM Table Load: Feb 13 09:53:49.553271 kernel: ACPI: SSDT 0xFFFF8C6700215400 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 09:53:49.553276 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 09:53:49.553281 kernel: ACPI: Dynamic OEM Table Load: Feb 13 09:53:49.553286 kernel: ACPI: SSDT 0xFFFF8C6701CE9400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 09:53:49.553292 kernel: ACPI: Dynamic OEM Table Load: Feb 13 09:53:49.553296 kernel: ACPI: SSDT 0xFFFF8C6701C5C000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 09:53:49.553301 kernel: ACPI: Dynamic OEM Table Load: Feb 13 09:53:49.553306 kernel: ACPI: SSDT 0xFFFF8C6701C59000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 09:53:49.553311 kernel: ACPI: Dynamic OEM Table Load: Feb 13 09:53:49.553315 kernel: ACPI: SSDT 0xFFFF8C670014A000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 09:53:49.553320 kernel: ACPI: Dynamic OEM Table Load: Feb 13 09:53:49.553325 kernel: ACPI: SSDT 0xFFFF8C6701CEDC00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 09:53:49.553330 kernel: ACPI: Interpreter enabled Feb 13 09:53:49.553335 kernel: ACPI: PM: (supports S0 S5) Feb 13 09:53:49.553340 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 09:53:49.553345 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 09:53:49.553350 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 09:53:49.553354 kernel: HEST: Table parsing has been initialized. Feb 13 09:53:49.553359 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 09:53:49.553364 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 09:53:49.553369 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 09:53:49.553374 kernel: ACPI: PM: Power Resource [USBC] Feb 13 09:53:49.553379 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 09:53:49.553384 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 09:53:49.553389 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 09:53:49.553394 kernel: ACPI: PM: Power Resource [WRST] Feb 13 09:53:49.553399 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 13 09:53:49.553403 kernel: ACPI: PM: Power Resource [FN00] Feb 13 09:53:49.553428 kernel: ACPI: PM: Power Resource [FN01] Feb 13 09:53:49.553432 kernel: ACPI: PM: Power Resource [FN02] Feb 13 09:53:49.553437 kernel: ACPI: PM: Power Resource [FN03] Feb 13 09:53:49.553443 kernel: ACPI: PM: Power Resource [FN04] Feb 13 09:53:49.553448 kernel: ACPI: PM: Power Resource [PIN] Feb 13 09:53:49.553453 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 09:53:49.553519 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 09:53:49.553564 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 09:53:49.553606 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 09:53:49.553614 kernel: PCI host bridge to bus 0000:00 Feb 13 09:53:49.553657 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 09:53:49.553697 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 09:53:49.553735 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 09:53:49.553772 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 13 09:53:49.553808 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 09:53:49.553844 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 09:53:49.553897 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 09:53:49.553948 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 09:53:49.553991 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.554038 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 13 09:53:49.554082 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.554129 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 13 09:53:49.554172 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 13 09:53:49.554217 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 13 09:53:49.554259 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 13 09:53:49.554307 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 09:53:49.554350 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 13 09:53:49.554396 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 09:53:49.554442 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 13 09:53:49.554490 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 09:53:49.554535 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 13 09:53:49.554577 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 09:53:49.554623 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 09:53:49.554666 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 13 09:53:49.554708 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 13 09:53:49.554754 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 09:53:49.554798 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 09:53:49.554844 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 09:53:49.554885 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 09:53:49.554931 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 09:53:49.554972 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 13 09:53:49.555020 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 09:53:49.555068 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 09:53:49.555109 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 13 09:53:49.555150 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 09:53:49.555197 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 09:53:49.555240 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 13 09:53:49.555281 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 09:53:49.555327 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 09:53:49.555371 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 13 09:53:49.555415 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 13 09:53:49.555457 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 13 09:53:49.555498 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 13 09:53:49.555540 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 13 09:53:49.555581 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 13 09:53:49.555623 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 09:53:49.555674 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 09:53:49.555717 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.555764 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 09:53:49.555809 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.555855 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 09:53:49.555898 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.555945 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 09:53:49.555987 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.556035 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 13 09:53:49.556078 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.556126 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 09:53:49.556168 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 09:53:49.556213 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 09:53:49.556261 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 09:53:49.556302 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 13 09:53:49.556344 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 09:53:49.556391 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 09:53:49.556436 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 09:53:49.556479 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 09:53:49.556528 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 09:53:49.556572 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 09:53:49.556616 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 13 09:53:49.556675 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 13 09:53:49.556718 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 09:53:49.556762 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 09:53:49.556810 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 09:53:49.556854 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 09:53:49.556896 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 13 09:53:49.556939 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 13 09:53:49.556981 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 09:53:49.557025 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 09:53:49.557068 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 09:53:49.557110 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 13 09:53:49.557152 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 09:53:49.557193 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 09:53:49.557240 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 09:53:49.557282 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 13 09:53:49.557328 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 09:53:49.557370 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 13 09:53:49.557436 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.557498 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 09:53:49.557538 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 09:53:49.557580 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 13 09:53:49.557627 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 13 09:53:49.557670 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 13 09:53:49.557715 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 09:53:49.557758 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 13 09:53:49.557800 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 13 09:53:49.557841 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 09:53:49.557881 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 09:53:49.557922 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 13 09:53:49.557964 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 09:53:49.558009 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 09:53:49.558054 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 13 09:53:49.558096 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 09:53:49.558139 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 09:53:49.558214 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 09:53:49.558277 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 09:53:49.558318 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 13 09:53:49.558364 kernel: pci_bus 0000:08: extended config space not accessible Feb 13 09:53:49.558441 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 09:53:49.558502 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 13 09:53:49.558546 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 13 09:53:49.558591 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 09:53:49.558635 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 09:53:49.558680 kernel: pci 0000:08:00.0: supports D1 D2 Feb 13 09:53:49.558724 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 09:53:49.558770 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 09:53:49.558814 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 09:53:49.558858 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 13 09:53:49.558865 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 09:53:49.558871 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 09:53:49.558876 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 09:53:49.558881 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 09:53:49.558887 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 09:53:49.558893 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 09:53:49.558899 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 09:53:49.558904 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 09:53:49.558909 kernel: iommu: Default domain type: Translated Feb 13 09:53:49.558914 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 09:53:49.558958 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 13 09:53:49.559003 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 09:53:49.559047 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 13 09:53:49.559055 kernel: vgaarb: loaded Feb 13 09:53:49.559061 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 09:53:49.559067 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 09:53:49.559072 kernel: PTP clock support registered Feb 13 09:53:49.559077 kernel: PCI: Using ACPI for IRQ routing Feb 13 09:53:49.559082 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 09:53:49.559087 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 09:53:49.559093 kernel: e820: reserve RAM buffer [mem 0x6f0cb000-0x6fffffff] Feb 13 09:53:49.559098 kernel: e820: reserve RAM buffer [mem 0x77fc7000-0x77ffffff] Feb 13 09:53:49.559103 kernel: e820: reserve RAM buffer [mem 0x79233000-0x7bffffff] Feb 13 09:53:49.559108 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 13 09:53:49.559113 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 13 09:53:49.559118 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 13 09:53:49.559124 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 13 09:53:49.559129 kernel: clocksource: Switched to clocksource tsc-early Feb 13 09:53:49.559134 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 09:53:49.559139 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 09:53:49.559145 kernel: pnp: PnP ACPI init Feb 13 09:53:49.559192 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 09:53:49.559237 kernel: pnp 00:02: [dma 0 disabled] Feb 13 09:53:49.559279 kernel: pnp 00:03: [dma 0 disabled] Feb 13 09:53:49.559319 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 09:53:49.559358 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 09:53:49.559399 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 09:53:49.559484 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 09:53:49.559527 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 09:53:49.559564 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 09:53:49.559601 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 09:53:49.559638 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 09:53:49.559676 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 09:53:49.559714 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 09:53:49.559751 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 09:53:49.559797 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 09:53:49.559834 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 09:53:49.559871 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 09:53:49.559908 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 09:53:49.559944 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 09:53:49.559981 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 09:53:49.560020 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 09:53:49.560060 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 09:53:49.560068 kernel: pnp: PnP ACPI: found 10 devices Feb 13 09:53:49.560073 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 09:53:49.560079 kernel: NET: Registered PF_INET protocol family Feb 13 09:53:49.560084 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 09:53:49.560089 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 09:53:49.560094 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 09:53:49.560100 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 09:53:49.560106 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 09:53:49.560111 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 09:53:49.560117 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 09:53:49.560122 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 09:53:49.560127 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 09:53:49.560133 kernel: NET: Registered PF_XDP protocol family Feb 13 09:53:49.560174 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 13 09:53:49.560216 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 13 09:53:49.560259 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 13 09:53:49.560300 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 09:53:49.560344 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 09:53:49.560388 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 09:53:49.560457 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 09:53:49.560522 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 09:53:49.560566 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 09:53:49.560607 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 13 09:53:49.560650 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 09:53:49.560692 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 09:53:49.560733 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 09:53:49.560776 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 09:53:49.560817 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 13 09:53:49.560861 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 09:53:49.560903 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 09:53:49.560945 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 13 09:53:49.560987 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 09:53:49.561030 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 09:53:49.561074 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 09:53:49.561117 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 13 09:53:49.561160 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 09:53:49.561201 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 09:53:49.561245 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 13 09:53:49.561283 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 09:53:49.561321 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 09:53:49.561357 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 09:53:49.561394 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 09:53:49.561476 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 13 09:53:49.561512 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 09:53:49.561553 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 13 09:53:49.561594 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 09:53:49.561639 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 13 09:53:49.561678 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 13 09:53:49.561719 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 13 09:53:49.561758 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 13 09:53:49.561803 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 09:53:49.561844 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 13 09:53:49.561886 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 13 09:53:49.561928 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 13 09:53:49.561935 kernel: PCI: CLS 64 bytes, default 64 Feb 13 09:53:49.561941 kernel: DMAR: No ATSR found Feb 13 09:53:49.561946 kernel: DMAR: No SATC found Feb 13 09:53:49.561951 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 13 09:53:49.561956 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 13 09:53:49.561963 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 13 09:53:49.561968 kernel: DMAR: IOMMU feature pasid inconsistent Feb 13 09:53:49.561973 kernel: DMAR: IOMMU feature eafs inconsistent Feb 13 09:53:49.561979 kernel: DMAR: IOMMU feature prs inconsistent Feb 13 09:53:49.561984 kernel: DMAR: IOMMU feature nest inconsistent Feb 13 09:53:49.561989 kernel: DMAR: IOMMU feature mts inconsistent Feb 13 09:53:49.561994 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 13 09:53:49.561999 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 13 09:53:49.562005 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 09:53:49.562011 kernel: DMAR: dmar1: Using Queued invalidation Feb 13 09:53:49.562052 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 09:53:49.562094 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 09:53:49.562136 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 13 09:53:49.562176 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 13 09:53:49.562218 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 13 09:53:49.562259 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 13 09:53:49.562300 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 13 09:53:49.562342 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 13 09:53:49.562384 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 13 09:53:49.562450 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 13 09:53:49.562511 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 13 09:53:49.562552 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 13 09:53:49.562592 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 13 09:53:49.562634 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 13 09:53:49.562675 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 13 09:53:49.562720 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 13 09:53:49.562761 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 13 09:53:49.562802 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 13 09:53:49.562844 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 13 09:53:49.562884 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 13 09:53:49.562926 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 13 09:53:49.562966 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 13 09:53:49.563008 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 13 09:53:49.563053 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 13 09:53:49.563096 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 13 09:53:49.563138 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 09:53:49.563182 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 13 09:53:49.563225 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 13 09:53:49.563270 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 13 09:53:49.563278 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 09:53:49.563284 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 09:53:49.563290 kernel: software IO TLB: mapped [mem 0x0000000073fc7000-0x0000000077fc7000] (64MB) Feb 13 09:53:49.563295 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 13 09:53:49.563301 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 09:53:49.563306 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 09:53:49.563311 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 09:53:49.563316 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 13 09:53:49.563360 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 09:53:49.563368 kernel: Initialise system trusted keyrings Feb 13 09:53:49.563374 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 09:53:49.563379 kernel: Key type asymmetric registered Feb 13 09:53:49.563384 kernel: Asymmetric key parser 'x509' registered Feb 13 09:53:49.563389 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 09:53:49.563395 kernel: io scheduler mq-deadline registered Feb 13 09:53:49.563400 kernel: io scheduler kyber registered Feb 13 09:53:49.563407 kernel: io scheduler bfq registered Feb 13 09:53:49.563486 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 13 09:53:49.563529 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 13 09:53:49.563572 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 13 09:53:49.563615 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 13 09:53:49.563655 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 13 09:53:49.563697 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 13 09:53:49.563739 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 13 09:53:49.563785 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 09:53:49.563793 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 09:53:49.563800 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 09:53:49.563805 kernel: pstore: Registered erst as persistent store backend Feb 13 09:53:49.563811 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 09:53:49.563816 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 09:53:49.563821 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 09:53:49.563827 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 09:53:49.563868 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 09:53:49.563876 kernel: i8042: PNP: No PS/2 controller found. Feb 13 09:53:49.563914 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 09:53:49.563952 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 09:53:49.563990 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T09:53:48 UTC (1707818028) Feb 13 09:53:49.564028 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 09:53:49.564035 kernel: fail to initialize ptp_kvm Feb 13 09:53:49.564040 kernel: intel_pstate: Intel P-state driver initializing Feb 13 09:53:49.564046 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 09:53:49.564051 kernel: intel_pstate: HWP enabled Feb 13 09:53:49.564057 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 09:53:49.564063 kernel: vesafb: scrolling: redraw Feb 13 09:53:49.564068 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 09:53:49.564073 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x00000000ffed6f08, using 768k, total 768k Feb 13 09:53:49.564079 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 09:53:49.564084 kernel: fb0: VESA VGA frame buffer device Feb 13 09:53:49.564089 kernel: NET: Registered PF_INET6 protocol family Feb 13 09:53:49.564094 kernel: Segment Routing with IPv6 Feb 13 09:53:49.564099 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 09:53:49.564105 kernel: NET: Registered PF_PACKET protocol family Feb 13 09:53:49.564111 kernel: Key type dns_resolver registered Feb 13 09:53:49.564116 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 09:53:49.564121 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 09:53:49.564126 kernel: IPI shorthand broadcast: enabled Feb 13 09:53:49.564131 kernel: sched_clock: Marking stable (1860540080, 1360194193)->(4644877026, -1424142753) Feb 13 09:53:49.564137 kernel: registered taskstats version 1 Feb 13 09:53:49.564142 kernel: Loading compiled-in X.509 certificates Feb 13 09:53:49.564147 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 09:53:49.564152 kernel: Key type .fscrypt registered Feb 13 09:53:49.564158 kernel: Key type fscrypt-provisioning registered Feb 13 09:53:49.564163 kernel: pstore: Using crash dump compression: deflate Feb 13 09:53:49.564168 kernel: ima: Allocated hash algorithm: sha1 Feb 13 09:53:49.564173 kernel: ima: No architecture policies found Feb 13 09:53:49.564179 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 09:53:49.564184 kernel: Write protecting the kernel read-only data: 28672k Feb 13 09:53:49.564189 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 09:53:49.564195 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 09:53:49.564201 kernel: Run /init as init process Feb 13 09:53:49.564206 kernel: with arguments: Feb 13 09:53:49.564211 kernel: /init Feb 13 09:53:49.564216 kernel: with environment: Feb 13 09:53:49.564221 kernel: HOME=/ Feb 13 09:53:49.564226 kernel: TERM=linux Feb 13 09:53:49.564231 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 09:53:49.564238 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 09:53:49.564246 systemd[1]: Detected architecture x86-64. Feb 13 09:53:49.564252 systemd[1]: Running in initrd. Feb 13 09:53:49.564257 systemd[1]: No hostname configured, using default hostname. Feb 13 09:53:49.564262 systemd[1]: Hostname set to . Feb 13 09:53:49.564267 systemd[1]: Initializing machine ID from random generator. Feb 13 09:53:49.564273 systemd[1]: Queued start job for default target initrd.target. Feb 13 09:53:49.564279 systemd[1]: Started systemd-ask-password-console.path. Feb 13 09:53:49.564284 systemd[1]: Reached target cryptsetup.target. Feb 13 09:53:49.564290 systemd[1]: Reached target paths.target. Feb 13 09:53:49.564295 systemd[1]: Reached target slices.target. Feb 13 09:53:49.564301 systemd[1]: Reached target swap.target. Feb 13 09:53:49.564306 systemd[1]: Reached target timers.target. Feb 13 09:53:49.564311 systemd[1]: Listening on iscsid.socket. Feb 13 09:53:49.564317 systemd[1]: Listening on iscsiuio.socket. Feb 13 09:53:49.564322 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 09:53:49.564328 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 09:53:49.564334 systemd[1]: Listening on systemd-journald.socket. Feb 13 09:53:49.564339 systemd[1]: Listening on systemd-networkd.socket. Feb 13 09:53:49.564345 kernel: tsc: Refined TSC clocksource calibration: 3408.046 MHz Feb 13 09:53:49.564350 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fff667c0, max_idle_ns: 440795358023 ns Feb 13 09:53:49.564355 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 09:53:49.564361 kernel: clocksource: Switched to clocksource tsc Feb 13 09:53:49.564366 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 09:53:49.564372 systemd[1]: Reached target sockets.target. Feb 13 09:53:49.564377 systemd[1]: Starting kmod-static-nodes.service... Feb 13 09:53:49.564383 systemd[1]: Finished network-cleanup.service. Feb 13 09:53:49.564389 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 09:53:49.564394 systemd[1]: Starting systemd-journald.service... Feb 13 09:53:49.564400 systemd[1]: Starting systemd-modules-load.service... Feb 13 09:53:49.564431 systemd-journald[267]: Journal started Feb 13 09:53:49.564457 systemd-journald[267]: Runtime Journal (/run/log/journal/57d513b9a39b4121a5f152b24c95a247) is 8.0M, max 639.3M, 631.3M free. Feb 13 09:53:49.567106 systemd-modules-load[268]: Inserted module 'overlay' Feb 13 09:53:49.588479 kernel: audit: type=1334 audit(1707818029.572:2): prog-id=6 op=LOAD Feb 13 09:53:49.588489 systemd[1]: Starting systemd-resolved.service... Feb 13 09:53:49.572000 audit: BPF prog-id=6 op=LOAD Feb 13 09:53:49.641410 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 09:53:49.641426 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 09:53:49.672453 kernel: Bridge firewalling registered Feb 13 09:53:49.672468 systemd[1]: Started systemd-journald.service. Feb 13 09:53:49.686784 systemd-modules-load[268]: Inserted module 'br_netfilter' Feb 13 09:53:49.736068 kernel: audit: type=1130 audit(1707818029.693:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.692637 systemd-resolved[270]: Positive Trust Anchors: Feb 13 09:53:49.811583 kernel: SCSI subsystem initialized Feb 13 09:53:49.811596 kernel: audit: type=1130 audit(1707818029.746:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.811603 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 09:53:49.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.692644 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 09:53:49.912305 kernel: device-mapper: uevent: version 1.0.3 Feb 13 09:53:49.912315 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 09:53:49.912323 kernel: audit: type=1130 audit(1707818029.868:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.692663 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 09:53:49.985643 kernel: audit: type=1130 audit(1707818029.919:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.694212 systemd-resolved[270]: Defaulting to hostname 'linux'. Feb 13 09:53:49.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.694679 systemd[1]: Finished kmod-static-nodes.service. Feb 13 09:53:50.093492 kernel: audit: type=1130 audit(1707818029.992:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.093505 kernel: audit: type=1130 audit(1707818030.046:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:49.747536 systemd[1]: Started systemd-resolved.service. Feb 13 09:53:49.869848 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 09:53:49.914382 systemd-modules-load[268]: Inserted module 'dm_multipath' Feb 13 09:53:49.920691 systemd[1]: Finished systemd-modules-load.service. Feb 13 09:53:49.993997 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 09:53:50.047669 systemd[1]: Reached target nss-lookup.target. Feb 13 09:53:50.101996 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 09:53:50.121907 systemd[1]: Starting systemd-sysctl.service... Feb 13 09:53:50.122214 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 09:53:50.125082 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 09:53:50.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.125851 systemd[1]: Finished systemd-sysctl.service. Feb 13 09:53:50.174496 kernel: audit: type=1130 audit(1707818030.123:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.187761 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 09:53:50.253504 kernel: audit: type=1130 audit(1707818030.186:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.245002 systemd[1]: Starting dracut-cmdline.service... Feb 13 09:53:50.267522 dracut-cmdline[292]: dracut-dracut-053 Feb 13 09:53:50.267522 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 09:53:50.267522 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 09:53:50.334502 kernel: Loading iSCSI transport class v2.0-870. Feb 13 09:53:50.334515 kernel: iscsi: registered transport (tcp) Feb 13 09:53:50.383365 kernel: iscsi: registered transport (qla4xxx) Feb 13 09:53:50.383385 kernel: QLogic iSCSI HBA Driver Feb 13 09:53:50.399250 systemd[1]: Finished dracut-cmdline.service. Feb 13 09:53:50.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:50.412142 systemd[1]: Starting dracut-pre-udev.service... Feb 13 09:53:50.471467 kernel: raid6: avx2x4 gen() 32825 MB/s Feb 13 09:53:50.507437 kernel: raid6: avx2x4 xor() 14745 MB/s Feb 13 09:53:50.542439 kernel: raid6: avx2x2 gen() 52113 MB/s Feb 13 09:53:50.577484 kernel: raid6: avx2x2 xor() 32170 MB/s Feb 13 09:53:50.612439 kernel: raid6: avx2x1 gen() 44876 MB/s Feb 13 09:53:50.647473 kernel: raid6: avx2x1 xor() 27910 MB/s Feb 13 09:53:50.681410 kernel: raid6: sse2x4 gen() 21307 MB/s Feb 13 09:53:50.715438 kernel: raid6: sse2x4 xor() 9405 MB/s Feb 13 09:53:50.749472 kernel: raid6: sse2x2 gen() 21694 MB/s Feb 13 09:53:50.783438 kernel: raid6: sse2x2 xor() 13442 MB/s Feb 13 09:53:50.817437 kernel: raid6: sse2x1 gen() 18319 MB/s Feb 13 09:53:50.869111 kernel: raid6: sse2x1 xor() 8938 MB/s Feb 13 09:53:50.869126 kernel: raid6: using algorithm avx2x2 gen() 52113 MB/s Feb 13 09:53:50.869134 kernel: raid6: .... xor() 32170 MB/s, rmw enabled Feb 13 09:53:50.887211 kernel: raid6: using avx2x2 recovery algorithm Feb 13 09:53:50.933468 kernel: xor: automatically using best checksumming function avx Feb 13 09:53:51.012413 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 09:53:51.017378 systemd[1]: Finished dracut-pre-udev.service. Feb 13 09:53:51.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:51.016000 audit: BPF prog-id=7 op=LOAD Feb 13 09:53:51.016000 audit: BPF prog-id=8 op=LOAD Feb 13 09:53:51.018176 systemd[1]: Starting systemd-udevd.service... Feb 13 09:53:51.025731 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 13 09:53:51.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:51.039594 systemd[1]: Started systemd-udevd.service. Feb 13 09:53:51.080540 dracut-pre-trigger[487]: rd.md=0: removing MD RAID activation Feb 13 09:53:51.056044 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 09:53:51.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:51.084482 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 09:53:51.098546 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 09:53:51.148370 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 09:53:51.175424 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 09:53:51.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:51.178414 kernel: libata version 3.00 loaded. Feb 13 09:53:51.213655 kernel: ACPI: bus type USB registered Feb 13 09:53:51.213702 kernel: usbcore: registered new interface driver usbfs Feb 13 09:53:51.213712 kernel: usbcore: registered new interface driver hub Feb 13 09:53:51.248685 kernel: usbcore: registered new device driver usb Feb 13 09:53:51.249411 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 09:53:51.282163 kernel: AES CTR mode by8 optimization enabled Feb 13 09:53:51.299411 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 09:53:51.299432 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 09:53:51.299512 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 09:53:51.356142 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 13 09:53:51.356225 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 09:53:51.356287 kernel: pps pps0: new PPS source ptp0 Feb 13 09:53:51.386060 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 13 09:53:51.386150 kernel: mlx5_core 0000:02:00.0: firmware version: 14.29.2002 Feb 13 09:53:51.386218 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 09:53:51.388411 kernel: scsi host0: ahci Feb 13 09:53:51.388492 kernel: scsi host1: ahci Feb 13 09:53:51.390410 kernel: scsi host2: ahci Feb 13 09:53:51.390501 kernel: scsi host3: ahci Feb 13 09:53:51.390657 kernel: scsi host4: ahci Feb 13 09:53:51.390796 kernel: scsi host5: ahci Feb 13 09:53:51.390866 kernel: scsi host6: ahci Feb 13 09:53:51.392410 kernel: scsi host7: ahci Feb 13 09:53:51.392484 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 134 Feb 13 09:53:51.392493 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 134 Feb 13 09:53:51.392502 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 134 Feb 13 09:53:51.392510 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 134 Feb 13 09:53:51.392517 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 134 Feb 13 09:53:51.392525 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 134 Feb 13 09:53:51.392535 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 134 Feb 13 09:53:51.392543 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 134 Feb 13 09:53:51.420214 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 09:53:51.420290 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1e:02 Feb 13 09:53:51.433234 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 13 09:53:51.670968 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 09:53:51.694424 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 09:53:51.712438 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 09:53:51.712458 kernel: pps pps1: new PPS source ptp2 Feb 13 09:53:51.712529 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 09:53:51.714437 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 09:53:51.725445 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 13 09:53:51.740410 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 09:53:51.764339 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 09:53:51.764425 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 09:53:51.791639 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:73:1e:03 Feb 13 09:53:51.791744 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 09:53:51.819652 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 13 09:53:51.819727 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 13 09:53:51.845722 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 09:53:51.845794 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 09:53:51.889454 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 09:53:51.902455 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 09:53:51.918419 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 09:53:51.918629 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 09:53:51.951443 kernel: mlx5_core 0000:02:00.1: firmware version: 14.29.2002 Feb 13 09:53:51.981565 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 09:53:51.981592 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 09:53:51.981749 kernel: ata2.00: Features: NCQ-prio Feb 13 09:53:52.012409 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 09:53:52.039966 kernel: ata1.00: Features: NCQ-prio Feb 13 09:53:52.057445 kernel: ata2.00: configured for UDMA/133 Feb 13 09:53:52.057463 kernel: ata1.00: configured for UDMA/133 Feb 13 09:53:52.070450 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 09:53:52.087467 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 09:53:52.134322 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 09:53:52.134433 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 13 09:53:52.134501 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 09:53:52.186426 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 09:53:52.186538 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 09:53:52.186589 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 09:53:52.203943 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 09:53:52.234677 kernel: hub 1-0:1.0: USB hub found Feb 13 09:53:52.234770 kernel: hub 1-0:1.0: 16 ports detected Feb 13 09:53:52.262970 kernel: hub 2-0:1.0: USB hub found Feb 13 09:53:52.263051 kernel: hub 2-0:1.0: 10 ports detected Feb 13 09:53:52.277063 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 09:53:52.296682 kernel: usb: port power management may be unreliable Feb 13 09:53:52.313462 kernel: port_module: 9 callbacks suppressed Feb 13 09:53:52.313477 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 13 09:53:52.327875 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 13 09:53:52.379798 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 09:53:52.379814 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 09:53:52.394952 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 09:53:52.395038 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 09:53:52.414421 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 09:53:52.414529 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 09:53:52.430584 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 09:53:52.445889 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 09:53:52.494483 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 09:53:52.494556 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 09:53:52.494616 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 09:53:52.494671 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 09:53:52.509097 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 09:53:52.510485 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 09:53:52.577664 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 09:53:52.592048 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 09:53:52.606445 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 09:53:52.620440 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 09:53:52.620516 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 09:53:52.655757 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 09:53:52.655829 kernel: GPT:9289727 != 937703087 Feb 13 09:53:52.655838 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 09:53:52.655844 kernel: GPT:9289727 != 937703087 Feb 13 09:53:52.655850 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 09:53:52.655857 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 09:53:52.725464 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 09:53:52.725479 kernel: hub 1-14:1.0: USB hub found Feb 13 09:53:52.738732 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 09:53:52.765455 kernel: hub 1-14:1.0: 4 ports detected Feb 13 09:53:52.794411 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 13 09:53:52.815472 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 13 09:53:52.815576 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (537) Feb 13 09:53:52.817504 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 09:53:52.842508 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 09:53:52.863303 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 09:53:52.889663 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 09:53:52.910592 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 09:53:52.927266 systemd[1]: Starting disk-uuid.service... Feb 13 09:53:52.968559 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 09:53:52.968594 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 09:53:52.968739 disk-uuid[695]: Primary Header is updated. Feb 13 09:53:52.968739 disk-uuid[695]: Secondary Entries is updated. Feb 13 09:53:52.968739 disk-uuid[695]: Secondary Header is updated. Feb 13 09:53:53.016478 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 09:53:53.016489 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 09:53:53.084495 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 09:53:53.235426 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 09:53:53.268707 kernel: usbcore: registered new interface driver usbhid Feb 13 09:53:53.268731 kernel: usbhid: USB HID core driver Feb 13 09:53:53.300447 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 09:53:53.415445 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 09:53:53.415579 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 09:53:53.415588 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 09:53:53.994847 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 09:53:54.013379 disk-uuid[696]: The operation has completed successfully. Feb 13 09:53:54.022526 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 09:53:54.048181 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 09:53:54.142392 kernel: audit: type=1130 audit(1707818034.055:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.142412 kernel: audit: type=1131 audit(1707818034.055:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.048225 systemd[1]: Finished disk-uuid.service. Feb 13 09:53:54.171499 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 09:53:54.058763 systemd[1]: Starting verity-setup.service... Feb 13 09:53:54.201443 systemd[1]: Found device dev-mapper-usr.device. Feb 13 09:53:54.210355 systemd[1]: Mounting sysusr-usr.mount... Feb 13 09:53:54.216662 systemd[1]: Finished verity-setup.service. Feb 13 09:53:54.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.274411 kernel: audit: type=1130 audit(1707818034.226:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.329376 systemd[1]: Mounted sysusr-usr.mount. Feb 13 09:53:54.347551 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 09:53:54.347565 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 09:53:54.329544 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 09:53:54.428631 kernel: BTRFS info (device sda6): using free space tree Feb 13 09:53:54.428644 kernel: BTRFS info (device sda6): has skinny extents Feb 13 09:53:54.428651 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 09:53:54.329939 systemd[1]: Starting ignition-setup.service... Feb 13 09:53:54.416895 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 09:53:54.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.436898 systemd[1]: Finished ignition-setup.service. Feb 13 09:53:54.556653 kernel: audit: type=1130 audit(1707818034.450:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.556669 kernel: audit: type=1130 audit(1707818034.507:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.471555 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 09:53:54.587982 kernel: audit: type=1334 audit(1707818034.564:24): prog-id=9 op=LOAD Feb 13 09:53:54.564000 audit: BPF prog-id=9 op=LOAD Feb 13 09:53:54.528632 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 09:53:54.566275 systemd[1]: Starting systemd-networkd.service... Feb 13 09:53:54.601705 systemd-networkd[876]: lo: Link UP Feb 13 09:53:54.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.650656 ignition[870]: Ignition 2.14.0 Feb 13 09:53:54.683674 kernel: audit: type=1130 audit(1707818034.618:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.601707 systemd-networkd[876]: lo: Gained carrier Feb 13 09:53:54.650660 ignition[870]: Stage: fetch-offline Feb 13 09:53:54.601996 systemd-networkd[876]: Enumeration completed Feb 13 09:53:54.758459 kernel: audit: type=1130 audit(1707818034.707:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.650687 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 09:53:54.839905 kernel: audit: type=1130 audit(1707818034.765:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.839918 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 09:53:54.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.602067 systemd[1]: Started systemd-networkd.service. Feb 13 09:53:54.872626 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 13 09:53:54.650700 ignition[870]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 09:53:54.602724 systemd-networkd[876]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 09:53:54.659203 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 09:53:54.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.619598 systemd[1]: Reached target network.target. Feb 13 09:53:54.922474 iscsid[906]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 09:53:54.922474 iscsid[906]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 09:53:54.922474 iscsid[906]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 09:53:54.922474 iscsid[906]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 09:53:54.922474 iscsid[906]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 09:53:54.922474 iscsid[906]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 09:53:54.922474 iscsid[906]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 09:53:54.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:55.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:53:54.659269 ignition[870]: parsed url from cmdline: "" Feb 13 09:53:54.678256 unknown[870]: fetched base config from "system" Feb 13 09:53:55.102523 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 09:53:54.659271 ignition[870]: no config URL provided Feb 13 09:53:54.678260 unknown[870]: fetched user config from "system" Feb 13 09:53:54.659274 ignition[870]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 09:53:54.678944 systemd[1]: Starting iscsiuio.service... Feb 13 09:53:54.659304 ignition[870]: parsing config with SHA512: 2a8bdd6bc68844f5999517dcb0c336cb966111fa713be4941750bc87cf10b32409a9339ef30764d1e53bc6c18379ec03f17de53faa69406241d16692b02e422a Feb 13 09:53:54.690711 systemd[1]: Started iscsiuio.service. Feb 13 09:53:54.678606 ignition[870]: fetch-offline: fetch-offline passed Feb 13 09:53:54.708765 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 09:53:54.678609 ignition[870]: POST message to Packet Timeline Feb 13 09:53:54.766666 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 09:53:54.678613 ignition[870]: POST Status error: resource requires networking Feb 13 09:53:54.767124 systemd[1]: Starting ignition-kargs.service... Feb 13 09:53:54.678643 ignition[870]: Ignition finished successfully Feb 13 09:53:54.840958 systemd-networkd[876]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 09:53:54.844041 ignition[895]: Ignition 2.14.0 Feb 13 09:53:54.854009 systemd[1]: Starting iscsid.service... Feb 13 09:53:54.844044 ignition[895]: Stage: kargs Feb 13 09:53:54.879603 systemd[1]: Started iscsid.service. Feb 13 09:53:54.844102 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 09:53:54.899951 systemd[1]: Starting dracut-initqueue.service... Feb 13 09:53:54.844111 ignition[895]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 09:53:54.909657 systemd[1]: Finished dracut-initqueue.service. Feb 13 09:53:54.845430 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 09:53:54.930709 systemd[1]: Reached target remote-fs-pre.target. Feb 13 09:53:54.847228 ignition[895]: kargs: kargs passed Feb 13 09:53:54.949570 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 09:53:54.847231 ignition[895]: POST message to Packet Timeline Feb 13 09:53:54.949680 systemd[1]: Reached target remote-fs.target. Feb 13 09:53:54.847242 ignition[895]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 09:53:54.992561 systemd[1]: Starting dracut-pre-mount.service... Feb 13 09:53:54.852570 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50190->[::1]:53: read: connection refused Feb 13 09:53:55.019800 systemd[1]: Finished dracut-pre-mount.service. Feb 13 09:53:55.053045 ignition[895]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 09:53:55.096708 systemd-networkd[876]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 09:53:55.053787 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:57940->[::1]:53: read: connection refused Feb 13 09:53:55.125864 systemd-networkd[876]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 09:53:55.154946 systemd-networkd[876]: enp2s0f1np1: Link UP Feb 13 09:53:55.155127 systemd-networkd[876]: enp2s0f1np1: Gained carrier Feb 13 09:53:55.165709 systemd-networkd[876]: enp2s0f0np0: Link UP Feb 13 09:53:55.165973 systemd-networkd[876]: eno2: Link UP Feb 13 09:53:55.166211 systemd-networkd[876]: eno1: Link UP Feb 13 09:53:55.454220 ignition[895]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 09:53:55.455258 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:60457->[::1]:53: read: connection refused Feb 13 09:53:55.887044 systemd-networkd[876]: enp2s0f0np0: Gained carrier Feb 13 09:53:55.896632 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 13 09:53:55.924588 systemd-networkd[876]: enp2s0f0np0: DHCPv4 address 139.178.70.11/31, gateway 139.178.70.10 acquired from 145.40.83.140 Feb 13 09:53:56.183905 systemd-networkd[876]: enp2s0f1np1: Gained IPv6LL Feb 13 09:53:56.255717 ignition[895]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 09:53:56.257250 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:58618->[::1]:53: read: connection refused Feb 13 09:53:57.858578 ignition[895]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 09:53:57.859828 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43219->[::1]:53: read: connection refused Feb 13 09:53:57.911898 systemd-networkd[876]: enp2s0f0np0: Gained IPv6LL Feb 13 09:54:01.063296 ignition[895]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 09:54:01.107876 ignition[895]: GET result: OK Feb 13 09:54:01.385017 ignition[895]: Ignition finished successfully Feb 13 09:54:01.391231 systemd[1]: Finished ignition-kargs.service. Feb 13 09:54:01.484257 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 09:54:01.484274 kernel: audit: type=1130 audit(1707818041.406:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:01.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:01.416634 ignition[924]: Ignition 2.14.0 Feb 13 09:54:01.409872 systemd[1]: Starting ignition-disks.service... Feb 13 09:54:01.416638 ignition[924]: Stage: disks Feb 13 09:54:01.416714 ignition[924]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 09:54:01.416723 ignition[924]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 09:54:01.418666 ignition[924]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 09:54:01.419368 ignition[924]: disks: disks passed Feb 13 09:54:01.419371 ignition[924]: POST message to Packet Timeline Feb 13 09:54:01.419383 ignition[924]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 09:54:01.442297 ignition[924]: GET result: OK Feb 13 09:54:01.621109 ignition[924]: Ignition finished successfully Feb 13 09:54:01.623941 systemd[1]: Finished ignition-disks.service. Feb 13 09:54:01.703436 kernel: audit: type=1130 audit(1707818041.637:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:01.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:01.639047 systemd[1]: Reached target initrd-root-device.target. Feb 13 09:54:01.712601 systemd[1]: Reached target local-fs-pre.target. Feb 13 09:54:01.712711 systemd[1]: Reached target local-fs.target. Feb 13 09:54:01.734611 systemd[1]: Reached target sysinit.target. Feb 13 09:54:01.748611 systemd[1]: Reached target basic.target. Feb 13 09:54:01.762365 systemd[1]: Starting systemd-fsck-root.service... Feb 13 09:54:01.783114 systemd-fsck[940]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 09:54:01.794953 systemd[1]: Finished systemd-fsck-root.service. Feb 13 09:54:01.897931 kernel: audit: type=1130 audit(1707818041.803:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:01.897946 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 09:54:01.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:01.813359 systemd[1]: Mounting sysroot.mount... Feb 13 09:54:01.905035 systemd[1]: Mounted sysroot.mount. Feb 13 09:54:01.918653 systemd[1]: Reached target initrd-root-fs.target. Feb 13 09:54:01.926236 systemd[1]: Mounting sysroot-usr.mount... Feb 13 09:54:01.940258 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 09:54:01.958939 systemd[1]: Starting flatcar-static-network.service... Feb 13 09:54:01.974521 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 09:54:01.974554 systemd[1]: Reached target ignition-diskful.target. Feb 13 09:54:01.994031 systemd[1]: Mounted sysroot-usr.mount. Feb 13 09:54:02.017207 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 09:54:02.031097 systemd[1]: Starting initrd-setup-root.service... Feb 13 09:54:02.167003 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (953) Feb 13 09:54:02.167020 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 09:54:02.167030 kernel: BTRFS info (device sda6): using free space tree Feb 13 09:54:02.167038 kernel: BTRFS info (device sda6): has skinny extents Feb 13 09:54:02.167045 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 09:54:02.093184 systemd[1]: Finished initrd-setup-root.service. Feb 13 09:54:02.230582 kernel: audit: type=1130 audit(1707818042.174:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.230700 coreos-metadata[947]: Feb 13 09:54:02.093 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 09:54:02.230700 coreos-metadata[947]: Feb 13 09:54:02.115 INFO Fetch successful Feb 13 09:54:02.230700 coreos-metadata[947]: Feb 13 09:54:02.133 INFO wrote hostname ci-3510.3.2-a-0e431cd218 to /sysroot/etc/hostname Feb 13 09:54:02.436648 kernel: audit: type=1130 audit(1707818042.237:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.436660 kernel: audit: type=1130 audit(1707818042.301:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.436667 kernel: audit: type=1131 audit(1707818042.301:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.436801 coreos-metadata[948]: Feb 13 09:54:02.093 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 09:54:02.436801 coreos-metadata[948]: Feb 13 09:54:02.115 INFO Fetch successful Feb 13 09:54:02.455619 initrd-setup-root[958]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 09:54:02.176756 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 09:54:02.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.515690 initrd-setup-root[966]: cut: /sysroot/etc/group: No such file or directory Feb 13 09:54:02.554611 kernel: audit: type=1130 audit(1707818042.486:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.238718 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 09:54:02.565647 initrd-setup-root[974]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 09:54:02.238758 systemd[1]: Finished flatcar-static-network.service. Feb 13 09:54:02.584663 initrd-setup-root[982]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 09:54:02.302651 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 09:54:02.602559 ignition[1024]: INFO : Ignition 2.14.0 Feb 13 09:54:02.602559 ignition[1024]: INFO : Stage: mount Feb 13 09:54:02.602559 ignition[1024]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 09:54:02.602559 ignition[1024]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 09:54:02.602559 ignition[1024]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 09:54:02.602559 ignition[1024]: INFO : mount: mount passed Feb 13 09:54:02.602559 ignition[1024]: INFO : POST message to Packet Timeline Feb 13 09:54:02.602559 ignition[1024]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 09:54:02.602559 ignition[1024]: INFO : GET result: OK Feb 13 09:54:02.423997 systemd[1]: Starting ignition-mount.service... Feb 13 09:54:02.443959 systemd[1]: Starting sysroot-boot.service... Feb 13 09:54:02.470384 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 09:54:02.470433 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 09:54:02.471115 systemd[1]: Finished sysroot-boot.service. Feb 13 09:54:02.784497 ignition[1024]: INFO : Ignition finished successfully Feb 13 09:54:02.787138 systemd[1]: Finished ignition-mount.service. Feb 13 09:54:02.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.802683 systemd[1]: Starting ignition-files.service... Feb 13 09:54:02.873585 kernel: audit: type=1130 audit(1707818042.799:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:02.868336 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 09:54:02.930311 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1039) Feb 13 09:54:02.930325 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 09:54:02.930333 kernel: BTRFS info (device sda6): using free space tree Feb 13 09:54:02.954043 kernel: BTRFS info (device sda6): has skinny extents Feb 13 09:54:03.003453 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 09:54:03.005225 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 09:54:03.022563 ignition[1058]: INFO : Ignition 2.14.0 Feb 13 09:54:03.022563 ignition[1058]: INFO : Stage: files Feb 13 09:54:03.022563 ignition[1058]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 09:54:03.022563 ignition[1058]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 09:54:03.022563 ignition[1058]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 09:54:03.025986 unknown[1058]: wrote ssh authorized keys file for user: core Feb 13 09:54:03.088622 ignition[1058]: DEBUG : files: compiled without relabeling support, skipping Feb 13 09:54:03.088622 ignition[1058]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 09:54:03.088622 ignition[1058]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 09:54:03.088622 ignition[1058]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 09:54:03.088622 ignition[1058]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 09:54:03.088622 ignition[1058]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 09:54:03.088622 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 13 09:54:03.088622 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 13 09:54:03.212164 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 13 09:54:03.272282 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 13 09:54:03.289619 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 13 09:54:03.289619 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 13 09:54:03.735465 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 13 09:54:03.844770 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 13 09:54:03.844770 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 13 09:54:03.887612 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 13 09:54:03.887612 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 13 09:54:04.298393 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 13 09:54:04.414607 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 13 09:54:04.438640 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 13 09:54:04.438640 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 13 09:54:04.438640 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 13 09:54:04.488656 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 13 09:54:04.658915 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 13 09:54:04.658915 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 13 09:54:04.700630 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 13 09:54:04.700630 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 13 09:54:04.732477 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 13 09:54:05.035704 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 13 09:54:05.060650 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 13 09:54:05.060650 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 13 09:54:05.060650 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Feb 13 09:54:05.108744 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 13 09:54:07.675156 ignition[1058]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 09:54:07.709508 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2621587166" Feb 13 09:54:08.022238 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1079) Feb 13 09:54:08.022260 kernel: audit: type=1130 audit(1707818047.962:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:07.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.022299 ignition[1058]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2621587166": device or resource busy Feb 13 09:54:08.022299 ignition[1058]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2621587166", trying btrfs: device or resource busy Feb 13 09:54:08.022299 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2621587166" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2621587166" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem2621587166" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem2621587166" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(13): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(13): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(14): [started] processing unit "packet-phone-home.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(14): [finished] processing unit "packet-phone-home.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(17): [started] processing unit "prepare-cni-plugins.service" Feb 13 09:54:08.022299 ignition[1058]: INFO : files: op(17): op(18): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 09:54:08.675650 kernel: audit: type=1130 audit(1707818048.103:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.675703 kernel: audit: type=1130 audit(1707818048.178:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.675727 kernel: audit: type=1131 audit(1707818048.178:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.675748 kernel: audit: type=1130 audit(1707818048.361:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.675768 kernel: audit: type=1131 audit(1707818048.361:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.675800 kernel: audit: type=1130 audit(1707818048.529:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:07.947758 systemd[1]: Finished ignition-files.service. Feb 13 09:54:08.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(17): op(18): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(17): [finished] processing unit "prepare-cni-plugins.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(19): [started] processing unit "prepare-critools.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(19): op(1a): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(19): [finished] processing unit "prepare-critools.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-critools.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-critools.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1d): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1d): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1e): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1e): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: createResultFile: createFiles: op(20): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 09:54:08.752290 ignition[1058]: INFO : files: files passed Feb 13 09:54:08.752290 ignition[1058]: INFO : POST message to Packet Timeline Feb 13 09:54:08.752290 ignition[1058]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 09:54:08.752290 ignition[1058]: INFO : GET result: OK Feb 13 09:54:09.314676 kernel: audit: type=1131 audit(1707818048.684:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.314763 kernel: audit: type=1131 audit(1707818049.006:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.314809 kernel: audit: type=1131 audit(1707818049.096:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:07.969409 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 09:54:09.331598 ignition[1058]: INFO : Ignition finished successfully Feb 13 09:54:08.030653 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 09:54:09.371682 iscsid[906]: iscsid shutting down. Feb 13 09:54:09.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.386880 initrd-setup-root-after-ignition[1091]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 09:54:09.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.031038 systemd[1]: Starting ignition-quench.service... Feb 13 09:54:09.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.077913 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 09:54:09.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.105105 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 09:54:08.105247 systemd[1]: Finished ignition-quench.service. Feb 13 09:54:08.179651 systemd[1]: Reached target ignition-complete.target. Feb 13 09:54:09.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.301077 systemd[1]: Starting initrd-parse-etc.service... Feb 13 09:54:09.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.347591 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 09:54:09.514668 ignition[1106]: INFO : Ignition 2.14.0 Feb 13 09:54:09.514668 ignition[1106]: INFO : Stage: umount Feb 13 09:54:09.514668 ignition[1106]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 09:54:09.514668 ignition[1106]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 09:54:09.514668 ignition[1106]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 09:54:09.514668 ignition[1106]: INFO : umount: umount passed Feb 13 09:54:09.514668 ignition[1106]: INFO : POST message to Packet Timeline Feb 13 09:54:09.514668 ignition[1106]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 09:54:09.514668 ignition[1106]: INFO : GET result: OK Feb 13 09:54:09.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.347653 systemd[1]: Finished initrd-parse-etc.service. Feb 13 09:54:09.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.680090 ignition[1106]: INFO : Ignition finished successfully Feb 13 09:54:09.678000 audit: BPF prog-id=6 op=UNLOAD Feb 13 09:54:09.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.362666 systemd[1]: Reached target initrd-fs.target. Feb 13 09:54:09.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.484615 systemd[1]: Reached target initrd.target. Feb 13 09:54:08.484673 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 09:54:09.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.485018 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 09:54:09.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.519768 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 09:54:09.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.531282 systemd[1]: Starting initrd-cleanup.service... Feb 13 09:54:08.599416 systemd[1]: Stopped target nss-lookup.target. Feb 13 09:54:09.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.613779 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 09:54:08.638706 systemd[1]: Stopped target timers.target. Feb 13 09:54:08.651800 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 09:54:09.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.651920 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 09:54:09.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.685352 systemd[1]: Stopped target initrd.target. Feb 13 09:54:09.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.759700 systemd[1]: Stopped target basic.target. Feb 13 09:54:08.778778 systemd[1]: Stopped target ignition-complete.target. Feb 13 09:54:09.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.797758 systemd[1]: Stopped target ignition-diskful.target. Feb 13 09:54:09.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.824714 systemd[1]: Stopped target initrd-root-device.target. Feb 13 09:54:09.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.851096 systemd[1]: Stopped target remote-fs.target. Feb 13 09:54:09.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:08.877996 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 09:54:08.898034 systemd[1]: Stopped target sysinit.target. Feb 13 09:54:08.920027 systemd[1]: Stopped target local-fs.target. Feb 13 09:54:08.942008 systemd[1]: Stopped target local-fs-pre.target. Feb 13 09:54:08.964003 systemd[1]: Stopped target swap.target. Feb 13 09:54:08.983907 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 09:54:08.984271 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 09:54:09.007364 systemd[1]: Stopped target cryptsetup.target. Feb 13 09:54:09.084679 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 09:54:09.084762 systemd[1]: Stopped dracut-initqueue.service. Feb 13 09:54:09.097848 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 09:54:09.097917 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 09:54:09.166812 systemd[1]: Stopped target paths.target. Feb 13 09:54:10.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:09.179757 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 09:54:09.183639 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 09:54:09.198756 systemd[1]: Stopped target slices.target. Feb 13 09:54:09.228837 systemd[1]: Stopped target sockets.target. Feb 13 09:54:09.254019 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 09:54:09.254279 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 09:54:09.271123 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 09:54:09.271483 systemd[1]: Stopped ignition-files.service. Feb 13 09:54:09.289109 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 09:54:09.289484 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 09:54:09.310356 systemd[1]: Stopping ignition-mount.service... Feb 13 09:54:09.321563 systemd[1]: Stopping iscsid.service... Feb 13 09:54:09.340415 systemd[1]: Stopping sysroot-boot.service... Feb 13 09:54:09.354699 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 09:54:09.355098 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 09:54:09.380002 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 09:54:09.380288 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 09:54:09.401554 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 09:54:09.402995 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 09:54:09.403201 systemd[1]: Stopped iscsid.service. Feb 13 09:54:09.416847 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 09:54:09.417045 systemd[1]: Stopped sysroot-boot.service. Feb 13 09:54:09.430762 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 09:54:09.430984 systemd[1]: Closed iscsid.socket. Feb 13 09:54:09.445885 systemd[1]: Stopping iscsiuio.service... Feb 13 09:54:09.461194 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 09:54:10.150410 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Feb 13 09:54:09.461399 systemd[1]: Stopped iscsiuio.service. Feb 13 09:54:09.475264 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 09:54:09.475476 systemd[1]: Finished initrd-cleanup.service. Feb 13 09:54:09.492592 systemd[1]: Stopped target network.target. Feb 13 09:54:09.506681 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 09:54:09.506767 systemd[1]: Closed iscsiuio.socket. Feb 13 09:54:09.521891 systemd[1]: Stopping systemd-networkd.service... Feb 13 09:54:09.531560 systemd-networkd[876]: enp2s0f1np1: DHCPv6 lease lost Feb 13 09:54:09.536856 systemd[1]: Stopping systemd-resolved.service... Feb 13 09:54:09.538601 systemd-networkd[876]: enp2s0f0np0: DHCPv6 lease lost Feb 13 09:54:10.149000 audit: BPF prog-id=9 op=UNLOAD Feb 13 09:54:09.551175 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 09:54:09.551381 systemd[1]: Stopped systemd-resolved.service. Feb 13 09:54:09.572684 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 09:54:09.572912 systemd[1]: Stopped systemd-networkd.service. Feb 13 09:54:09.592546 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 09:54:09.592599 systemd[1]: Stopped ignition-mount.service. Feb 13 09:54:09.623652 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 09:54:09.623677 systemd[1]: Closed systemd-networkd.socket. Feb 13 09:54:09.631710 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 09:54:09.631770 systemd[1]: Stopped ignition-disks.service. Feb 13 09:54:09.656969 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 09:54:09.657097 systemd[1]: Stopped ignition-kargs.service. Feb 13 09:54:09.672959 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 09:54:09.673097 systemd[1]: Stopped ignition-setup.service. Feb 13 09:54:09.687760 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 09:54:09.687899 systemd[1]: Stopped initrd-setup-root.service. Feb 13 09:54:09.706295 systemd[1]: Stopping network-cleanup.service... Feb 13 09:54:09.718613 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 09:54:09.718748 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 09:54:09.733731 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 09:54:09.733848 systemd[1]: Stopped systemd-sysctl.service. Feb 13 09:54:09.753043 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 09:54:09.753170 systemd[1]: Stopped systemd-modules-load.service. Feb 13 09:54:09.769032 systemd[1]: Stopping systemd-udevd.service... Feb 13 09:54:09.786045 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 09:54:09.787441 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 09:54:09.787728 systemd[1]: Stopped systemd-udevd.service. Feb 13 09:54:09.800231 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 09:54:09.800347 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 09:54:09.813760 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 09:54:09.813846 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 09:54:09.830659 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 09:54:09.830695 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 09:54:09.838700 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 09:54:09.838727 systemd[1]: Stopped dracut-cmdline.service. Feb 13 09:54:09.862627 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 09:54:09.862678 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 09:54:09.878481 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 09:54:09.892544 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 13 09:54:09.892577 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 13 09:54:09.907024 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 09:54:09.907136 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 09:54:09.922697 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 09:54:09.922810 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 09:54:09.942973 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 13 09:54:09.944290 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 09:54:09.944500 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 09:54:10.055977 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 09:54:10.056190 systemd[1]: Stopped network-cleanup.service. Feb 13 09:54:10.066912 systemd[1]: Reached target initrd-switch-root.target. Feb 13 09:54:10.083068 systemd[1]: Starting initrd-switch-root.service... Feb 13 09:54:10.104860 systemd[1]: Switching root. Feb 13 09:54:10.152796 systemd-journald[267]: Journal stopped Feb 13 09:54:14.073981 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 09:54:14.073996 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 09:54:14.074003 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 09:54:14.074009 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 09:54:14.074013 kernel: SELinux: policy capability open_perms=1 Feb 13 09:54:14.074019 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 09:54:14.074025 kernel: SELinux: policy capability always_check_network=0 Feb 13 09:54:14.074031 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 09:54:14.074036 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 09:54:14.074041 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 09:54:14.074046 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 09:54:14.074061 systemd[1]: Successfully loaded SELinux policy in 307.302ms. Feb 13 09:54:14.074069 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.875ms. Feb 13 09:54:14.074075 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 09:54:14.074083 systemd[1]: Detected architecture x86-64. Feb 13 09:54:14.074088 systemd[1]: Detected first boot. Feb 13 09:54:14.074094 systemd[1]: Hostname set to . Feb 13 09:54:14.074100 systemd[1]: Initializing machine ID from random generator. Feb 13 09:54:14.074106 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 09:54:14.074113 systemd[1]: Populated /etc with preset unit settings. Feb 13 09:54:14.074119 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 09:54:14.074125 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 09:54:14.074131 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 09:54:14.074137 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 09:54:14.074143 systemd[1]: Stopped initrd-switch-root.service. Feb 13 09:54:14.074149 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 09:54:14.074157 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 09:54:14.074163 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 09:54:14.074170 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 09:54:14.074175 systemd[1]: Created slice system-getty.slice. Feb 13 09:54:14.074181 systemd[1]: Created slice system-modprobe.slice. Feb 13 09:54:14.074187 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 09:54:14.074193 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 09:54:14.074199 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 09:54:14.074205 systemd[1]: Created slice user.slice. Feb 13 09:54:14.074211 systemd[1]: Started systemd-ask-password-console.path. Feb 13 09:54:14.074217 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 09:54:14.074223 systemd[1]: Set up automount boot.automount. Feb 13 09:54:14.074229 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 09:54:14.074244 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 09:54:14.074253 systemd[1]: Stopped target initrd-fs.target. Feb 13 09:54:14.074259 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 09:54:14.074265 systemd[1]: Reached target integritysetup.target. Feb 13 09:54:14.074272 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 09:54:14.074278 systemd[1]: Reached target remote-fs.target. Feb 13 09:54:14.074285 systemd[1]: Reached target slices.target. Feb 13 09:54:14.074291 systemd[1]: Reached target swap.target. Feb 13 09:54:14.074297 systemd[1]: Reached target torcx.target. Feb 13 09:54:14.074303 systemd[1]: Reached target veritysetup.target. Feb 13 09:54:14.074309 systemd[1]: Listening on systemd-coredump.socket. Feb 13 09:54:14.074315 systemd[1]: Listening on systemd-initctl.socket. Feb 13 09:54:14.074323 systemd[1]: Listening on systemd-networkd.socket. Feb 13 09:54:14.074329 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 09:54:14.074336 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 09:54:14.074342 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 09:54:14.074349 systemd[1]: Mounting dev-hugepages.mount... Feb 13 09:54:14.074355 systemd[1]: Mounting dev-mqueue.mount... Feb 13 09:54:14.074361 systemd[1]: Mounting media.mount... Feb 13 09:54:14.074368 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 09:54:14.074374 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 09:54:14.074380 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 09:54:14.074387 systemd[1]: Mounting tmp.mount... Feb 13 09:54:14.074393 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 09:54:14.074399 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 09:54:14.074409 systemd[1]: Starting kmod-static-nodes.service... Feb 13 09:54:14.074415 systemd[1]: Starting modprobe@configfs.service... Feb 13 09:54:14.074422 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 09:54:14.074428 systemd[1]: Starting modprobe@drm.service... Feb 13 09:54:14.074435 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 09:54:14.074441 systemd[1]: Starting modprobe@fuse.service... Feb 13 09:54:14.074448 kernel: fuse: init (API version 7.34) Feb 13 09:54:14.074467 systemd[1]: Starting modprobe@loop.service... Feb 13 09:54:14.074473 kernel: loop: module loaded Feb 13 09:54:14.074480 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 09:54:14.074486 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 09:54:14.074493 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 09:54:14.074499 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 09:54:14.074505 kernel: kauditd_printk_skb: 66 callbacks suppressed Feb 13 09:54:14.074511 kernel: audit: type=1131 audit(1707818053.716:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.074517 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 09:54:14.074523 kernel: audit: type=1131 audit(1707818053.803:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.074529 systemd[1]: Stopped systemd-journald.service. Feb 13 09:54:14.074536 kernel: audit: type=1130 audit(1707818053.867:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.074542 kernel: audit: type=1131 audit(1707818053.867:112): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.074547 kernel: audit: type=1334 audit(1707818053.952:113): prog-id=18 op=LOAD Feb 13 09:54:14.074553 kernel: audit: type=1334 audit(1707818053.970:114): prog-id=19 op=LOAD Feb 13 09:54:14.074558 kernel: audit: type=1334 audit(1707818053.989:115): prog-id=20 op=LOAD Feb 13 09:54:14.074564 kernel: audit: type=1334 audit(1707818054.007:116): prog-id=16 op=UNLOAD Feb 13 09:54:14.074570 systemd[1]: Starting systemd-journald.service... Feb 13 09:54:14.074577 kernel: audit: type=1334 audit(1707818054.007:117): prog-id=17 op=UNLOAD Feb 13 09:54:14.074582 systemd[1]: Starting systemd-modules-load.service... Feb 13 09:54:14.074588 kernel: audit: type=1305 audit(1707818054.070:118): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 09:54:14.074595 systemd-journald[1255]: Journal started Feb 13 09:54:14.074620 systemd-journald[1255]: Runtime Journal (/run/log/journal/aec9641a15cd454b91b2bfd83f7892ca) is 8.0M, max 639.3M, 631.3M free. Feb 13 09:54:10.539000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 09:54:10.809000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 09:54:10.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 09:54:10.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 09:54:10.811000 audit: BPF prog-id=10 op=LOAD Feb 13 09:54:10.811000 audit: BPF prog-id=10 op=UNLOAD Feb 13 09:54:10.812000 audit: BPF prog-id=11 op=LOAD Feb 13 09:54:10.812000 audit: BPF prog-id=11 op=UNLOAD Feb 13 09:54:10.877000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 09:54:10.877000 audit[1145]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:10.877000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 09:54:10.902000 audit[1145]: AVC avc: denied { associate } for pid=1145 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 09:54:10.902000 audit[1145]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b5 a2=1ed a3=0 items=2 ppid=1128 pid=1145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:10.902000 audit: CWD cwd="/" Feb 13 09:54:10.902000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:10.902000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:10.902000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 09:54:12.461000 audit: BPF prog-id=12 op=LOAD Feb 13 09:54:12.461000 audit: BPF prog-id=3 op=UNLOAD Feb 13 09:54:12.461000 audit: BPF prog-id=13 op=LOAD Feb 13 09:54:12.461000 audit: BPF prog-id=14 op=LOAD Feb 13 09:54:12.461000 audit: BPF prog-id=4 op=UNLOAD Feb 13 09:54:12.461000 audit: BPF prog-id=5 op=UNLOAD Feb 13 09:54:12.462000 audit: BPF prog-id=15 op=LOAD Feb 13 09:54:12.462000 audit: BPF prog-id=12 op=UNLOAD Feb 13 09:54:12.462000 audit: BPF prog-id=16 op=LOAD Feb 13 09:54:12.462000 audit: BPF prog-id=17 op=LOAD Feb 13 09:54:12.462000 audit: BPF prog-id=13 op=UNLOAD Feb 13 09:54:12.462000 audit: BPF prog-id=14 op=UNLOAD Feb 13 09:54:12.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:12.516000 audit: BPF prog-id=15 op=UNLOAD Feb 13 09:54:12.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:12.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:13.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:13.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:13.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:13.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:13.952000 audit: BPF prog-id=18 op=LOAD Feb 13 09:54:13.970000 audit: BPF prog-id=19 op=LOAD Feb 13 09:54:13.989000 audit: BPF prog-id=20 op=LOAD Feb 13 09:54:14.007000 audit: BPF prog-id=16 op=UNLOAD Feb 13 09:54:14.007000 audit: BPF prog-id=17 op=UNLOAD Feb 13 09:54:14.070000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 09:54:10.876010 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 09:54:12.461329 systemd[1]: Queued start job for default target multi-user.target. Feb 13 09:54:10.876417 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 09:54:12.464625 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 09:54:10.876430 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 09:54:10.876450 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 09:54:10.876456 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 09:54:10.876475 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 09:54:10.876483 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 09:54:10.876604 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 09:54:10.876626 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 09:54:10.876634 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 09:54:10.877085 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 09:54:10.877106 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 09:54:10.877117 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 09:54:10.877126 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 09:54:10.877136 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 09:54:10.877144 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 09:54:12.068554 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:12Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 09:54:12.068700 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:12Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 09:54:12.068758 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:12Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 09:54:12.068857 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:12Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 09:54:12.068886 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:12Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 09:54:12.068918 /usr/lib/systemd/system-generators/torcx-generator[1145]: time="2024-02-13T09:54:12Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 09:54:14.070000 audit[1255]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe3df024b0 a2=4000 a3=7ffe3df0254c items=0 ppid=1 pid=1255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:14.070000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 09:54:14.153614 systemd[1]: Starting systemd-network-generator.service... Feb 13 09:54:14.180457 systemd[1]: Starting systemd-remount-fs.service... Feb 13 09:54:14.207458 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 09:54:14.250204 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 09:54:14.250226 systemd[1]: Stopped verity-setup.service. Feb 13 09:54:14.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.295446 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 09:54:14.315580 systemd[1]: Started systemd-journald.service. Feb 13 09:54:14.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.324037 systemd[1]: Mounted dev-hugepages.mount. Feb 13 09:54:14.331744 systemd[1]: Mounted dev-mqueue.mount. Feb 13 09:54:14.338661 systemd[1]: Mounted media.mount. Feb 13 09:54:14.345662 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 09:54:14.354671 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 09:54:14.363649 systemd[1]: Mounted tmp.mount. Feb 13 09:54:14.370747 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 09:54:14.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.379784 systemd[1]: Finished kmod-static-nodes.service. Feb 13 09:54:14.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.388933 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 09:54:14.389051 systemd[1]: Finished modprobe@configfs.service. Feb 13 09:54:14.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.397873 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 09:54:14.398014 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 09:54:14.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.406864 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 09:54:14.407036 systemd[1]: Finished modprobe@drm.service. Feb 13 09:54:14.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.416056 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 09:54:14.416301 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 09:54:14.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.425215 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 09:54:14.425552 systemd[1]: Finished modprobe@fuse.service. Feb 13 09:54:14.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.434205 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 09:54:14.434665 systemd[1]: Finished modprobe@loop.service. Feb 13 09:54:14.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.443379 systemd[1]: Finished systemd-modules-load.service. Feb 13 09:54:14.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.452296 systemd[1]: Finished systemd-network-generator.service. Feb 13 09:54:14.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.461195 systemd[1]: Finished systemd-remount-fs.service. Feb 13 09:54:14.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.470171 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 09:54:14.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.479684 systemd[1]: Reached target network-pre.target. Feb 13 09:54:14.490460 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 09:54:14.501021 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 09:54:14.507687 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 09:54:14.510924 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 09:54:14.520890 systemd[1]: Starting systemd-journal-flush.service... Feb 13 09:54:14.529536 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 09:54:14.529926 systemd-journald[1255]: Time spent on flushing to /var/log/journal/aec9641a15cd454b91b2bfd83f7892ca is 16.761ms for 1652 entries. Feb 13 09:54:14.529926 systemd-journald[1255]: System Journal (/var/log/journal/aec9641a15cd454b91b2bfd83f7892ca) is 8.0M, max 195.6M, 187.6M free. Feb 13 09:54:14.576346 systemd-journald[1255]: Received client request to flush runtime journal. Feb 13 09:54:14.530094 systemd[1]: Starting systemd-random-seed.service... Feb 13 09:54:14.557533 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 09:54:14.558033 systemd[1]: Starting systemd-sysctl.service... Feb 13 09:54:14.565366 systemd[1]: Starting systemd-sysusers.service... Feb 13 09:54:14.573019 systemd[1]: Starting systemd-udev-settle.service... Feb 13 09:54:14.580657 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 09:54:14.588568 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 09:54:14.596659 systemd[1]: Finished systemd-journal-flush.service. Feb 13 09:54:14.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.604646 systemd[1]: Finished systemd-random-seed.service. Feb 13 09:54:14.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.612648 systemd[1]: Finished systemd-sysctl.service. Feb 13 09:54:14.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.620623 systemd[1]: Finished systemd-sysusers.service. Feb 13 09:54:14.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.629661 systemd[1]: Reached target first-boot-complete.target. Feb 13 09:54:14.638129 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 09:54:14.647457 udevadm[1273]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 13 09:54:14.656473 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 09:54:14.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.847738 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 09:54:14.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.855000 audit: BPF prog-id=21 op=LOAD Feb 13 09:54:14.855000 audit: BPF prog-id=22 op=LOAD Feb 13 09:54:14.855000 audit: BPF prog-id=7 op=UNLOAD Feb 13 09:54:14.855000 audit: BPF prog-id=8 op=UNLOAD Feb 13 09:54:14.857635 systemd[1]: Starting systemd-udevd.service... Feb 13 09:54:14.869530 systemd-udevd[1276]: Using default interface naming scheme 'v252'. Feb 13 09:54:14.888348 systemd[1]: Started systemd-udevd.service. Feb 13 09:54:14.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:14.899889 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 09:54:14.899000 audit: BPF prog-id=23 op=LOAD Feb 13 09:54:14.901371 systemd[1]: Starting systemd-networkd.service... Feb 13 09:54:14.923000 audit: BPF prog-id=24 op=LOAD Feb 13 09:54:14.942195 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 09:54:14.942281 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 09:54:14.942304 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1284) Feb 13 09:54:14.967432 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 09:54:14.986000 audit: BPF prog-id=25 op=LOAD Feb 13 09:54:14.986000 audit: BPF prog-id=26 op=LOAD Feb 13 09:54:14.988413 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 09:54:14.988658 systemd[1]: Starting systemd-userdbd.service... Feb 13 09:54:15.008413 kernel: ACPI: button: Power Button [PWRF] Feb 13 09:54:15.039588 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 09:54:14.943000 audit[1334]: AVC avc: denied { confidentiality } for pid=1334 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 09:54:15.053586 systemd[1]: Started systemd-userdbd.service. Feb 13 09:54:15.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:15.083211 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 09:54:15.091901 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 09:54:15.092427 kernel: IPMI message handler: version 39.2 Feb 13 09:54:15.108417 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 09:54:14.943000 audit[1334]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bd549bb0b0 a1=4d8bc a2=7fb795d40bc5 a3=5 items=42 ppid=1276 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:14.943000 audit: CWD cwd="/" Feb 13 09:54:14.943000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=1 name=(null) inode=8341 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=2 name=(null) inode=8341 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=3 name=(null) inode=8342 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=4 name=(null) inode=8341 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=5 name=(null) inode=8343 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=6 name=(null) inode=8341 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=7 name=(null) inode=8344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=8 name=(null) inode=8344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=9 name=(null) inode=8345 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=10 name=(null) inode=8344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=11 name=(null) inode=8346 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=12 name=(null) inode=8344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=13 name=(null) inode=8347 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=14 name=(null) inode=8344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=15 name=(null) inode=8348 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=16 name=(null) inode=8344 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=17 name=(null) inode=8349 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=18 name=(null) inode=8341 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=19 name=(null) inode=8350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=20 name=(null) inode=8350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=21 name=(null) inode=8351 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=22 name=(null) inode=8350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=23 name=(null) inode=8352 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=24 name=(null) inode=8350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=25 name=(null) inode=8353 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=26 name=(null) inode=8350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=27 name=(null) inode=8354 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=28 name=(null) inode=8350 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=29 name=(null) inode=8355 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=30 name=(null) inode=8341 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=31 name=(null) inode=8356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=32 name=(null) inode=8356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=33 name=(null) inode=8357 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=34 name=(null) inode=8356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=35 name=(null) inode=8358 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=36 name=(null) inode=8356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=37 name=(null) inode=8359 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=38 name=(null) inode=8356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=39 name=(null) inode=8360 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=40 name=(null) inode=8356 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PATH item=41 name=(null) inode=8361 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 09:54:14.943000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 09:54:15.149413 kernel: ipmi device interface Feb 13 09:54:15.149455 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 09:54:15.149549 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 09:54:15.221417 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 09:54:15.259664 kernel: ipmi_si: IPMI System Interface driver Feb 13 09:54:15.259723 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 09:54:15.259936 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 09:54:15.299585 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 09:54:15.318907 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 09:54:15.319062 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 09:54:15.367414 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 13 09:54:15.367722 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 09:54:15.385139 systemd-networkd[1326]: bond0: netdev ready Feb 13 09:54:15.387181 systemd-networkd[1326]: lo: Link UP Feb 13 09:54:15.387184 systemd-networkd[1326]: lo: Gained carrier Feb 13 09:54:15.387656 systemd-networkd[1326]: Enumeration completed Feb 13 09:54:15.387717 systemd[1]: Started systemd-networkd.service. Feb 13 09:54:15.387942 systemd-networkd[1326]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 09:54:15.388765 systemd-networkd[1326]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d9:a3:e9.network. Feb 13 09:54:15.389410 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 09:54:15.389429 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 09:54:15.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:15.466413 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 09:54:15.491458 kernel: intel_rapl_common: Found RAPL domain package Feb 13 09:54:15.491499 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 13 09:54:15.491598 kernel: intel_rapl_common: Found RAPL domain core Feb 13 09:54:15.491611 kernel: intel_rapl_common: Found RAPL domain uncore Feb 13 09:54:15.491632 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 09:54:15.713415 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 09:54:15.732409 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 09:54:15.737692 systemd[1]: Finished systemd-udev-settle.service. Feb 13 09:54:15.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:15.746243 systemd[1]: Starting lvm2-activation-early.service... Feb 13 09:54:15.762372 lvm[1381]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 09:54:15.795819 systemd[1]: Finished lvm2-activation-early.service. Feb 13 09:54:15.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:15.803622 systemd[1]: Reached target cryptsetup.target. Feb 13 09:54:15.812021 systemd[1]: Starting lvm2-activation.service... Feb 13 09:54:15.814080 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 09:54:15.844828 systemd[1]: Finished lvm2-activation.service. Feb 13 09:54:15.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:15.853489 systemd[1]: Reached target local-fs-pre.target. Feb 13 09:54:15.861495 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 09:54:15.861511 systemd[1]: Reached target local-fs.target. Feb 13 09:54:15.869489 systemd[1]: Reached target machines.target. Feb 13 09:54:15.878077 systemd[1]: Starting ldconfig.service... Feb 13 09:54:15.884959 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 09:54:15.884981 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 09:54:15.885517 systemd[1]: Starting systemd-boot-update.service... Feb 13 09:54:15.891830 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 09:54:15.902090 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 09:54:15.902179 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 09:54:15.902202 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 09:54:15.902836 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 09:54:15.903072 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1384 (bootctl) Feb 13 09:54:15.903689 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 09:54:15.912331 systemd-tmpfiles[1388]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 09:54:15.923792 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 09:54:15.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:15.924044 systemd-tmpfiles[1388]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 09:54:15.932952 systemd-tmpfiles[1388]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 09:54:15.988447 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 09:54:16.012446 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 13 09:54:16.012512 systemd-networkd[1326]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d9:a3:e8.network. Feb 13 09:54:16.036465 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 09:54:16.164462 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 09:54:16.164547 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 09:54:16.203460 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 13 09:54:16.203524 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 09:54:16.222250 systemd-networkd[1326]: bond0: Link UP Feb 13 09:54:16.222476 systemd-networkd[1326]: enp2s0f1np1: Link UP Feb 13 09:54:16.222591 systemd-networkd[1326]: enp2s0f1np1: Gained carrier Feb 13 09:54:16.223535 systemd-networkd[1326]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d9:a3:e8.network. Feb 13 09:54:16.260992 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 09:54:16.261020 kernel: bond0: active interface up! Feb 13 09:54:16.293464 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 09:54:16.352100 systemd-networkd[1326]: enp2s0f0np0: Link UP Feb 13 09:54:16.352246 systemd-networkd[1326]: bond0: Gained carrier Feb 13 09:54:16.352331 systemd-networkd[1326]: enp2s0f0np0: Gained carrier Feb 13 09:54:16.362655 systemd-networkd[1326]: enp2s0f1np1: Link DOWN Feb 13 09:54:16.362657 systemd-networkd[1326]: enp2s0f1np1: Lost carrier Feb 13 09:54:16.406270 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Feb 13 09:54:16.406299 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Feb 13 09:54:16.427464 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 13 09:54:16.460102 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 09:54:16.460438 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 09:54:16.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:16.482418 systemd-fsck[1392]: fsck.fat 4.2 (2021-01-31) Feb 13 09:54:16.482418 systemd-fsck[1392]: /dev/sda1: 789 files, 115339/258078 clusters Feb 13 09:54:16.483172 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 09:54:16.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:16.493242 systemd[1]: Mounting boot.mount... Feb 13 09:54:16.506626 systemd[1]: Mounted boot.mount. Feb 13 09:54:16.526714 systemd[1]: Finished systemd-boot-update.service. Feb 13 09:54:16.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:16.560737 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 09:54:16.576409 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 09:54:16.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:16.591302 systemd[1]: Starting audit-rules.service... Feb 13 09:54:16.597411 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Feb 13 09:54:16.598297 systemd-networkd[1326]: enp2s0f1np1: Link UP Feb 13 09:54:16.598464 systemd-networkd[1326]: enp2s0f1np1: Gained carrier Feb 13 09:54:16.605044 systemd[1]: Starting clean-ca-certificates.service... Feb 13 09:54:16.610000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 09:54:16.610000 audit[1411]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffea35a4d90 a2=420 a3=0 items=0 ppid=1395 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:16.610000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 09:54:16.611843 augenrules[1411]: No rules Feb 13 09:54:16.614071 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 09:54:16.624391 systemd[1]: Starting systemd-resolved.service... Feb 13 09:54:16.632306 systemd[1]: Starting systemd-timesyncd.service... Feb 13 09:54:16.647977 systemd[1]: Starting systemd-update-utmp.service... Feb 13 09:54:16.652410 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Feb 13 09:54:16.666755 systemd[1]: Finished audit-rules.service. Feb 13 09:54:16.672411 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 09:54:16.678617 systemd[1]: Finished clean-ca-certificates.service. Feb 13 09:54:16.686612 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 09:54:16.698290 systemd[1]: Finished systemd-update-utmp.service. Feb 13 09:54:16.706527 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 09:54:16.708066 ldconfig[1383]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 09:54:16.710597 systemd[1]: Finished ldconfig.service. Feb 13 09:54:16.718085 systemd[1]: Starting systemd-update-done.service... Feb 13 09:54:16.724615 systemd[1]: Started systemd-timesyncd.service. Feb 13 09:54:16.725434 systemd-resolved[1417]: Positive Trust Anchors: Feb 13 09:54:16.725441 systemd-resolved[1417]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 09:54:16.725459 systemd-resolved[1417]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 09:54:16.729513 systemd-resolved[1417]: Using system hostname 'ci-3510.3.2-a-0e431cd218'. Feb 13 09:54:16.732605 systemd[1]: Started systemd-resolved.service. Feb 13 09:54:16.740632 systemd[1]: Finished systemd-update-done.service. Feb 13 09:54:16.748559 systemd[1]: Reached target network.target. Feb 13 09:54:16.756508 systemd[1]: Reached target nss-lookup.target. Feb 13 09:54:16.764486 systemd[1]: Reached target sysinit.target. Feb 13 09:54:16.772528 systemd[1]: Started motdgen.path. Feb 13 09:54:16.779510 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 09:54:16.789492 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 09:54:16.797485 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 09:54:16.797503 systemd[1]: Reached target paths.target. Feb 13 09:54:16.804483 systemd[1]: Reached target time-set.target. Feb 13 09:54:16.812542 systemd[1]: Started logrotate.timer. Feb 13 09:54:16.819537 systemd[1]: Started mdadm.timer. Feb 13 09:54:16.826479 systemd[1]: Reached target timers.target. Feb 13 09:54:16.833599 systemd[1]: Listening on dbus.socket. Feb 13 09:54:16.841000 systemd[1]: Starting docker.socket... Feb 13 09:54:16.848888 systemd[1]: Listening on sshd.socket. Feb 13 09:54:16.855554 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 09:54:16.855762 systemd[1]: Listening on docker.socket. Feb 13 09:54:16.862538 systemd[1]: Reached target sockets.target. Feb 13 09:54:16.870489 systemd[1]: Reached target basic.target. Feb 13 09:54:16.877510 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 09:54:16.877524 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 09:54:16.877968 systemd[1]: Starting containerd.service... Feb 13 09:54:16.884905 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 09:54:16.893968 systemd[1]: Starting coreos-metadata.service... Feb 13 09:54:16.900974 systemd[1]: Starting dbus.service... Feb 13 09:54:16.906966 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 09:54:16.912593 jq[1432]: false Feb 13 09:54:16.914075 systemd[1]: Starting extend-filesystems.service... Feb 13 09:54:16.914349 coreos-metadata[1425]: Feb 13 09:54:16.914 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 09:54:16.920491 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 09:54:16.920757 dbus-daemon[1431]: [system] SELinux support is enabled Feb 13 09:54:16.921174 systemd[1]: Starting motdgen.service... Feb 13 09:54:16.922296 extend-filesystems[1433]: Found sda Feb 13 09:54:16.922296 extend-filesystems[1433]: Found sda1 Feb 13 09:54:16.965503 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 13 09:54:16.928155 systemd[1]: Starting prepare-cni-plugins.service... Feb 13 09:54:16.965588 coreos-metadata[1428]: Feb 13 09:54:16.923 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 09:54:16.965698 extend-filesystems[1433]: Found sda2 Feb 13 09:54:16.965698 extend-filesystems[1433]: Found sda3 Feb 13 09:54:16.965698 extend-filesystems[1433]: Found usr Feb 13 09:54:16.965698 extend-filesystems[1433]: Found sda4 Feb 13 09:54:16.965698 extend-filesystems[1433]: Found sda6 Feb 13 09:54:16.965698 extend-filesystems[1433]: Found sda7 Feb 13 09:54:16.965698 extend-filesystems[1433]: Found sda9 Feb 13 09:54:16.965698 extend-filesystems[1433]: Checking size of /dev/sda9 Feb 13 09:54:16.965698 extend-filesystems[1433]: Resized partition /dev/sda9 Feb 13 09:54:16.958251 systemd[1]: Starting prepare-critools.service... Feb 13 09:54:17.072570 extend-filesystems[1449]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 09:54:16.973085 systemd[1]: Starting prepare-helm.service... Feb 13 09:54:16.981035 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 09:54:16.993049 systemd[1]: Starting sshd-keygen.service... Feb 13 09:54:17.013072 systemd[1]: Starting systemd-logind.service... Feb 13 09:54:17.029451 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 09:54:17.030050 systemd[1]: Starting tcsd.service... Feb 13 09:54:17.088969 jq[1465]: true Feb 13 09:54:17.033717 systemd-logind[1462]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 09:54:17.033726 systemd-logind[1462]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 09:54:17.033735 systemd-logind[1462]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 09:54:17.033869 systemd-logind[1462]: New seat seat0. Feb 13 09:54:17.037912 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 09:54:17.038270 systemd[1]: Starting update-engine.service... Feb 13 09:54:17.089330 update_engine[1464]: I0213 09:54:17.088770 1464 main.cc:92] Flatcar Update Engine starting Feb 13 09:54:17.057154 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 09:54:17.080823 systemd[1]: Started dbus.service. Feb 13 09:54:17.092251 update_engine[1464]: I0213 09:54:17.092242 1464 update_check_scheduler.cc:74] Next update check in 6m42s Feb 13 09:54:17.097214 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 09:54:17.097301 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 09:54:17.097471 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 09:54:17.097551 systemd[1]: Finished motdgen.service. Feb 13 09:54:17.105570 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 09:54:17.105653 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 09:54:17.109704 tar[1467]: ./ Feb 13 09:54:17.109704 tar[1467]: ./loopback Feb 13 09:54:17.116195 jq[1473]: true Feb 13 09:54:17.116737 dbus-daemon[1431]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 09:54:17.118057 tar[1469]: linux-amd64/helm Feb 13 09:54:17.119347 tar[1468]: crictl Feb 13 09:54:17.121552 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 09:54:17.121653 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 09:54:17.123336 systemd[1]: Started update-engine.service. Feb 13 09:54:17.126691 env[1474]: time="2024-02-13T09:54:17.126634118Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 09:54:17.129647 tar[1467]: ./bandwidth Feb 13 09:54:17.132907 systemd[1]: Started systemd-logind.service. Feb 13 09:54:17.135559 env[1474]: time="2024-02-13T09:54:17.135541751Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 09:54:17.137304 env[1474]: time="2024-02-13T09:54:17.137295085Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 09:54:17.137993 env[1474]: time="2024-02-13T09:54:17.137976669Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 09:54:17.137993 env[1474]: time="2024-02-13T09:54:17.137992251Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139676 env[1474]: time="2024-02-13T09:54:17.139661617Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139676 env[1474]: time="2024-02-13T09:54:17.139674334Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139730 env[1474]: time="2024-02-13T09:54:17.139683310Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 09:54:17.139730 env[1474]: time="2024-02-13T09:54:17.139689125Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139772 env[1474]: time="2024-02-13T09:54:17.139730762Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139878 env[1474]: time="2024-02-13T09:54:17.139869500Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139952 env[1474]: time="2024-02-13T09:54:17.139941263Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 09:54:17.139952 env[1474]: time="2024-02-13T09:54:17.139951072Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 09:54:17.141542 env[1474]: time="2024-02-13T09:54:17.141526941Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 09:54:17.142000 env[1474]: time="2024-02-13T09:54:17.141542394Z" level=info msg="metadata content store policy set" policy=shared Feb 13 09:54:17.142244 systemd[1]: Started locksmithd.service. Feb 13 09:54:17.146615 bash[1501]: Updated "/home/core/.ssh/authorized_keys" Feb 13 09:54:17.148569 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 09:54:17.148649 systemd[1]: Reached target system-config.target. Feb 13 09:54:17.153347 env[1474]: time="2024-02-13T09:54:17.153331223Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 09:54:17.153391 env[1474]: time="2024-02-13T09:54:17.153351444Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 09:54:17.153391 env[1474]: time="2024-02-13T09:54:17.153359860Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 09:54:17.153391 env[1474]: time="2024-02-13T09:54:17.153379606Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153391175Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153399087Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153413880Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153426627Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153438085Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153446481Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153453834Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153459 env[1474]: time="2024-02-13T09:54:17.153460182Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 09:54:17.153581 env[1474]: time="2024-02-13T09:54:17.153514776Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 09:54:17.153581 env[1474]: time="2024-02-13T09:54:17.153560987Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 09:54:17.153715 env[1474]: time="2024-02-13T09:54:17.153706304Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 09:54:17.153738 env[1474]: time="2024-02-13T09:54:17.153728325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153755 env[1474]: time="2024-02-13T09:54:17.153738706Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 09:54:17.153777 env[1474]: time="2024-02-13T09:54:17.153769236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153796 env[1474]: time="2024-02-13T09:54:17.153779027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153796 env[1474]: time="2024-02-13T09:54:17.153787882Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153826 env[1474]: time="2024-02-13T09:54:17.153796498Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153826 env[1474]: time="2024-02-13T09:54:17.153804972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153826 env[1474]: time="2024-02-13T09:54:17.153811991Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153826 env[1474]: time="2024-02-13T09:54:17.153819509Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153884 env[1474]: time="2024-02-13T09:54:17.153827792Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153884 env[1474]: time="2024-02-13T09:54:17.153843998Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 09:54:17.153921 env[1474]: time="2024-02-13T09:54:17.153914143Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153939 env[1474]: time="2024-02-13T09:54:17.153923992Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153939 env[1474]: time="2024-02-13T09:54:17.153930521Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.153939 env[1474]: time="2024-02-13T09:54:17.153936784Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 09:54:17.153988 env[1474]: time="2024-02-13T09:54:17.153945032Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 09:54:17.153988 env[1474]: time="2024-02-13T09:54:17.153951668Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 09:54:17.153988 env[1474]: time="2024-02-13T09:54:17.153965690Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 09:54:17.154039 env[1474]: time="2024-02-13T09:54:17.153990557Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 09:54:17.154130 env[1474]: time="2024-02-13T09:54:17.154104132Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154136958Z" level=info msg="Connect containerd service" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154155369Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154489210Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154580086Z" level=info msg="Start subscribing containerd event" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154620870Z" level=info msg="Start recovering state" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154621391Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154644464Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154664463Z" level=info msg="Start event monitor" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154668954Z" level=info msg="containerd successfully booted in 0.028434s" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154682602Z" level=info msg="Start snapshots syncer" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154692185Z" level=info msg="Start cni network conf syncer for default" Feb 13 09:54:17.156696 env[1474]: time="2024-02-13T09:54:17.154700278Z" level=info msg="Start streaming server" Feb 13 09:54:17.156561 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 09:54:17.156690 systemd[1]: Reached target user-config.target. Feb 13 09:54:17.166086 systemd[1]: Started containerd.service. Feb 13 09:54:17.168030 tar[1467]: ./ptp Feb 13 09:54:17.172771 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 09:54:17.192026 tar[1467]: ./vlan Feb 13 09:54:17.201613 locksmithd[1509]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 09:54:17.215068 tar[1467]: ./host-device Feb 13 09:54:17.237475 tar[1467]: ./tuning Feb 13 09:54:17.257127 tar[1467]: ./vrf Feb 13 09:54:17.276903 tar[1467]: ./sbr Feb 13 09:54:17.296235 tar[1467]: ./tap Feb 13 09:54:17.318348 tar[1467]: ./dhcp Feb 13 09:54:17.370901 tar[1469]: linux-amd64/LICENSE Feb 13 09:54:17.370901 tar[1469]: linux-amd64/README.md Feb 13 09:54:17.373463 systemd[1]: Finished prepare-helm.service. Feb 13 09:54:17.374659 tar[1467]: ./static Feb 13 09:54:17.390655 tar[1467]: ./firewall Feb 13 09:54:17.394626 systemd[1]: Finished prepare-critools.service. Feb 13 09:54:17.415155 tar[1467]: ./macvlan Feb 13 09:54:17.431463 systemd-networkd[1326]: bond0: Gained IPv6LL Feb 13 09:54:17.437392 tar[1467]: ./dummy Feb 13 09:54:17.443409 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 13 09:54:17.471726 extend-filesystems[1449]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 13 09:54:17.471726 extend-filesystems[1449]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 09:54:17.471726 extend-filesystems[1449]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 13 09:54:17.508532 extend-filesystems[1433]: Resized filesystem in /dev/sda9 Feb 13 09:54:17.508532 extend-filesystems[1433]: Found sdb Feb 13 09:54:17.523497 tar[1467]: ./bridge Feb 13 09:54:17.523497 tar[1467]: ./ipvlan Feb 13 09:54:17.472222 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 09:54:17.472306 systemd[1]: Finished extend-filesystems.service. Feb 13 09:54:17.533674 tar[1467]: ./portmap Feb 13 09:54:17.546077 sshd_keygen[1461]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 09:54:17.554463 tar[1467]: ./host-local Feb 13 09:54:17.558124 systemd[1]: Finished sshd-keygen.service. Feb 13 09:54:17.565385 systemd[1]: Starting issuegen.service... Feb 13 09:54:17.572726 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 09:54:17.572805 systemd[1]: Finished issuegen.service. Feb 13 09:54:17.580795 systemd[1]: Starting systemd-user-sessions.service... Feb 13 09:54:17.590238 systemd[1]: Finished systemd-user-sessions.service. Feb 13 09:54:17.598759 systemd[1]: Finished prepare-cni-plugins.service. Feb 13 09:54:17.609619 systemd[1]: Started getty@tty1.service. Feb 13 09:54:17.619360 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 09:54:17.628067 systemd[1]: Reached target getty.target. Feb 13 09:54:19.105471 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 09:54:22.638755 login[1535]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 09:54:22.646782 systemd-logind[1462]: New session 1 of user core. Feb 13 09:54:22.646860 login[1534]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 09:54:22.647335 systemd[1]: Created slice user-500.slice. Feb 13 09:54:22.647950 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 09:54:22.650260 systemd-logind[1462]: New session 2 of user core. Feb 13 09:54:22.653180 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 09:54:22.653897 systemd[1]: Starting user@500.service... Feb 13 09:54:22.655826 (systemd)[1539]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:22.729151 systemd[1539]: Queued start job for default target default.target. Feb 13 09:54:22.729434 systemd[1539]: Reached target paths.target. Feb 13 09:54:22.729451 systemd[1539]: Reached target sockets.target. Feb 13 09:54:22.729465 systemd[1539]: Reached target timers.target. Feb 13 09:54:22.729477 systemd[1539]: Reached target basic.target. Feb 13 09:54:22.729504 systemd[1539]: Reached target default.target. Feb 13 09:54:22.729525 systemd[1539]: Startup finished in 70ms. Feb 13 09:54:22.729562 systemd[1]: Started user@500.service. Feb 13 09:54:22.730175 systemd[1]: Started session-1.scope. Feb 13 09:54:22.730549 systemd[1]: Started session-2.scope. Feb 13 09:54:22.872567 coreos-metadata[1425]: Feb 13 09:54:22.872 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 09:54:22.873313 coreos-metadata[1428]: Feb 13 09:54:22.872 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 13 09:54:23.872928 coreos-metadata[1428]: Feb 13 09:54:23.872 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 09:54:23.873196 coreos-metadata[1425]: Feb 13 09:54:23.872 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 13 09:54:24.381574 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 13 09:54:24.381737 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 13 09:54:24.928776 systemd[1]: Created slice system-sshd.slice. Feb 13 09:54:24.929455 systemd[1]: Started sshd@0-139.178.70.11:22-139.178.68.195:57474.service. Feb 13 09:54:24.943468 coreos-metadata[1428]: Feb 13 09:54:24.943 INFO Fetch successful Feb 13 09:54:24.945203 coreos-metadata[1425]: Feb 13 09:54:24.945 INFO Fetch successful Feb 13 09:54:24.534577 systemd-resolved[1417]: Clock change detected. Flushing caches. Feb 13 09:54:24.558301 systemd-journald[1255]: Time jumped backwards, rotating. Feb 13 09:54:24.543430 sshd[1560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:24.558474 sshd[1560]: Accepted publickey for core from 139.178.68.195 port 57474 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:24.534589 systemd-timesyncd[1418]: Contacted time server 45.79.51.42:123 (0.flatcar.pool.ntp.org). Feb 13 09:54:24.534620 systemd-timesyncd[1418]: Initial clock synchronization to Tue 2024-02-13 09:54:24.534504 UTC. Feb 13 09:54:24.542073 systemd[1]: Finished coreos-metadata.service. Feb 13 09:54:24.558826 curl[1564]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 09:54:24.558826 curl[1564]: Dload Upload Total Spent Left Speed Feb 13 09:54:24.543294 systemd[1]: Started packet-phone-home.service. Feb 13 09:54:24.546063 systemd-logind[1462]: New session 3 of user core. Feb 13 09:54:24.546565 systemd[1]: Started session-3.scope. Feb 13 09:54:24.549426 unknown[1425]: wrote ssh authorized keys file for user: core Feb 13 09:54:24.561955 update-ssh-keys[1567]: Updated "/home/core/.ssh/authorized_keys" Feb 13 09:54:24.562208 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 09:54:24.562380 systemd[1]: Reached target multi-user.target. Feb 13 09:54:24.563067 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 09:54:24.567179 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 09:54:24.567250 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 09:54:24.567400 systemd[1]: Startup finished in 2.030s (kernel) + 21.380s (initrd) + 14.778s (userspace) = 38.190s. Feb 13 09:54:24.592819 systemd[1]: Started sshd@1-139.178.70.11:22-139.178.68.195:57490.service. Feb 13 09:54:24.621726 sshd[1571]: Accepted publickey for core from 139.178.68.195 port 57490 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:24.622635 sshd[1571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:24.625364 systemd-logind[1462]: New session 4 of user core. Feb 13 09:54:24.625900 systemd[1]: Started session-4.scope. Feb 13 09:54:24.678391 sshd[1571]: pam_unix(sshd:session): session closed for user core Feb 13 09:54:24.680180 systemd[1]: sshd@1-139.178.70.11:22-139.178.68.195:57490.service: Deactivated successfully. Feb 13 09:54:24.680586 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 09:54:24.680951 systemd-logind[1462]: Session 4 logged out. Waiting for processes to exit. Feb 13 09:54:24.681555 systemd[1]: Started sshd@2-139.178.70.11:22-139.178.68.195:57504.service. Feb 13 09:54:24.682042 systemd-logind[1462]: Removed session 4. Feb 13 09:54:24.709814 sshd[1578]: Accepted publickey for core from 139.178.68.195 port 57504 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:24.711017 sshd[1578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:24.714565 systemd-logind[1462]: New session 5 of user core. Feb 13 09:54:24.715430 systemd[1]: Started session-5.scope. Feb 13 09:54:24.770274 sshd[1578]: pam_unix(sshd:session): session closed for user core Feb 13 09:54:24.771739 systemd[1]: sshd@2-139.178.70.11:22-139.178.68.195:57504.service: Deactivated successfully. Feb 13 09:54:24.772067 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 09:54:24.772458 systemd-logind[1462]: Session 5 logged out. Waiting for processes to exit. Feb 13 09:54:24.772926 systemd[1]: Started sshd@3-139.178.70.11:22-139.178.68.195:57512.service. Feb 13 09:54:24.773317 systemd-logind[1462]: Removed session 5. Feb 13 09:54:24.800402 sshd[1584]: Accepted publickey for core from 139.178.68.195 port 57512 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:24.801171 curl[1564]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 13 09:54:24.801349 sshd[1584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:24.801872 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 09:54:24.804590 systemd-logind[1462]: New session 6 of user core. Feb 13 09:54:24.805342 systemd[1]: Started session-6.scope. Feb 13 09:54:24.871560 sshd[1584]: pam_unix(sshd:session): session closed for user core Feb 13 09:54:24.878133 systemd[1]: sshd@3-139.178.70.11:22-139.178.68.195:57512.service: Deactivated successfully. Feb 13 09:54:24.878710 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 09:54:24.879145 systemd-logind[1462]: Session 6 logged out. Waiting for processes to exit. Feb 13 09:54:24.879584 systemd[1]: Started sshd@4-139.178.70.11:22-139.178.68.195:57528.service. Feb 13 09:54:24.880013 systemd-logind[1462]: Removed session 6. Feb 13 09:54:24.906986 sshd[1591]: Accepted publickey for core from 139.178.68.195 port 57528 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:24.907715 sshd[1591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:24.910331 systemd-logind[1462]: New session 7 of user core. Feb 13 09:54:24.910803 systemd[1]: Started session-7.scope. Feb 13 09:54:24.989874 sudo[1594]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 09:54:24.990416 sudo[1594]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 09:54:25.008284 dbus-daemon[1431]: \xd0\xed(\xa4\xf5U: received setenforce notice (enforcing=-359020368) Feb 13 09:54:25.013343 sudo[1594]: pam_unix(sudo:session): session closed for user root Feb 13 09:54:25.018281 sshd[1591]: pam_unix(sshd:session): session closed for user core Feb 13 09:54:25.025210 systemd[1]: sshd@4-139.178.70.11:22-139.178.68.195:57528.service: Deactivated successfully. Feb 13 09:54:25.026776 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 09:54:25.028545 systemd-logind[1462]: Session 7 logged out. Waiting for processes to exit. Feb 13 09:54:25.030951 systemd[1]: Started sshd@5-139.178.70.11:22-139.178.68.195:57534.service. Feb 13 09:54:25.033045 systemd-logind[1462]: Removed session 7. Feb 13 09:54:25.092224 sshd[1598]: Accepted publickey for core from 139.178.68.195 port 57534 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:25.095338 sshd[1598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:25.105118 systemd-logind[1462]: New session 8 of user core. Feb 13 09:54:25.107322 systemd[1]: Started session-8.scope. Feb 13 09:54:25.179306 sudo[1602]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 09:54:25.179413 sudo[1602]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 09:54:25.181265 sudo[1602]: pam_unix(sudo:session): session closed for user root Feb 13 09:54:25.183589 sudo[1601]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 09:54:25.183700 sudo[1601]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 09:54:25.189171 systemd[1]: Stopping audit-rules.service... Feb 13 09:54:25.188000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 09:54:25.189969 auditctl[1605]: No rules Feb 13 09:54:25.190143 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 09:54:25.190232 systemd[1]: Stopped audit-rules.service. Feb 13 09:54:25.191075 systemd[1]: Starting audit-rules.service... Feb 13 09:54:25.195297 kernel: kauditd_printk_skb: 96 callbacks suppressed Feb 13 09:54:25.195334 kernel: audit: type=1305 audit(1707818065.188:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 09:54:25.201682 augenrules[1622]: No rules Feb 13 09:54:25.202003 systemd[1]: Finished audit-rules.service. Feb 13 09:54:25.202474 sudo[1601]: pam_unix(sudo:session): session closed for user root Feb 13 09:54:25.203359 sshd[1598]: pam_unix(sshd:session): session closed for user core Feb 13 09:54:25.205320 systemd[1]: sshd@5-139.178.70.11:22-139.178.68.195:57534.service: Deactivated successfully. Feb 13 09:54:25.205771 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 09:54:25.206180 systemd-logind[1462]: Session 8 logged out. Waiting for processes to exit. Feb 13 09:54:25.206833 systemd[1]: Started sshd@6-139.178.70.11:22-139.178.68.195:57544.service. Feb 13 09:54:25.207381 systemd-logind[1462]: Removed session 8. Feb 13 09:54:25.188000 audit[1605]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff019f3e50 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:25.241862 kernel: audit: type=1300 audit(1707818065.188:166): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff019f3e50 a2=420 a3=0 items=0 ppid=1 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:25.241930 kernel: audit: type=1327 audit(1707818065.188:166): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 09:54:25.188000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 09:54:25.251382 kernel: audit: type=1131 audit(1707818065.189:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.272845 sshd[1628]: Accepted publickey for core from 139.178.68.195 port 57544 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 09:54:25.273919 kernel: audit: type=1130 audit(1707818065.201:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.274127 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 09:54:25.276578 systemd-logind[1462]: New session 9 of user core. Feb 13 09:54:25.277279 systemd[1]: Started session-9.scope. Feb 13 09:54:25.201000 audit[1601]: USER_END pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.296928 kernel: audit: type=1106 audit(1707818065.201:169): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.201000 audit[1601]: CRED_DISP pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.324327 sudo[1631]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 13 09:54:25.324436 sudo[1631]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 09:54:25.345928 kernel: audit: type=1104 audit(1707818065.201:170): pid=1601 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.345956 kernel: audit: type=1106 audit(1707818065.203:171): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.203000 audit[1598]: USER_END pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.378200 kernel: audit: type=1104 audit(1707818065.203:172): pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.203000 audit[1598]: CRED_DISP pid=1598 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.404138 kernel: audit: type=1131 audit(1707818065.204:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.11:22-139.178.68.195:57534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.11:22-139.178.68.195:57534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.11:22-139.178.68.195:57544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.271000 audit[1628]: USER_ACCT pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.273000 audit[1628]: CRED_ACQ pid=1628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.273000 audit[1628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8ee51430 a2=3 a3=0 items=0 ppid=1 pid=1628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:25.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 09:54:25.278000 audit[1628]: USER_START pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.278000 audit[1630]: CRED_ACQ pid=1630 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:25.323000 audit[1631]: USER_ACCT pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.323000 audit[1631]: CRED_REFR pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:25.324000 audit[1631]: USER_START pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:29.374560 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 09:54:29.378867 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 09:54:29.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:29.379148 systemd[1]: Reached target network-online.target. Feb 13 09:54:29.379948 systemd[1]: Starting docker.service... Feb 13 09:54:29.399139 env[1653]: time="2024-02-13T09:54:29.399082720Z" level=info msg="Starting up" Feb 13 09:54:29.399825 env[1653]: time="2024-02-13T09:54:29.399766078Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 09:54:29.399825 env[1653]: time="2024-02-13T09:54:29.399774561Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 09:54:29.399825 env[1653]: time="2024-02-13T09:54:29.399790257Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 09:54:29.399825 env[1653]: time="2024-02-13T09:54:29.399819634Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 09:54:29.401091 env[1653]: time="2024-02-13T09:54:29.401045524Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 13 09:54:29.401091 env[1653]: time="2024-02-13T09:54:29.401054124Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 13 09:54:29.401091 env[1653]: time="2024-02-13T09:54:29.401061823Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 13 09:54:29.401091 env[1653]: time="2024-02-13T09:54:29.401066733Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 13 09:54:29.412743 env[1653]: time="2024-02-13T09:54:29.412698849Z" level=info msg="Loading containers: start." Feb 13 09:54:29.446000 audit[1700]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.446000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc4f03ffe0 a2=0 a3=7ffc4f03ffcc items=0 ppid=1653 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.446000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 13 09:54:29.448000 audit[1702]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.448000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe218b72d0 a2=0 a3=7ffe218b72bc items=0 ppid=1653 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 13 09:54:29.449000 audit[1704]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.449000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe88491980 a2=0 a3=7ffe8849196c items=0 ppid=1653 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.449000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 09:54:29.450000 audit[1706]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.450000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcff67f120 a2=0 a3=7ffcff67f10c items=0 ppid=1653 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 09:54:29.452000 audit[1708]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.452000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc37e79a00 a2=0 a3=7ffc37e799ec items=0 ppid=1653 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.452000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 13 09:54:29.482000 audit[1713]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.482000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff858fde00 a2=0 a3=7fff858fddec items=0 ppid=1653 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.482000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 13 09:54:29.489000 audit[1715]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.489000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe08465940 a2=0 a3=7ffe0846592c items=0 ppid=1653 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 13 09:54:29.493000 audit[1717]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.493000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff5a860b90 a2=0 a3=7fff5a860b7c items=0 ppid=1653 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.493000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 13 09:54:29.498000 audit[1719]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.498000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeb55f62e0 a2=0 a3=7ffeb55f62cc items=0 ppid=1653 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 09:54:29.511000 audit[1723]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.511000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe265d8e30 a2=0 a3=7ffe265d8e1c items=0 ppid=1653 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.511000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 09:54:29.513000 audit[1724]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.513000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffce81c2cc0 a2=0 a3=7ffce81c2cac items=0 ppid=1653 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.513000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 09:54:29.537915 kernel: Initializing XFRM netlink socket Feb 13 09:54:29.598486 env[1653]: time="2024-02-13T09:54:29.598464673Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 13 09:54:29.611000 audit[1732]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.611000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffaf9f05b0 a2=0 a3=7fffaf9f059c items=0 ppid=1653 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.611000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 13 09:54:29.635000 audit[1735]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.635000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc66f5ca80 a2=0 a3=7ffc66f5ca6c items=0 ppid=1653 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.635000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 13 09:54:29.637000 audit[1738]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.637000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca37a7760 a2=0 a3=7ffca37a774c items=0 ppid=1653 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.637000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 13 09:54:29.639000 audit[1740]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.639000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef1a0b440 a2=0 a3=7ffef1a0b42c items=0 ppid=1653 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 13 09:54:29.640000 audit[1742]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.640000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffbadb8f40 a2=0 a3=7fffbadb8f2c items=0 ppid=1653 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 13 09:54:29.642000 audit[1744]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.642000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffc6c28030 a2=0 a3=7fffc6c2801c items=0 ppid=1653 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.642000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 13 09:54:29.643000 audit[1746]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.643000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc424907e0 a2=0 a3=7ffc424907cc items=0 ppid=1653 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 13 09:54:29.652000 audit[1749]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.652000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd45ad4bf0 a2=0 a3=7ffd45ad4bdc items=0 ppid=1653 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 13 09:54:29.654000 audit[1751]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.654000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe8e21ddc0 a2=0 a3=7ffe8e21ddac items=0 ppid=1653 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 13 09:54:29.656000 audit[1753]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.656000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd716784d0 a2=0 a3=7ffd716784bc items=0 ppid=1653 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.656000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 13 09:54:29.657000 audit[1755]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.657000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec70d4e00 a2=0 a3=7ffec70d4dec items=0 ppid=1653 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 13 09:54:29.659045 systemd-networkd[1326]: docker0: Link UP Feb 13 09:54:29.663000 audit[1759]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.663000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc92b67f20 a2=0 a3=7ffc92b67f0c items=0 ppid=1653 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.663000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 13 09:54:29.664000 audit[1760]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:29.664000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe28c43810 a2=0 a3=7ffe28c437fc items=0 ppid=1653 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:29.664000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 13 09:54:29.665926 env[1653]: time="2024-02-13T09:54:29.665875201Z" level=info msg="Loading containers: done." Feb 13 09:54:29.675089 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2200157111-merged.mount: Deactivated successfully. Feb 13 09:54:29.675281 env[1653]: time="2024-02-13T09:54:29.675123334Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 13 09:54:29.675339 env[1653]: time="2024-02-13T09:54:29.675292480Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 13 09:54:29.675430 env[1653]: time="2024-02-13T09:54:29.675381527Z" level=info msg="Daemon has completed initialization" Feb 13 09:54:29.690236 systemd[1]: Started docker.service. Feb 13 09:54:29.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:29.704282 env[1653]: time="2024-02-13T09:54:29.704145362Z" level=info msg="API listen on /run/docker.sock" Feb 13 09:54:29.747552 systemd[1]: Reloading. Feb 13 09:54:29.803585 /usr/lib/systemd/system-generators/torcx-generator[1810]: time="2024-02-13T09:54:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 09:54:29.803601 /usr/lib/systemd/system-generators/torcx-generator[1810]: time="2024-02-13T09:54:29Z" level=info msg="torcx already run" Feb 13 09:54:29.857093 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 09:54:29.857101 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 09:54:29.870624 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.913000 audit: BPF prog-id=34 op=LOAD Feb 13 09:54:29.913000 audit: BPF prog-id=27 op=UNLOAD Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit: BPF prog-id=35 op=LOAD Feb 13 09:54:29.914000 audit: BPF prog-id=29 op=UNLOAD Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit: BPF prog-id=36 op=LOAD Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.914000 audit: BPF prog-id=37 op=LOAD Feb 13 09:54:29.914000 audit: BPF prog-id=30 op=UNLOAD Feb 13 09:54:29.914000 audit: BPF prog-id=31 op=UNLOAD Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit: BPF prog-id=38 op=LOAD Feb 13 09:54:29.915000 audit: BPF prog-id=24 op=UNLOAD Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit: BPF prog-id=39 op=LOAD Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.915000 audit: BPF prog-id=40 op=LOAD Feb 13 09:54:29.916000 audit: BPF prog-id=25 op=UNLOAD Feb 13 09:54:29.916000 audit: BPF prog-id=26 op=UNLOAD Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.916000 audit: BPF prog-id=41 op=LOAD Feb 13 09:54:29.916000 audit: BPF prog-id=32 op=UNLOAD Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit: BPF prog-id=42 op=LOAD Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit: BPF prog-id=43 op=LOAD Feb 13 09:54:29.917000 audit: BPF prog-id=21 op=UNLOAD Feb 13 09:54:29.917000 audit: BPF prog-id=22 op=UNLOAD Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit: BPF prog-id=44 op=LOAD Feb 13 09:54:29.918000 audit: BPF prog-id=28 op=UNLOAD Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.918000 audit: BPF prog-id=45 op=LOAD Feb 13 09:54:29.918000 audit: BPF prog-id=23 op=UNLOAD Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit: BPF prog-id=46 op=LOAD Feb 13 09:54:29.919000 audit: BPF prog-id=18 op=UNLOAD Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit: BPF prog-id=47 op=LOAD Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:29.919000 audit: BPF prog-id=48 op=LOAD Feb 13 09:54:29.919000 audit: BPF prog-id=19 op=UNLOAD Feb 13 09:54:29.919000 audit: BPF prog-id=20 op=UNLOAD Feb 13 09:54:29.924304 systemd[1]: Started kubelet.service. Feb 13 09:54:29.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:29.948248 kubelet[1869]: E0213 09:54:29.948178 1869 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 13 09:54:29.949463 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 09:54:29.949530 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 09:54:29.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 09:54:30.489589 env[1474]: time="2024-02-13T09:54:30.489465262Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 13 09:54:31.063569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1713634116.mount: Deactivated successfully. Feb 13 09:54:32.293604 env[1474]: time="2024-02-13T09:54:32.293520898Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:32.294746 env[1474]: time="2024-02-13T09:54:32.294729270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:32.295697 env[1474]: time="2024-02-13T09:54:32.295683199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:32.296766 env[1474]: time="2024-02-13T09:54:32.296752947Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:32.297224 env[1474]: time="2024-02-13T09:54:32.297207388Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:70e88c5e3a8e409ff4604a5fdb1dacb736ea02ba0b7a3da635f294e953906f47\"" Feb 13 09:54:32.307597 env[1474]: time="2024-02-13T09:54:32.307561578Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 13 09:54:33.898285 env[1474]: time="2024-02-13T09:54:33.898253930Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:33.898905 env[1474]: time="2024-02-13T09:54:33.898892266Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:33.900250 env[1474]: time="2024-02-13T09:54:33.900237251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:33.901129 env[1474]: time="2024-02-13T09:54:33.901089228Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:33.901527 env[1474]: time="2024-02-13T09:54:33.901491233Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:18dbd2df3bb54036300d2af8b20ef60d479173946ff089a4d16e258b27faa55c\"" Feb 13 09:54:33.907517 env[1474]: time="2024-02-13T09:54:33.907456608Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 13 09:54:34.962756 env[1474]: time="2024-02-13T09:54:34.962695728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:34.963390 env[1474]: time="2024-02-13T09:54:34.963340568Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:34.964613 env[1474]: time="2024-02-13T09:54:34.964578879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:34.965568 env[1474]: time="2024-02-13T09:54:34.965523035Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:34.966430 env[1474]: time="2024-02-13T09:54:34.966385543Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:7597ecaaf12074e2980eee086736dbd01e566dc266351560001aa47dbbb0e5fe\"" Feb 13 09:54:34.972698 env[1474]: time="2024-02-13T09:54:34.972681330Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 13 09:54:35.869209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2949137427.mount: Deactivated successfully. Feb 13 09:54:36.232559 env[1474]: time="2024-02-13T09:54:36.232459810Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.233303 env[1474]: time="2024-02-13T09:54:36.233261323Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.234317 env[1474]: time="2024-02-13T09:54:36.234278366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.234773 env[1474]: time="2024-02-13T09:54:36.234733489Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.235335 env[1474]: time="2024-02-13T09:54:36.235292117Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 13 09:54:36.241711 env[1474]: time="2024-02-13T09:54:36.241691350Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 13 09:54:36.752683 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount936764587.mount: Deactivated successfully. Feb 13 09:54:36.754061 env[1474]: time="2024-02-13T09:54:36.754043619Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.754737 env[1474]: time="2024-02-13T09:54:36.754701350Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.755430 env[1474]: time="2024-02-13T09:54:36.755396889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.756116 env[1474]: time="2024-02-13T09:54:36.756084030Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:36.756461 env[1474]: time="2024-02-13T09:54:36.756413992Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 13 09:54:36.761684 env[1474]: time="2024-02-13T09:54:36.761668017Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 13 09:54:37.257791 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1708450397.mount: Deactivated successfully. Feb 13 09:54:40.060941 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 13 09:54:40.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:40.061062 systemd[1]: Stopped kubelet.service. Feb 13 09:54:40.062063 systemd[1]: Started kubelet.service. Feb 13 09:54:40.066669 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 13 09:54:40.066696 kernel: audit: type=1130 audit(1707818080.060:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:40.086854 kubelet[1956]: E0213 09:54:40.086785 1956 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 13 09:54:40.088987 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 09:54:40.089054 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 09:54:40.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:40.160568 kernel: audit: type=1131 audit(1707818080.060:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:40.160595 kernel: audit: type=1130 audit(1707818080.061:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:40.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:40.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 09:54:40.272546 kernel: audit: type=1131 audit(1707818080.088:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 09:54:40.338900 env[1474]: time="2024-02-13T09:54:40.338842176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:40.339575 env[1474]: time="2024-02-13T09:54:40.339561443Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:40.340504 env[1474]: time="2024-02-13T09:54:40.340483714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:40.341705 env[1474]: time="2024-02-13T09:54:40.341693129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:40.342080 env[1474]: time="2024-02-13T09:54:40.342049783Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Feb 13 09:54:40.346926 env[1474]: time="2024-02-13T09:54:40.346911912Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 13 09:54:40.883818 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1153940922.mount: Deactivated successfully. Feb 13 09:54:41.360006 env[1474]: time="2024-02-13T09:54:41.359936317Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:41.360602 env[1474]: time="2024-02-13T09:54:41.360562601Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:41.361667 env[1474]: time="2024-02-13T09:54:41.361642440Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:41.362835 env[1474]: time="2024-02-13T09:54:41.362821907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:41.363279 env[1474]: time="2024-02-13T09:54:41.363266064Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 13 09:54:43.068623 systemd[1]: Stopped kubelet.service. Feb 13 09:54:43.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:43.076518 systemd[1]: Reloading. Feb 13 09:54:43.107279 /usr/lib/systemd/system-generators/torcx-generator[2115]: time="2024-02-13T09:54:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 09:54:43.107304 /usr/lib/systemd/system-generators/torcx-generator[2115]: time="2024-02-13T09:54:43Z" level=info msg="torcx already run" Feb 13 09:54:43.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:43.127848 kernel: audit: type=1130 audit(1707818083.067:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:43.127909 kernel: audit: type=1131 audit(1707818083.067:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:43.209040 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 09:54:43.209048 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 09:54:43.221121 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.387221 kernel: audit: type=1400 audit(1707818083.263:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.387319 kernel: audit: type=1400 audit(1707818083.263:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.387334 kernel: audit: type=1400 audit(1707818083.263:391): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.450264 kernel: audit: type=1400 audit(1707818083.263:392): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit: BPF prog-id=49 op=LOAD Feb 13 09:54:43.386000 audit: BPF prog-id=34 op=UNLOAD Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit: BPF prog-id=50 op=LOAD Feb 13 09:54:43.513000 audit: BPF prog-id=35 op=UNLOAD Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit: BPF prog-id=51 op=LOAD Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.513000 audit: BPF prog-id=52 op=LOAD Feb 13 09:54:43.513000 audit: BPF prog-id=36 op=UNLOAD Feb 13 09:54:43.513000 audit: BPF prog-id=37 op=UNLOAD Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit: BPF prog-id=53 op=LOAD Feb 13 09:54:43.514000 audit: BPF prog-id=38 op=UNLOAD Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit: BPF prog-id=54 op=LOAD Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.514000 audit: BPF prog-id=55 op=LOAD Feb 13 09:54:43.514000 audit: BPF prog-id=39 op=UNLOAD Feb 13 09:54:43.514000 audit: BPF prog-id=40 op=UNLOAD Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit: BPF prog-id=56 op=LOAD Feb 13 09:54:43.515000 audit: BPF prog-id=41 op=UNLOAD Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit: BPF prog-id=57 op=LOAD Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.515000 audit: BPF prog-id=58 op=LOAD Feb 13 09:54:43.515000 audit: BPF prog-id=42 op=UNLOAD Feb 13 09:54:43.515000 audit: BPF prog-id=43 op=UNLOAD Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.516000 audit: BPF prog-id=59 op=LOAD Feb 13 09:54:43.516000 audit: BPF prog-id=44 op=UNLOAD Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit: BPF prog-id=60 op=LOAD Feb 13 09:54:43.517000 audit: BPF prog-id=45 op=UNLOAD Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.517000 audit: BPF prog-id=61 op=LOAD Feb 13 09:54:43.517000 audit: BPF prog-id=46 op=UNLOAD Feb 13 09:54:43.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit: BPF prog-id=62 op=LOAD Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:43.518000 audit: BPF prog-id=63 op=LOAD Feb 13 09:54:43.518000 audit: BPF prog-id=47 op=UNLOAD Feb 13 09:54:43.518000 audit: BPF prog-id=48 op=UNLOAD Feb 13 09:54:43.525383 systemd[1]: Started kubelet.service. Feb 13 09:54:43.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:43.547871 kubelet[2175]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 09:54:43.547871 kubelet[2175]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 13 09:54:43.547871 kubelet[2175]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 09:54:43.548092 kubelet[2175]: I0213 09:54:43.547895 2175 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 09:54:44.044002 kubelet[2175]: I0213 09:54:44.043965 2175 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 13 09:54:44.044002 kubelet[2175]: I0213 09:54:44.043995 2175 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 09:54:44.044155 kubelet[2175]: I0213 09:54:44.044128 2175 server.go:895] "Client rotation is on, will bootstrap in background" Feb 13 09:54:44.046727 kubelet[2175]: I0213 09:54:44.046717 2175 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 09:54:44.047446 kubelet[2175]: E0213 09:54:44.047436 2175 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.11:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.066722 kubelet[2175]: I0213 09:54:44.066712 2175 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 09:54:44.066831 kubelet[2175]: I0213 09:54:44.066823 2175 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 09:54:44.066978 kubelet[2175]: I0213 09:54:44.066969 2175 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 13 09:54:44.067066 kubelet[2175]: I0213 09:54:44.066984 2175 topology_manager.go:138] "Creating topology manager with none policy" Feb 13 09:54:44.067066 kubelet[2175]: I0213 09:54:44.066992 2175 container_manager_linux.go:301] "Creating device plugin manager" Feb 13 09:54:44.067066 kubelet[2175]: I0213 09:54:44.067051 2175 state_mem.go:36] "Initialized new in-memory state store" Feb 13 09:54:44.067189 kubelet[2175]: I0213 09:54:44.067130 2175 kubelet.go:393] "Attempting to sync node with API server" Feb 13 09:54:44.067189 kubelet[2175]: I0213 09:54:44.067141 2175 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 09:54:44.067189 kubelet[2175]: I0213 09:54:44.067159 2175 kubelet.go:309] "Adding apiserver pod source" Feb 13 09:54:44.067189 kubelet[2175]: I0213 09:54:44.067188 2175 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 09:54:44.067416 kubelet[2175]: W0213 09:54:44.067363 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0e431cd218&limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.067489 kubelet[2175]: E0213 09:54:44.067423 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0e431cd218&limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.067518 kubelet[2175]: I0213 09:54:44.067514 2175 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 09:54:44.067556 kubelet[2175]: W0213 09:54:44.067526 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.11:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.067580 kubelet[2175]: E0213 09:54:44.067562 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.11:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.067645 kubelet[2175]: W0213 09:54:44.067640 2175 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 13 09:54:44.068013 kubelet[2175]: I0213 09:54:44.067976 2175 server.go:1232] "Started kubelet" Feb 13 09:54:44.068065 kubelet[2175]: I0213 09:54:44.068042 2175 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 09:54:44.068065 kubelet[2175]: I0213 09:54:44.068050 2175 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 13 09:54:44.068253 kubelet[2175]: E0213 09:54:44.068243 2175 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 09:54:44.068253 kubelet[2175]: I0213 09:54:44.068252 2175 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 13 09:54:44.068305 kubelet[2175]: E0213 09:54:44.068258 2175 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 09:54:44.068305 kubelet[2175]: E0213 09:54:44.068236 2175 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-0e431cd218.17b3637fc1dbf0b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-0e431cd218", UID:"ci-3510.3.2-a-0e431cd218", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-0e431cd218"}, FirstTimestamp:time.Date(2024, time.February, 13, 9, 54, 44, 67963057, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 9, 54, 44, 67963057, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-0e431cd218"}': 'Post "https://139.178.70.11:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.11:6443: connect: connection refused'(may retry after sleeping) Feb 13 09:54:44.068000 audit[2175]: AVC avc: denied { mac_admin } for pid=2175 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:44.068000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 09:54:44.068000 audit[2175]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006e0750 a1=c0006dc588 a2=c0006e0720 a3=25 items=0 ppid=1 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.068000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 09:54:44.068000 audit[2175]: AVC avc: denied { mac_admin } for pid=2175 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:44.068000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 09:54:44.068000 audit[2175]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ccc000 a1=c000cce000 a2=c000cca000 a3=25 items=0 ppid=1 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.068000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 09:54:44.069451 kubelet[2175]: I0213 09:54:44.069118 2175 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 09:54:44.069451 kubelet[2175]: I0213 09:54:44.069141 2175 server.go:462] "Adding debug handlers to kubelet server" Feb 13 09:54:44.069451 kubelet[2175]: I0213 09:54:44.069163 2175 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 09:54:44.069451 kubelet[2175]: I0213 09:54:44.069255 2175 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 09:54:44.069451 kubelet[2175]: I0213 09:54:44.069284 2175 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 13 09:54:44.069451 kubelet[2175]: E0213 09:54:44.069343 2175 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510.3.2-a-0e431cd218\" not found" Feb 13 09:54:44.069451 kubelet[2175]: I0213 09:54:44.069337 2175 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 13 09:54:44.069754 kubelet[2175]: I0213 09:54:44.069729 2175 reconciler_new.go:29] "Reconciler: start to sync state" Feb 13 09:54:44.069928 kubelet[2175]: W0213 09:54:44.069905 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.069967 kubelet[2175]: E0213 09:54:44.069939 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.070090 kubelet[2175]: E0213 09:54:44.070080 2175 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0e431cd218?timeout=10s\": dial tcp 139.178.70.11:6443: connect: connection refused" interval="200ms" Feb 13 09:54:44.069000 audit[2199]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.069000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec41e5320 a2=0 a3=7ffec41e530c items=0 ppid=2175 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 09:54:44.070000 audit[2200]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.070000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff57d31750 a2=0 a3=7fff57d3173c items=0 ppid=2175 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 09:54:44.071000 audit[2202]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.071000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc611a6760 a2=0 a3=7ffc611a674c items=0 ppid=2175 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 09:54:44.072000 audit[2204]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.072000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd23cb5160 a2=0 a3=7ffd23cb514c items=0 ppid=2175 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 09:54:44.075000 audit[2207]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.075000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffff3563230 a2=0 a3=7ffff356321c items=0 ppid=2175 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 13 09:54:44.076325 kubelet[2175]: I0213 09:54:44.076316 2175 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 13 09:54:44.075000 audit[2208]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:54:44.075000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff29594c0 a2=0 a3=7ffff29594ac items=0 ppid=2175 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 09:54:44.075000 audit[2209]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.075000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee7a40d20 a2=0 a3=7ffee7a40d0c items=0 ppid=2175 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 09:54:44.076927 kubelet[2175]: I0213 09:54:44.076761 2175 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 13 09:54:44.076927 kubelet[2175]: I0213 09:54:44.076776 2175 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 13 09:54:44.076927 kubelet[2175]: I0213 09:54:44.076786 2175 kubelet.go:2303] "Starting kubelet main sync loop" Feb 13 09:54:44.076927 kubelet[2175]: E0213 09:54:44.076816 2175 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 13 09:54:44.077162 kubelet[2175]: W0213 09:54:44.077143 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.077199 kubelet[2175]: E0213 09:54:44.077168 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:44.076000 audit[2210]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:54:44.076000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8e616770 a2=0 a3=7ffc8e61675c items=0 ppid=2175 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 09:54:44.076000 audit[2211]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.076000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea6f03db0 a2=0 a3=7ffea6f03d9c items=0 ppid=2175 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 09:54:44.076000 audit[2213]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:54:44.076000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe45c6d1d0 a2=0 a3=7ffe45c6d1bc items=0 ppid=2175 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 09:54:44.077000 audit[2214]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:54:44.077000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefea2aef0 a2=0 a3=7ffefea2aedc items=0 ppid=2175 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 09:54:44.077000 audit[2215]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:54:44.077000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcbf628d30 a2=0 a3=7ffcbf628d1c items=0 ppid=2175 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 09:54:44.160993 kubelet[2175]: I0213 09:54:44.160936 2175 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 09:54:44.160993 kubelet[2175]: I0213 09:54:44.160980 2175 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 09:54:44.161332 kubelet[2175]: I0213 09:54:44.161022 2175 state_mem.go:36] "Initialized new in-memory state store" Feb 13 09:54:44.163008 kubelet[2175]: I0213 09:54:44.162965 2175 policy_none.go:49] "None policy: Start" Feb 13 09:54:44.164031 kubelet[2175]: I0213 09:54:44.163992 2175 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 09:54:44.164031 kubelet[2175]: I0213 09:54:44.164041 2175 state_mem.go:35] "Initializing new in-memory state store" Feb 13 09:54:44.172820 kubelet[2175]: I0213 09:54:44.172742 2175 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.173436 kubelet[2175]: E0213 09:54:44.173366 2175 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.11:6443/api/v1/nodes\": dial tcp 139.178.70.11:6443: connect: connection refused" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.175074 systemd[1]: Created slice kubepods.slice. Feb 13 09:54:44.177025 kubelet[2175]: E0213 09:54:44.176947 2175 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 13 09:54:44.184711 systemd[1]: Created slice kubepods-burstable.slice. Feb 13 09:54:44.191097 systemd[1]: Created slice kubepods-besteffort.slice. Feb 13 09:54:44.209300 kubelet[2175]: I0213 09:54:44.209219 2175 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 09:54:44.208000 audit[2175]: AVC avc: denied { mac_admin } for pid=2175 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:44.208000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 09:54:44.208000 audit[2175]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006e0ae0 a1=c000433800 a2=c0006e0ab0 a3=25 items=0 ppid=1 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:44.208000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 09:54:44.209879 kubelet[2175]: I0213 09:54:44.209329 2175 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 09:54:44.209879 kubelet[2175]: I0213 09:54:44.209677 2175 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 09:54:44.210440 kubelet[2175]: E0213 09:54:44.210393 2175 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-0e431cd218\" not found" Feb 13 09:54:44.271175 kubelet[2175]: E0213 09:54:44.271081 2175 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0e431cd218?timeout=10s\": dial tcp 139.178.70.11:6443: connect: connection refused" interval="400ms" Feb 13 09:54:44.375109 kubelet[2175]: I0213 09:54:44.375084 2175 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.375387 kubelet[2175]: E0213 09:54:44.375348 2175 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.11:6443/api/v1/nodes\": dial tcp 139.178.70.11:6443: connect: connection refused" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.377556 kubelet[2175]: I0213 09:54:44.377513 2175 topology_manager.go:215] "Topology Admit Handler" podUID="251924a846dab0b6d7a128ca9e53c198" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.378752 kubelet[2175]: I0213 09:54:44.378735 2175 topology_manager.go:215] "Topology Admit Handler" podUID="060a66f1b471719eeb4a07e091896aa5" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.380216 kubelet[2175]: I0213 09:54:44.380167 2175 topology_manager.go:215] "Topology Admit Handler" podUID="3882cd5be351ce12e24c3c2e3631b445" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.385492 systemd[1]: Created slice kubepods-burstable-pod251924a846dab0b6d7a128ca9e53c198.slice. Feb 13 09:54:44.417051 systemd[1]: Created slice kubepods-burstable-pod060a66f1b471719eeb4a07e091896aa5.slice. Feb 13 09:54:44.423744 systemd[1]: Created slice kubepods-burstable-pod3882cd5be351ce12e24c3c2e3631b445.slice. Feb 13 09:54:44.472316 kubelet[2175]: I0213 09:54:44.472213 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/251924a846dab0b6d7a128ca9e53c198-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" (UID: \"251924a846dab0b6d7a128ca9e53c198\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.472316 kubelet[2175]: I0213 09:54:44.472316 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/251924a846dab0b6d7a128ca9e53c198-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" (UID: \"251924a846dab0b6d7a128ca9e53c198\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.472613 kubelet[2175]: I0213 09:54:44.472374 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.472613 kubelet[2175]: I0213 09:54:44.472434 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3882cd5be351ce12e24c3c2e3631b445-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-0e431cd218\" (UID: \"3882cd5be351ce12e24c3c2e3631b445\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.472613 kubelet[2175]: I0213 09:54:44.472488 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.472613 kubelet[2175]: I0213 09:54:44.472551 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/251924a846dab0b6d7a128ca9e53c198-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" (UID: \"251924a846dab0b6d7a128ca9e53c198\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.472613 kubelet[2175]: I0213 09:54:44.472606 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.473033 kubelet[2175]: I0213 09:54:44.472655 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.473033 kubelet[2175]: I0213 09:54:44.472789 2175 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.672220 kubelet[2175]: E0213 09:54:44.672015 2175 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0e431cd218?timeout=10s\": dial tcp 139.178.70.11:6443: connect: connection refused" interval="800ms" Feb 13 09:54:44.712391 env[1474]: time="2024-02-13T09:54:44.712260094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-0e431cd218,Uid:251924a846dab0b6d7a128ca9e53c198,Namespace:kube-system,Attempt:0,}" Feb 13 09:54:44.722443 env[1474]: time="2024-02-13T09:54:44.722315678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-0e431cd218,Uid:060a66f1b471719eeb4a07e091896aa5,Namespace:kube-system,Attempt:0,}" Feb 13 09:54:44.728647 env[1474]: time="2024-02-13T09:54:44.728558743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-0e431cd218,Uid:3882cd5be351ce12e24c3c2e3631b445,Namespace:kube-system,Attempt:0,}" Feb 13 09:54:44.779481 kubelet[2175]: I0213 09:54:44.779388 2175 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:44.780145 kubelet[2175]: E0213 09:54:44.780067 2175 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.11:6443/api/v1/nodes\": dial tcp 139.178.70.11:6443: connect: connection refused" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:45.048710 kubelet[2175]: W0213 09:54:45.048451 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://139.178.70.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.048710 kubelet[2175]: E0213 09:54:45.048588 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.11:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.052248 kubelet[2175]: W0213 09:54:45.052119 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://139.178.70.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0e431cd218&limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.052248 kubelet[2175]: E0213 09:54:45.052231 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.11:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-0e431cd218&limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.086006 kubelet[2175]: W0213 09:54:45.085841 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://139.178.70.11:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.086006 kubelet[2175]: E0213 09:54:45.085988 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.11:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.086635 kubelet[2175]: W0213 09:54:45.086497 2175 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://139.178.70.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.086635 kubelet[2175]: E0213 09:54:45.086608 2175 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.11:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.11:6443: connect: connection refused Feb 13 09:54:45.254168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1973902732.mount: Deactivated successfully. Feb 13 09:54:45.255536 env[1474]: time="2024-02-13T09:54:45.255491918Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.256347 env[1474]: time="2024-02-13T09:54:45.256311917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.256963 env[1474]: time="2024-02-13T09:54:45.256917337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.257948 env[1474]: time="2024-02-13T09:54:45.257877017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.258389 env[1474]: time="2024-02-13T09:54:45.258350220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.259213 env[1474]: time="2024-02-13T09:54:45.259165319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.260475 env[1474]: time="2024-02-13T09:54:45.260436800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.260830 env[1474]: time="2024-02-13T09:54:45.260792324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.263567 env[1474]: time="2024-02-13T09:54:45.263530484Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.264371 env[1474]: time="2024-02-13T09:54:45.264336110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.264980 env[1474]: time="2024-02-13T09:54:45.264948239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.265788 env[1474]: time="2024-02-13T09:54:45.265777932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:54:45.271317 env[1474]: time="2024-02-13T09:54:45.271281284Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:54:45.271317 env[1474]: time="2024-02-13T09:54:45.271304424Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:54:45.271317 env[1474]: time="2024-02-13T09:54:45.271311500Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:54:45.271412 env[1474]: time="2024-02-13T09:54:45.271376345Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea7473f0486eabfeb36a836a1121f682fc58dd83f4d4eb59671169cc70e6c3e5 pid=2225 runtime=io.containerd.runc.v2 Feb 13 09:54:45.272737 env[1474]: time="2024-02-13T09:54:45.272704967Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:54:45.272737 env[1474]: time="2024-02-13T09:54:45.272723873Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:54:45.272737 env[1474]: time="2024-02-13T09:54:45.272730684Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:54:45.272842 env[1474]: time="2024-02-13T09:54:45.272792462Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c978ce21906571f2acf35231d878c24bc21fc56e306d8d714f9af18d629154cb pid=2240 runtime=io.containerd.runc.v2 Feb 13 09:54:45.274250 env[1474]: time="2024-02-13T09:54:45.274199682Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:54:45.274250 env[1474]: time="2024-02-13T09:54:45.274219043Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:54:45.274250 env[1474]: time="2024-02-13T09:54:45.274225853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:54:45.274378 env[1474]: time="2024-02-13T09:54:45.274322848Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ca419a8c257cc69a9a6802476c2250bba1bd0bebc860f3bf0aa2e8e313876bad pid=2258 runtime=io.containerd.runc.v2 Feb 13 09:54:45.277891 systemd[1]: Started cri-containerd-ea7473f0486eabfeb36a836a1121f682fc58dd83f4d4eb59671169cc70e6c3e5.scope. Feb 13 09:54:45.280043 systemd[1]: Started cri-containerd-c978ce21906571f2acf35231d878c24bc21fc56e306d8d714f9af18d629154cb.scope. Feb 13 09:54:45.280797 systemd[1]: Started cri-containerd-ca419a8c257cc69a9a6802476c2250bba1bd0bebc860f3bf0aa2e8e313876bad.scope. Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.312128 kernel: kauditd_printk_skb: 217 callbacks suppressed Feb 13 09:54:45.312161 kernel: audit: type=1400 audit(1707818085.284:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375846 kubelet[2175]: E0213 09:54:45.375734 2175 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-0e431cd218.17b3637fc1dbf0b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-0e431cd218", UID:"ci-3510.3.2-a-0e431cd218", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-0e431cd218"}, FirstTimestamp:time.Date(2024, time.February, 13, 9, 54, 44, 67963057, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 9, 54, 44, 67963057, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-0e431cd218"}': 'Post "https://139.178.70.11:6443/api/v1/namespaces/default/events": dial tcp 139.178.70.11:6443: connect: connection refused'(may retry after sleeping) Feb 13 09:54:45.437703 kernel: audit: type=1400 audit(1707818085.284:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.437735 kernel: audit: type=1400 audit(1707818085.284:579): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.473341 kubelet[2175]: E0213 09:54:45.473301 2175 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.11:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-0e431cd218?timeout=10s\": dial tcp 139.178.70.11:6443: connect: connection refused" interval="1.6s" Feb 13 09:54:45.500801 kernel: audit: type=1400 audit(1707818085.284:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.564336 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 13 09:54:45.564367 kernel: audit: type=1400 audit(1707818085.284:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.581614 kubelet[2175]: I0213 09:54:45.581581 2175 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:45.581741 kubelet[2175]: E0213 09:54:45.581709 2175 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://139.178.70.11:6443/api/v1/nodes\": dial tcp 139.178.70.11:6443: connect: connection refused" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:45.591201 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 13 09:54:45.591231 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 13 09:54:45.591246 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 13 09:54:45.591258 kernel: audit: backlog limit exceeded Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit: BPF prog-id=64 op=LOAD Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2225 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373437336630343836656162666562333661383336613131323166 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2225 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373437336630343836656162666562333661383336613131323166 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.374000 audit: BPF prog-id=65 op=LOAD Feb 13 09:54:45.374000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002fe470 items=0 ppid=2225 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373437336630343836656162666562333661383336613131323166 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit: BPF prog-id=66 op=LOAD Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2240 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339373863653231393036353731663261636633353233316438373863 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2240 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339373863653231393036353731663261636633353233316438373863 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.500000 audit: BPF prog-id=68 op=LOAD Feb 13 09:54:45.500000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f1d80 items=0 ppid=2240 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339373863653231393036353731663261636633353233316438373863 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.499000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002fe4b8 items=0 ppid=2225 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373437336630343836656162666562333661383336613131323166 Feb 13 09:54:45.653000 audit: BPF prog-id=67 op=UNLOAD Feb 13 09:54:45.653000 audit: BPF prog-id=65 op=UNLOAD Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { perfmon } for pid=2251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit: BPF prog-id=69 op=LOAD Feb 13 09:54:45.653000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f1dc8 items=0 ppid=2240 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339373863653231393036353731663261636633353233316438373863 Feb 13 09:54:45.707000 audit: BPF prog-id=69 op=UNLOAD Feb 13 09:54:45.707000 audit: BPF prog-id=68 op=UNLOAD Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { perfmon } for pid=2270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit[2251]: AVC avc: denied { bpf } for pid=2251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.653000 audit: BPF prog-id=70 op=LOAD Feb 13 09:54:45.653000 audit[2251]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002fe8c8 items=0 ppid=2225 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.653000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561373437336630343836656162666562333661383336613131323166 Feb 13 09:54:45.707000 audit[2270]: AVC avc: denied { bpf } for pid=2270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit: BPF prog-id=71 op=LOAD Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.707000 audit[2270]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e61d8 items=0 ppid=2240 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339373863653231393036353731663261636633353233316438373863 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit: BPF prog-id=72 op=LOAD Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2258 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343139613863323537636336396139613638303234373663323235 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2258 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343139613863323537636336396139613638303234373663323235 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit: BPF prog-id=73 op=LOAD Feb 13 09:54:45.759000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ce0 items=0 ppid=2258 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343139613863323537636336396139613638303234373663323235 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.759000 audit: BPF prog-id=74 op=LOAD Feb 13 09:54:45.759000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d7d28 items=0 ppid=2258 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343139613863323537636336396139613638303234373663323235 Feb 13 09:54:45.759000 audit: BPF prog-id=74 op=UNLOAD Feb 13 09:54:45.759000 audit: BPF prog-id=73 op=UNLOAD Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { perfmon } for pid=2280 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit[2280]: AVC avc: denied { bpf } for pid=2280 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.760000 audit: BPF prog-id=75 op=LOAD Feb 13 09:54:45.760000 audit[2280]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da138 items=0 ppid=2258 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361343139613863323537636336396139613638303234373663323235 Feb 13 09:54:45.776759 env[1474]: time="2024-02-13T09:54:45.776727635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-0e431cd218,Uid:251924a846dab0b6d7a128ca9e53c198,Namespace:kube-system,Attempt:0,} returns sandbox id \"c978ce21906571f2acf35231d878c24bc21fc56e306d8d714f9af18d629154cb\"" Feb 13 09:54:45.777047 env[1474]: time="2024-02-13T09:54:45.776757325Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-0e431cd218,Uid:3882cd5be351ce12e24c3c2e3631b445,Namespace:kube-system,Attempt:0,} returns sandbox id \"ca419a8c257cc69a9a6802476c2250bba1bd0bebc860f3bf0aa2e8e313876bad\"" Feb 13 09:54:45.777047 env[1474]: time="2024-02-13T09:54:45.776727735Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-0e431cd218,Uid:060a66f1b471719eeb4a07e091896aa5,Namespace:kube-system,Attempt:0,} returns sandbox id \"ea7473f0486eabfeb36a836a1121f682fc58dd83f4d4eb59671169cc70e6c3e5\"" Feb 13 09:54:45.778730 env[1474]: time="2024-02-13T09:54:45.778708756Z" level=info msg="CreateContainer within sandbox \"ca419a8c257cc69a9a6802476c2250bba1bd0bebc860f3bf0aa2e8e313876bad\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 13 09:54:45.779183 env[1474]: time="2024-02-13T09:54:45.779167901Z" level=info msg="CreateContainer within sandbox \"ea7473f0486eabfeb36a836a1121f682fc58dd83f4d4eb59671169cc70e6c3e5\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 13 09:54:45.779183 env[1474]: time="2024-02-13T09:54:45.779168094Z" level=info msg="CreateContainer within sandbox \"c978ce21906571f2acf35231d878c24bc21fc56e306d8d714f9af18d629154cb\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 13 09:54:45.785226 env[1474]: time="2024-02-13T09:54:45.785210974Z" level=info msg="CreateContainer within sandbox \"c978ce21906571f2acf35231d878c24bc21fc56e306d8d714f9af18d629154cb\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"db29dbfab27e2cda7930dd06e94cca51eb99c025789ee21e29cca6336b92d37a\"" Feb 13 09:54:45.785483 env[1474]: time="2024-02-13T09:54:45.785472155Z" level=info msg="StartContainer for \"db29dbfab27e2cda7930dd06e94cca51eb99c025789ee21e29cca6336b92d37a\"" Feb 13 09:54:45.786726 env[1474]: time="2024-02-13T09:54:45.786706113Z" level=info msg="CreateContainer within sandbox \"ca419a8c257cc69a9a6802476c2250bba1bd0bebc860f3bf0aa2e8e313876bad\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"fff22c5d0be86cc9e371b1d24761cb7c36fd7bc144b2d92bb3593235d1b0ee73\"" Feb 13 09:54:45.786878 env[1474]: time="2024-02-13T09:54:45.786865806Z" level=info msg="StartContainer for \"fff22c5d0be86cc9e371b1d24761cb7c36fd7bc144b2d92bb3593235d1b0ee73\"" Feb 13 09:54:45.787017 env[1474]: time="2024-02-13T09:54:45.787002974Z" level=info msg="CreateContainer within sandbox \"ea7473f0486eabfeb36a836a1121f682fc58dd83f4d4eb59671169cc70e6c3e5\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c2d66fe0cea3778df8099038bb67164045a60d66a5a09c1166f7e2b5bcb92e96\"" Feb 13 09:54:45.787168 env[1474]: time="2024-02-13T09:54:45.787153503Z" level=info msg="StartContainer for \"c2d66fe0cea3778df8099038bb67164045a60d66a5a09c1166f7e2b5bcb92e96\"" Feb 13 09:54:45.793927 systemd[1]: Started cri-containerd-db29dbfab27e2cda7930dd06e94cca51eb99c025789ee21e29cca6336b92d37a.scope. Feb 13 09:54:45.796116 systemd[1]: Started cri-containerd-c2d66fe0cea3778df8099038bb67164045a60d66a5a09c1166f7e2b5bcb92e96.scope. Feb 13 09:54:45.796716 systemd[1]: Started cri-containerd-fff22c5d0be86cc9e371b1d24761cb7c36fd7bc144b2d92bb3593235d1b0ee73.scope. Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit: BPF prog-id=76 op=LOAD Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2240 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462323964626661623237653263646137393330646430366539346363 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2240 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462323964626661623237653263646137393330646430366539346363 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit: BPF prog-id=77 op=LOAD Feb 13 09:54:45.801000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027bdc0 items=0 ppid=2240 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462323964626661623237653263646137393330646430366539346363 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.801000 audit: BPF prog-id=78 op=LOAD Feb 13 09:54:45.801000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027be08 items=0 ppid=2240 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462323964626661623237653263646137393330646430366539346363 Feb 13 09:54:45.801000 audit: BPF prog-id=78 op=UNLOAD Feb 13 09:54:45.802000 audit: BPF prog-id=77 op=UNLOAD Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { perfmon } for pid=2356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2356]: AVC avc: denied { bpf } for pid=2356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit: BPF prog-id=79 op=LOAD Feb 13 09:54:45.802000 audit[2356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f4218 items=0 ppid=2240 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462323964626661623237653263646137393330646430366539346363 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit: BPF prog-id=80 op=LOAD Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2258 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663232633564306265383663633965333731623164323437363163 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2258 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663232633564306265383663633965333731623164323437363163 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit: BPF prog-id=81 op=LOAD Feb 13 09:54:45.802000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00027bdc0 items=0 ppid=2258 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663232633564306265383663633965333731623164323437363163 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit: BPF prog-id=82 op=LOAD Feb 13 09:54:45.802000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00027be08 items=0 ppid=2258 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663232633564306265383663633965333731623164323437363163 Feb 13 09:54:45.802000 audit: BPF prog-id=82 op=UNLOAD Feb 13 09:54:45.802000 audit: BPF prog-id=81 op=UNLOAD Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { perfmon } for pid=2370 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit[2370]: AVC avc: denied { bpf } for pid=2370 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.802000 audit: BPF prog-id=83 op=LOAD Feb 13 09:54:45.802000 audit[2370]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003f6218 items=0 ppid=2258 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666663232633564306265383663633965333731623164323437363163 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.803000 audit: BPF prog-id=84 op=LOAD Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2225 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643636666530636561333737386466383039393033386262363731 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2225 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643636666530636561333737386466383039393033386262363731 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit: BPF prog-id=85 op=LOAD Feb 13 09:54:45.804000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a3cb0 items=0 ppid=2225 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643636666530636561333737386466383039393033386262363731 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit: BPF prog-id=86 op=LOAD Feb 13 09:54:45.804000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a3cf8 items=0 ppid=2225 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643636666530636561333737386466383039393033386262363731 Feb 13 09:54:45.804000 audit: BPF prog-id=86 op=UNLOAD Feb 13 09:54:45.804000 audit: BPF prog-id=85 op=UNLOAD Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { perfmon } for pid=2369 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit[2369]: AVC avc: denied { bpf } for pid=2369 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:45.804000 audit: BPF prog-id=87 op=LOAD Feb 13 09:54:45.804000 audit[2369]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002f0108 items=0 ppid=2225 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:45.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332643636666530636561333737386466383039393033386262363731 Feb 13 09:54:45.820634 env[1474]: time="2024-02-13T09:54:45.820554059Z" level=info msg="StartContainer for \"fff22c5d0be86cc9e371b1d24761cb7c36fd7bc144b2d92bb3593235d1b0ee73\" returns successfully" Feb 13 09:54:45.820731 env[1474]: time="2024-02-13T09:54:45.820658098Z" level=info msg="StartContainer for \"db29dbfab27e2cda7930dd06e94cca51eb99c025789ee21e29cca6336b92d37a\" returns successfully" Feb 13 09:54:45.821355 env[1474]: time="2024-02-13T09:54:45.821341032Z" level=info msg="StartContainer for \"c2d66fe0cea3778df8099038bb67164045a60d66a5a09c1166f7e2b5bcb92e96\" returns successfully" Feb 13 09:54:46.206000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.206000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000785d0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:54:46.206000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:54:46.206000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.206000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004800c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:54:46.206000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:54:46.466000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.466000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0043ab2f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:54:46.466000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.466000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c002010020 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:54:46.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:54:46.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:54:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0043ab3b0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:54:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:54:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0043ab3e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:54:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:54:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=55 a1=c003abe0c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:54:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:54:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=58 a1=c000b69e90 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:54:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:54:46.851474 kubelet[2175]: E0213 09:54:46.851456 2175 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "ci-3510.3.2-a-0e431cd218" not found Feb 13 09:54:47.068703 kubelet[2175]: I0213 09:54:47.068629 2175 apiserver.go:52] "Watching apiserver" Feb 13 09:54:47.082192 kubelet[2175]: E0213 09:54:47.082150 2175 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-0e431cd218\" not found" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:47.170363 kubelet[2175]: I0213 09:54:47.170193 2175 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 13 09:54:47.185702 kubelet[2175]: I0213 09:54:47.185658 2175 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:47.193017 kubelet[2175]: I0213 09:54:47.192966 2175 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:48.729613 kubelet[2175]: W0213 09:54:48.729557 2175 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 09:54:49.625270 systemd[1]: Reloading. Feb 13 09:54:49.659928 /usr/lib/systemd/system-generators/torcx-generator[2515]: time="2024-02-13T09:54:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 09:54:49.659943 /usr/lib/systemd/system-generators/torcx-generator[2515]: time="2024-02-13T09:54:49Z" level=info msg="torcx already run" Feb 13 09:54:49.717153 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 09:54:49.717162 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 09:54:49.732119 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit: BPF prog-id=88 op=LOAD Feb 13 09:54:49.781000 audit: BPF prog-id=49 op=UNLOAD Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit: BPF prog-id=89 op=LOAD Feb 13 09:54:49.782000 audit: BPF prog-id=50 op=UNLOAD Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit: BPF prog-id=90 op=LOAD Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit: BPF prog-id=91 op=LOAD Feb 13 09:54:49.782000 audit: BPF prog-id=51 op=UNLOAD Feb 13 09:54:49.782000 audit: BPF prog-id=52 op=UNLOAD Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.782000 audit: BPF prog-id=92 op=LOAD Feb 13 09:54:49.782000 audit: BPF prog-id=53 op=UNLOAD Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit: BPF prog-id=93 op=LOAD Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit: BPF prog-id=94 op=LOAD Feb 13 09:54:49.783000 audit: BPF prog-id=54 op=UNLOAD Feb 13 09:54:49.783000 audit: BPF prog-id=55 op=UNLOAD Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.783000 audit: BPF prog-id=95 op=LOAD Feb 13 09:54:49.783000 audit: BPF prog-id=56 op=UNLOAD Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit: BPF prog-id=96 op=LOAD Feb 13 09:54:49.784000 audit: BPF prog-id=72 op=UNLOAD Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit: BPF prog-id=97 op=LOAD Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit: BPF prog-id=98 op=LOAD Feb 13 09:54:49.785000 audit: BPF prog-id=57 op=UNLOAD Feb 13 09:54:49.785000 audit: BPF prog-id=58 op=UNLOAD Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit: BPF prog-id=99 op=LOAD Feb 13 09:54:49.785000 audit: BPF prog-id=80 op=UNLOAD Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.785000 audit: BPF prog-id=100 op=LOAD Feb 13 09:54:49.785000 audit: BPF prog-id=84 op=UNLOAD Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit: BPF prog-id=101 op=LOAD Feb 13 09:54:49.786000 audit: BPF prog-id=59 op=UNLOAD Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.786000 audit: BPF prog-id=102 op=LOAD Feb 13 09:54:49.787000 audit: BPF prog-id=76 op=UNLOAD Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit: BPF prog-id=103 op=LOAD Feb 13 09:54:49.787000 audit: BPF prog-id=60 op=UNLOAD Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit: BPF prog-id=104 op=LOAD Feb 13 09:54:49.788000 audit: BPF prog-id=61 op=UNLOAD Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit: BPF prog-id=105 op=LOAD Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit: BPF prog-id=106 op=LOAD Feb 13 09:54:49.788000 audit: BPF prog-id=62 op=UNLOAD Feb 13 09:54:49.788000 audit: BPF prog-id=63 op=UNLOAD Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.788000 audit: BPF prog-id=107 op=LOAD Feb 13 09:54:49.788000 audit: BPF prog-id=66 op=UNLOAD Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.789000 audit: BPF prog-id=108 op=LOAD Feb 13 09:54:49.789000 audit: BPF prog-id=64 op=UNLOAD Feb 13 09:54:49.795769 systemd[1]: Stopping kubelet.service... Feb 13 09:54:49.822497 systemd[1]: kubelet.service: Deactivated successfully. Feb 13 09:54:49.822860 systemd[1]: Stopped kubelet.service. Feb 13 09:54:49.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:49.826039 systemd[1]: Started kubelet.service. Feb 13 09:54:49.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:49.853503 kubelet[2572]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 09:54:49.853503 kubelet[2572]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 13 09:54:49.853503 kubelet[2572]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 09:54:49.853739 kubelet[2572]: I0213 09:54:49.853506 2572 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 09:54:49.856901 kubelet[2572]: I0213 09:54:49.856889 2572 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 13 09:54:49.856901 kubelet[2572]: I0213 09:54:49.856901 2572 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 09:54:49.857028 kubelet[2572]: I0213 09:54:49.857022 2572 server.go:895] "Client rotation is on, will bootstrap in background" Feb 13 09:54:49.857917 kubelet[2572]: I0213 09:54:49.857866 2572 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 13 09:54:49.858418 kubelet[2572]: I0213 09:54:49.858407 2572 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 09:54:49.876434 kubelet[2572]: I0213 09:54:49.876367 2572 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 09:54:49.876489 kubelet[2572]: I0213 09:54:49.876471 2572 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 09:54:49.876599 kubelet[2572]: I0213 09:54:49.876562 2572 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 13 09:54:49.876599 kubelet[2572]: I0213 09:54:49.876575 2572 topology_manager.go:138] "Creating topology manager with none policy" Feb 13 09:54:49.876599 kubelet[2572]: I0213 09:54:49.876582 2572 container_manager_linux.go:301] "Creating device plugin manager" Feb 13 09:54:49.876599 kubelet[2572]: I0213 09:54:49.876600 2572 state_mem.go:36] "Initialized new in-memory state store" Feb 13 09:54:49.876718 kubelet[2572]: I0213 09:54:49.876645 2572 kubelet.go:393] "Attempting to sync node with API server" Feb 13 09:54:49.876718 kubelet[2572]: I0213 09:54:49.876653 2572 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 09:54:49.876718 kubelet[2572]: I0213 09:54:49.876669 2572 kubelet.go:309] "Adding apiserver pod source" Feb 13 09:54:49.876718 kubelet[2572]: I0213 09:54:49.876676 2572 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 09:54:49.877136 kubelet[2572]: I0213 09:54:49.877122 2572 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 09:54:49.877510 kubelet[2572]: I0213 09:54:49.877499 2572 server.go:1232] "Started kubelet" Feb 13 09:54:49.877565 kubelet[2572]: I0213 09:54:49.877557 2572 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 09:54:49.877612 kubelet[2572]: I0213 09:54:49.877558 2572 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 13 09:54:49.877927 kubelet[2572]: I0213 09:54:49.877912 2572 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 13 09:54:49.878078 kubelet[2572]: E0213 09:54:49.878063 2572 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 09:54:49.878154 kubelet[2572]: E0213 09:54:49.878143 2572 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 09:54:49.878000 audit[2572]: AVC avc: denied { mac_admin } for pid=2572 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.878000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 09:54:49.878000 audit[2572]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000330e70 a1=c00007eb28 a2=c000330b10 a3=25 items=0 ppid=1 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:49.878000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 09:54:49.878000 audit[2572]: AVC avc: denied { mac_admin } for pid=2572 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.878000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 09:54:49.878000 audit[2572]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00108e180 a1=c00007eb40 a2=c000330f00 a3=25 items=0 ppid=1 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:49.878000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879051 2572 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879063 2572 server.go:462] "Adding debug handlers to kubelet server" Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879072 2572 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879090 2572 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879125 2572 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879174 2572 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 13 09:54:49.879330 kubelet[2572]: I0213 09:54:49.879279 2572 reconciler_new.go:29] "Reconciler: start to sync state" Feb 13 09:54:49.883151 kubelet[2572]: I0213 09:54:49.883130 2572 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 13 09:54:49.883803 kubelet[2572]: I0213 09:54:49.883791 2572 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 13 09:54:49.883867 kubelet[2572]: I0213 09:54:49.883812 2572 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 13 09:54:49.883867 kubelet[2572]: I0213 09:54:49.883829 2572 kubelet.go:2303] "Starting kubelet main sync loop" Feb 13 09:54:49.883923 kubelet[2572]: E0213 09:54:49.883877 2572 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 13 09:54:49.898766 kubelet[2572]: I0213 09:54:49.898750 2572 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 09:54:49.898766 kubelet[2572]: I0213 09:54:49.898762 2572 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 09:54:49.898766 kubelet[2572]: I0213 09:54:49.898772 2572 state_mem.go:36] "Initialized new in-memory state store" Feb 13 09:54:49.898898 kubelet[2572]: I0213 09:54:49.898861 2572 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 13 09:54:49.898898 kubelet[2572]: I0213 09:54:49.898874 2572 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 13 09:54:49.898898 kubelet[2572]: I0213 09:54:49.898878 2572 policy_none.go:49] "None policy: Start" Feb 13 09:54:49.899423 kubelet[2572]: I0213 09:54:49.899406 2572 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 09:54:49.899468 kubelet[2572]: I0213 09:54:49.899430 2572 state_mem.go:35] "Initializing new in-memory state store" Feb 13 09:54:49.899605 kubelet[2572]: I0213 09:54:49.899595 2572 state_mem.go:75] "Updated machine memory state" Feb 13 09:54:49.901727 kubelet[2572]: I0213 09:54:49.901718 2572 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 09:54:49.900000 audit[2572]: AVC avc: denied { mac_admin } for pid=2572 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:54:49.900000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 09:54:49.900000 audit[2572]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00058e9c0 a1=c001388cf0 a2=c00058e990 a3=25 items=0 ppid=1 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:54:49.900000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 09:54:49.901908 kubelet[2572]: I0213 09:54:49.901749 2572 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 09:54:49.901908 kubelet[2572]: I0213 09:54:49.901876 2572 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 09:54:49.984926 kubelet[2572]: I0213 09:54:49.984812 2572 topology_manager.go:215] "Topology Admit Handler" podUID="251924a846dab0b6d7a128ca9e53c198" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:49.985153 kubelet[2572]: I0213 09:54:49.985106 2572 topology_manager.go:215] "Topology Admit Handler" podUID="060a66f1b471719eeb4a07e091896aa5" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:49.985257 kubelet[2572]: I0213 09:54:49.985230 2572 topology_manager.go:215] "Topology Admit Handler" podUID="3882cd5be351ce12e24c3c2e3631b445" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:49.985683 kubelet[2572]: I0213 09:54:49.985629 2572 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:49.993289 kubelet[2572]: W0213 09:54:49.993229 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 09:54:49.994498 kubelet[2572]: W0213 09:54:49.994457 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 09:54:49.994928 kubelet[2572]: W0213 09:54:49.994895 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 09:54:49.995068 kubelet[2572]: E0213 09:54:49.995034 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:49.998023 kubelet[2572]: I0213 09:54:49.997935 2572 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:49.998195 kubelet[2572]: I0213 09:54:49.998114 2572 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.032000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:50.032000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006268a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:54:50.032000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:54:50.033000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:50.033000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0015c21c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:54:50.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:54:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000534f60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:54:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:54:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:54:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006268e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:54:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:54:50.180344 kubelet[2572]: I0213 09:54:50.180259 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/251924a846dab0b6d7a128ca9e53c198-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" (UID: \"251924a846dab0b6d7a128ca9e53c198\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180344 kubelet[2572]: I0213 09:54:50.180288 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180344 kubelet[2572]: I0213 09:54:50.180301 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180344 kubelet[2572]: I0213 09:54:50.180315 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180344 kubelet[2572]: I0213 09:54:50.180327 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3882cd5be351ce12e24c3c2e3631b445-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-0e431cd218\" (UID: \"3882cd5be351ce12e24c3c2e3631b445\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180506 kubelet[2572]: I0213 09:54:50.180338 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/251924a846dab0b6d7a128ca9e53c198-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" (UID: \"251924a846dab0b6d7a128ca9e53c198\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180506 kubelet[2572]: I0213 09:54:50.180354 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180506 kubelet[2572]: I0213 09:54:50.180366 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/060a66f1b471719eeb4a07e091896aa5-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" (UID: \"060a66f1b471719eeb4a07e091896aa5\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.180506 kubelet[2572]: I0213 09:54:50.180379 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/251924a846dab0b6d7a128ca9e53c198-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" (UID: \"251924a846dab0b6d7a128ca9e53c198\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.877990 kubelet[2572]: I0213 09:54:50.877925 2572 apiserver.go:52] "Watching apiserver" Feb 13 09:54:50.898894 kubelet[2572]: W0213 09:54:50.898800 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 09:54:50.898894 kubelet[2572]: W0213 09:54:50.898883 2572 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 13 09:54:50.899248 kubelet[2572]: E0213 09:54:50.899040 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-0e431cd218\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.899248 kubelet[2572]: E0213 09:54:50.899045 2572 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-0e431cd218\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" Feb 13 09:54:50.932096 kubelet[2572]: I0213 09:54:50.932064 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-0e431cd218" podStartSLOduration=2.932011535 podCreationTimestamp="2024-02-13 09:54:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 09:54:50.931954583 +0000 UTC m=+1.100738364" watchObservedRunningTime="2024-02-13 09:54:50.932011535 +0000 UTC m=+1.100795290" Feb 13 09:54:50.941326 kubelet[2572]: I0213 09:54:50.941299 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-0e431cd218" podStartSLOduration=1.941268407 podCreationTimestamp="2024-02-13 09:54:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 09:54:50.941170069 +0000 UTC m=+1.109953812" watchObservedRunningTime="2024-02-13 09:54:50.941268407 +0000 UTC m=+1.110052142" Feb 13 09:54:50.957126 kubelet[2572]: I0213 09:54:50.957087 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-0e431cd218" podStartSLOduration=1.957021047 podCreationTimestamp="2024-02-13 09:54:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 09:54:50.948304368 +0000 UTC m=+1.117088113" watchObservedRunningTime="2024-02-13 09:54:50.957021047 +0000 UTC m=+1.125804791" Feb 13 09:54:50.980352 kubelet[2572]: I0213 09:54:50.980282 2572 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 13 09:54:55.392832 sudo[1631]: pam_unix(sudo:session): session closed for user root Feb 13 09:54:55.392000 audit[1631]: USER_END pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:55.394132 sshd[1628]: pam_unix(sshd:session): session closed for user core Feb 13 09:54:55.396422 systemd[1]: sshd@6-139.178.70.11:22-139.178.68.195:57544.service: Deactivated successfully. Feb 13 09:54:55.397091 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 09:54:55.397239 systemd[1]: session-9.scope: Consumed 3.122s CPU time. Feb 13 09:54:55.397762 systemd-logind[1462]: Session 9 logged out. Waiting for processes to exit. Feb 13 09:54:55.398628 systemd-logind[1462]: Removed session 9. Feb 13 09:54:55.418206 kernel: kauditd_printk_skb: 630 callbacks suppressed Feb 13 09:54:55.418272 kernel: audit: type=1106 audit(1707818095.392:945): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:55.392000 audit[1631]: CRED_DISP pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:55.585687 kernel: audit: type=1104 audit(1707818095.392:946): pid=1631 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 09:54:55.585711 kernel: audit: type=1106 audit(1707818095.394:947): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:55.394000 audit[1628]: USER_END pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:55.677105 kernel: audit: type=1104 audit(1707818095.394:948): pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:55.394000 audit[1628]: CRED_DISP pid=1628 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 09:54:55.763820 kernel: audit: type=1131 audit(1707818095.395:949): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.11:22-139.178.68.195:57544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:54:55.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.11:22-139.178.68.195:57544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:55:01.055000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 13 09:55:01.055000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00139cbc0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:01.264211 kernel: audit: type=1400 audit(1707818101.055:950): avc: denied { watch } for pid=2401 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=524902 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 13 09:55:01.264270 kernel: audit: type=1300 audit(1707818101.055:950): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00139cbc0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:01.264286 kernel: audit: type=1327 audit(1707818101.055:950): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:01.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:02.384091 update_engine[1464]: I0213 09:55:02.383971 1464 update_attempter.cc:509] Updating boot flags... Feb 13 09:55:02.894341 kubelet[2572]: I0213 09:55:02.894250 2572 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 13 09:55:02.895233 env[1474]: time="2024-02-13T09:55:02.895095490Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 13 09:55:02.895804 kubelet[2572]: I0213 09:55:02.895503 2572 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 13 09:55:03.733297 kubelet[2572]: I0213 09:55:03.733186 2572 topology_manager.go:215] "Topology Admit Handler" podUID="cc272c5a-fb38-48c1-9067-d70ea6d15572" podNamespace="kube-system" podName="kube-proxy-7ndts" Feb 13 09:55:03.746363 systemd[1]: Created slice kubepods-besteffort-podcc272c5a_fb38_48c1_9067_d70ea6d15572.slice. Feb 13 09:55:03.771944 kubelet[2572]: I0213 09:55:03.771896 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/cc272c5a-fb38-48c1-9067-d70ea6d15572-kube-proxy\") pod \"kube-proxy-7ndts\" (UID: \"cc272c5a-fb38-48c1-9067-d70ea6d15572\") " pod="kube-system/kube-proxy-7ndts" Feb 13 09:55:03.772120 kubelet[2572]: I0213 09:55:03.771974 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cc272c5a-fb38-48c1-9067-d70ea6d15572-xtables-lock\") pod \"kube-proxy-7ndts\" (UID: \"cc272c5a-fb38-48c1-9067-d70ea6d15572\") " pod="kube-system/kube-proxy-7ndts" Feb 13 09:55:03.772120 kubelet[2572]: I0213 09:55:03.772014 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cc272c5a-fb38-48c1-9067-d70ea6d15572-lib-modules\") pod \"kube-proxy-7ndts\" (UID: \"cc272c5a-fb38-48c1-9067-d70ea6d15572\") " pod="kube-system/kube-proxy-7ndts" Feb 13 09:55:03.772120 kubelet[2572]: I0213 09:55:03.772049 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wbz62\" (UniqueName: \"kubernetes.io/projected/cc272c5a-fb38-48c1-9067-d70ea6d15572-kube-api-access-wbz62\") pod \"kube-proxy-7ndts\" (UID: \"cc272c5a-fb38-48c1-9067-d70ea6d15572\") " pod="kube-system/kube-proxy-7ndts" Feb 13 09:55:03.912595 kubelet[2572]: I0213 09:55:03.912537 2572 topology_manager.go:215] "Topology Admit Handler" podUID="f2db63a9-f04c-457e-95f3-179b872f38f6" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-dm75n" Feb 13 09:55:03.917532 systemd[1]: Created slice kubepods-besteffort-podf2db63a9_f04c_457e_95f3_179b872f38f6.slice. Feb 13 09:55:03.973203 kubelet[2572]: I0213 09:55:03.973144 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f2db63a9-f04c-457e-95f3-179b872f38f6-var-lib-calico\") pod \"tigera-operator-55585899bf-dm75n\" (UID: \"f2db63a9-f04c-457e-95f3-179b872f38f6\") " pod="tigera-operator/tigera-operator-55585899bf-dm75n" Feb 13 09:55:03.973487 kubelet[2572]: I0213 09:55:03.973245 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d622r\" (UniqueName: \"kubernetes.io/projected/f2db63a9-f04c-457e-95f3-179b872f38f6-kube-api-access-d622r\") pod \"tigera-operator-55585899bf-dm75n\" (UID: \"f2db63a9-f04c-457e-95f3-179b872f38f6\") " pod="tigera-operator/tigera-operator-55585899bf-dm75n" Feb 13 09:55:04.066550 env[1474]: time="2024-02-13T09:55:04.066407874Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7ndts,Uid:cc272c5a-fb38-48c1-9067-d70ea6d15572,Namespace:kube-system,Attempt:0,}" Feb 13 09:55:04.090520 env[1474]: time="2024-02-13T09:55:04.090318570Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:55:04.090520 env[1474]: time="2024-02-13T09:55:04.090415891Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:55:04.090520 env[1474]: time="2024-02-13T09:55:04.090454994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:55:04.091028 env[1474]: time="2024-02-13T09:55:04.090884625Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9221aadfd8d9a779a61f48c6ba8f304858c2499d9220acb47e3a8a48af53a39 pid=2754 runtime=io.containerd.runc.v2 Feb 13 09:55:04.117766 systemd[1]: Started cri-containerd-f9221aadfd8d9a779a61f48c6ba8f304858c2499d9220acb47e3a8a48af53a39.scope. Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.220148 env[1474]: time="2024-02-13T09:55:04.220117376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-dm75n,Uid:f2db63a9-f04c-457e-95f3-179b872f38f6,Namespace:tigera-operator,Attempt:0,}" Feb 13 09:55:04.230188 env[1474]: time="2024-02-13T09:55:04.230159567Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:55:04.230188 env[1474]: time="2024-02-13T09:55:04.230181205Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:55:04.230266 env[1474]: time="2024-02-13T09:55:04.230188095Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:55:04.230266 env[1474]: time="2024-02-13T09:55:04.230249154Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/915099e5a987659a6cf4769d68f4db3115d7dde679f0fe734d4974a36d9d95a7 pid=2788 runtime=io.containerd.runc.v2 Feb 13 09:55:04.249576 kernel: audit: type=1400 audit(1707818104.125:951): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249646 kernel: audit: type=1400 audit(1707818104.125:952): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249667 kernel: audit: type=1400 audit(1707818104.125:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.250986 systemd[1]: Started cri-containerd-915099e5a987659a6cf4769d68f4db3115d7dde679f0fe734d4974a36d9d95a7.scope. Feb 13 09:55:04.310817 kernel: audit: type=1400 audit(1707818104.125:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.372707 kernel: audit: type=1400 audit(1707818104.125:955): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434532 kernel: audit: type=1400 audit(1707818104.125:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.496414 kernel: audit: type=1400 audit(1707818104.125:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.248000 audit: BPF prog-id=109 op=LOAD Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2754 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323231616164666438643961373739613631663438633662613866 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2754 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323231616164666438643961373739613631663438633662613866 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.249000 audit: BPF prog-id=110 op=LOAD Feb 13 09:55:04.249000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00038a7c0 items=0 ppid=2754 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323231616164666438643961373739613631663438633662613866 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit: BPF prog-id=111 op=LOAD Feb 13 09:55:04.433000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2788 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353039396535613938373635396136636634373639643638663464 Feb 13 09:55:04.433000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2788 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353039396535613938373635396136636634373639643638663464 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.433000 audit: BPF prog-id=112 op=LOAD Feb 13 09:55:04.433000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00038a808 items=0 ppid=2754 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323231616164666438643961373739613631663438633662613866 Feb 13 09:55:04.557000 audit: BPF prog-id=112 op=UNLOAD Feb 13 09:55:04.557000 audit: BPF prog-id=110 op=UNLOAD Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.434000 audit: BPF prog-id=113 op=LOAD Feb 13 09:55:04.434000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003e21e0 items=0 ppid=2788 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353039396535613938373635396136636634373639643638663464 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit: BPF prog-id=114 op=LOAD Feb 13 09:55:04.557000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003e2228 items=0 ppid=2788 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353039396535613938373635396136636634373639643638663464 Feb 13 09:55:04.557000 audit: BPF prog-id=114 op=UNLOAD Feb 13 09:55:04.557000 audit: BPF prog-id=113 op=UNLOAD Feb 13 09:55:04.557000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit: BPF prog-id=115 op=LOAD Feb 13 09:55:04.557000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038ac18 items=0 ppid=2754 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639323231616164666438643961373739613631663438633662613866 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { perfmon } for pid=2797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit[2797]: AVC avc: denied { bpf } for pid=2797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.557000 audit: BPF prog-id=116 op=LOAD Feb 13 09:55:04.557000 audit[2797]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003e2638 items=0 ppid=2788 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931353039396535613938373635396136636634373639643638663464 Feb 13 09:55:04.563158 env[1474]: time="2024-02-13T09:55:04.563107827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-7ndts,Uid:cc272c5a-fb38-48c1-9067-d70ea6d15572,Namespace:kube-system,Attempt:0,} returns sandbox id \"f9221aadfd8d9a779a61f48c6ba8f304858c2499d9220acb47e3a8a48af53a39\"" Feb 13 09:55:04.564400 env[1474]: time="2024-02-13T09:55:04.564385031Z" level=info msg="CreateContainer within sandbox \"f9221aadfd8d9a779a61f48c6ba8f304858c2499d9220acb47e3a8a48af53a39\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 13 09:55:04.569735 env[1474]: time="2024-02-13T09:55:04.569717773Z" level=info msg="CreateContainer within sandbox \"f9221aadfd8d9a779a61f48c6ba8f304858c2499d9220acb47e3a8a48af53a39\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1bce8392cb2417e3139af55447c81f74c9dc47454981103a3a63f266ea80b910\"" Feb 13 09:55:04.570002 env[1474]: time="2024-02-13T09:55:04.569988153Z" level=info msg="StartContainer for \"1bce8392cb2417e3139af55447c81f74c9dc47454981103a3a63f266ea80b910\"" Feb 13 09:55:04.574879 env[1474]: time="2024-02-13T09:55:04.574829734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-dm75n,Uid:f2db63a9-f04c-457e-95f3-179b872f38f6,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"915099e5a987659a6cf4769d68f4db3115d7dde679f0fe734d4974a36d9d95a7\"" Feb 13 09:55:04.575708 env[1474]: time="2024-02-13T09:55:04.575695349Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 13 09:55:04.577833 systemd[1]: Started cri-containerd-1bce8392cb2417e3139af55447c81f74c9dc47454981103a3a63f266ea80b910.scope. Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f076de502f8 items=0 ppid=2754 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636538333932636232343137653331333961663535343437633831 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit: BPF prog-id=117 op=LOAD Feb 13 09:55:04.585000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000024ad8 items=0 ppid=2754 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636538333932636232343137653331333961663535343437633831 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit: BPF prog-id=118 op=LOAD Feb 13 09:55:04.585000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000024b28 items=0 ppid=2754 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636538333932636232343137653331333961663535343437633831 Feb 13 09:55:04.585000 audit: BPF prog-id=118 op=UNLOAD Feb 13 09:55:04.585000 audit: BPF prog-id=117 op=UNLOAD Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { perfmon } for pid=2835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit[2835]: AVC avc: denied { bpf } for pid=2835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:04.585000 audit: BPF prog-id=119 op=LOAD Feb 13 09:55:04.585000 audit[2835]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000024bb8 items=0 ppid=2754 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636538333932636232343137653331333961663535343437633831 Feb 13 09:55:04.592043 env[1474]: time="2024-02-13T09:55:04.592019204Z" level=info msg="StartContainer for \"1bce8392cb2417e3139af55447c81f74c9dc47454981103a3a63f266ea80b910\" returns successfully" Feb 13 09:55:04.623000 audit[2899]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.623000 audit[2899]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd742a9730 a2=0 a3=7ffd742a971c items=0 ppid=2846 pid=2899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 09:55:04.623000 audit[2900]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.623000 audit[2900]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe81fd58b0 a2=0 a3=7ffe81fd589c items=0 ppid=2846 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 09:55:04.623000 audit[2901]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.623000 audit[2901]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd340f4cb0 a2=0 a3=7ffd340f4c9c items=0 ppid=2846 pid=2901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.623000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 09:55:04.623000 audit[2902]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.623000 audit[2902]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd2b3f8c0 a2=0 a3=7ffdd2b3f8ac items=0 ppid=2846 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.623000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 09:55:04.624000 audit[2903]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.624000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd82a78fd0 a2=0 a3=7ffd82a78fbc items=0 ppid=2846 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 09:55:04.624000 audit[2904]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.624000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb7d31df0 a2=0 a3=7ffcb7d31ddc items=0 ppid=2846 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.624000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 09:55:04.727000 audit[2905]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.727000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcf165fc60 a2=0 a3=7ffcf165fc4c items=0 ppid=2846 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 09:55:04.751000 audit[2907]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.751000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdcdba2990 a2=0 a3=7ffdcdba297c items=0 ppid=2846 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 13 09:55:04.755000 audit[2910]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2910 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.755000 audit[2910]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd5e10a6b0 a2=0 a3=7ffd5e10a69c items=0 ppid=2846 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 13 09:55:04.756000 audit[2911]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.756000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc92cb4980 a2=0 a3=7ffc92cb496c items=0 ppid=2846 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 09:55:04.758000 audit[2913]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.758000 audit[2913]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1f1bd120 a2=0 a3=7ffe1f1bd10c items=0 ppid=2846 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 09:55:04.759000 audit[2914]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.759000 audit[2914]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaba51530 a2=0 a3=7ffeaba5151c items=0 ppid=2846 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 09:55:04.762000 audit[2916]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.762000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe047206d0 a2=0 a3=7ffe047206bc items=0 ppid=2846 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 09:55:04.765000 audit[2919]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.765000 audit[2919]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee083e1f0 a2=0 a3=7ffee083e1dc items=0 ppid=2846 pid=2919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 13 09:55:04.766000 audit[2920]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.766000 audit[2920]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec2017c80 a2=0 a3=7ffec2017c6c items=0 ppid=2846 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 09:55:04.768000 audit[2922]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.768000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd93945a0 a2=0 a3=7fffd939458c items=0 ppid=2846 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 09:55:04.768000 audit[2923]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.768000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdabc8540 a2=0 a3=7ffcdabc852c items=0 ppid=2846 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 09:55:04.771000 audit[2925]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.771000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf7e538a0 a2=0 a3=7ffcf7e5388c items=0 ppid=2846 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 09:55:04.773000 audit[2928]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.773000 audit[2928]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef6357800 a2=0 a3=7ffef63577ec items=0 ppid=2846 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 09:55:04.776000 audit[2931]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.776000 audit[2931]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1464a030 a2=0 a3=7ffe1464a01c items=0 ppid=2846 pid=2931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 09:55:04.777000 audit[2932]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.777000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeeb367a10 a2=0 a3=7ffeeb3679fc items=0 ppid=2846 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 09:55:04.779000 audit[2934]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.779000 audit[2934]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff11628550 a2=0 a3=7fff1162853c items=0 ppid=2846 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 09:55:04.782000 audit[2937]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.782000 audit[2937]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff8c13b7f0 a2=0 a3=7fff8c13b7dc items=0 ppid=2846 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 09:55:04.783000 audit[2938]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.783000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1cdf80c0 a2=0 a3=7ffc1cdf80ac items=0 ppid=2846 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 09:55:04.785000 audit[2940]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2940 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 09:55:04.785000 audit[2940]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd9414c550 a2=0 a3=7ffd9414c53c items=0 ppid=2846 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 09:55:04.798000 audit[2946]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:04.798000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffd9c0bb3d0 a2=0 a3=7ffd9c0bb3bc items=0 ppid=2846 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:04.803000 audit[2946]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:04.803000 audit[2946]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd9c0bb3d0 a2=0 a3=7ffd9c0bb3bc items=0 ppid=2846 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:04.814000 audit[2950]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.814000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc17873da0 a2=0 a3=7ffc17873d8c items=0 ppid=2846 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 09:55:04.820000 audit[2952]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.820000 audit[2952]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd47411370 a2=0 a3=7ffd4741135c items=0 ppid=2846 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.820000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 13 09:55:04.830000 audit[2955]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.830000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5e4b9240 a2=0 a3=7ffe5e4b922c items=0 ppid=2846 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 13 09:55:04.833000 audit[2956]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.833000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc54761c80 a2=0 a3=7ffc54761c6c items=0 ppid=2846 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 09:55:04.839000 audit[2958]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.839000 audit[2958]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb83ff450 a2=0 a3=7fffb83ff43c items=0 ppid=2846 pid=2958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 09:55:04.841000 audit[2959]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.841000 audit[2959]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd59693de0 a2=0 a3=7ffd59693dcc items=0 ppid=2846 pid=2959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 09:55:04.848000 audit[2961]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.848000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc2c07c590 a2=0 a3=7ffc2c07c57c items=0 ppid=2846 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.848000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 13 09:55:04.857000 audit[2964]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.857000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffaeaa8370 a2=0 a3=7fffaeaa835c items=0 ppid=2846 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.857000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 09:55:04.859000 audit[2965]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.859000 audit[2965]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6ac30be0 a2=0 a3=7ffe6ac30bcc items=0 ppid=2846 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 09:55:04.865000 audit[2967]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.865000 audit[2967]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4f902990 a2=0 a3=7ffe4f90297c items=0 ppid=2846 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 09:55:04.868000 audit[2968]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.868000 audit[2968]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffef64cc00 a2=0 a3=7fffef64cbec items=0 ppid=2846 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 09:55:04.875000 audit[2970]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.875000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdc7acac0 a2=0 a3=7fffdc7acaac items=0 ppid=2846 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 09:55:04.884000 audit[2973]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.884000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff7da40f0 a2=0 a3=7ffff7da40dc items=0 ppid=2846 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 09:55:04.893000 audit[2976]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2976 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.893000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff62442d00 a2=0 a3=7fff62442cec items=0 ppid=2846 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 13 09:55:04.896000 audit[2977]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.896000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdd3d087d0 a2=0 a3=7ffdd3d087bc items=0 ppid=2846 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.896000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 09:55:04.902000 audit[2979]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2979 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.902000 audit[2979]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff3beffc00 a2=0 a3=7fff3beffbec items=0 ppid=2846 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 09:55:04.910000 audit[2982]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.910000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdf610ee50 a2=0 a3=7ffdf610ee3c items=0 ppid=2846 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.910000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 09:55:04.913000 audit[2983]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.913000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdebba300 a2=0 a3=7fffdebba2ec items=0 ppid=2846 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 09:55:04.918000 audit[2985]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.918000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff9ebc4770 a2=0 a3=7fff9ebc475c items=0 ppid=2846 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 09:55:04.920000 audit[2986]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.920000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebb309bc0 a2=0 a3=7ffebb309bac items=0 ppid=2846 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 09:55:04.924000 audit[2988]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.924000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1ed09450 a2=0 a3=7fff1ed0943c items=0 ppid=2846 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 09:55:04.930000 audit[2991]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 09:55:04.930000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd1e67f20 a2=0 a3=7fffd1e67f0c items=0 ppid=2846 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 09:55:04.934862 kubelet[2572]: I0213 09:55:04.934802 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-7ndts" podStartSLOduration=1.934734378 podCreationTimestamp="2024-02-13 09:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 09:55:04.934570524 +0000 UTC m=+15.103354337" watchObservedRunningTime="2024-02-13 09:55:04.934734378 +0000 UTC m=+15.103518128" Feb 13 09:55:04.936000 audit[2993]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 09:55:04.936000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcb5d84d30 a2=0 a3=7ffcb5d84d1c items=0 ppid=2846 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.936000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:04.937000 audit[2993]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 09:55:04.937000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcb5d84d30 a2=0 a3=7ffcb5d84d1c items=0 ppid=2846 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:04.937000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:05.673949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2850778878.mount: Deactivated successfully. Feb 13 09:55:06.851100 env[1474]: time="2024-02-13T09:55:06.850911605Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:06.903071 env[1474]: time="2024-02-13T09:55:06.902939517Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:06.961429 env[1474]: time="2024-02-13T09:55:06.961289769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:07.012289 env[1474]: time="2024-02-13T09:55:07.012175990Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:07.014581 env[1474]: time="2024-02-13T09:55:07.014464639Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 13 09:55:07.018545 env[1474]: time="2024-02-13T09:55:07.018443245Z" level=info msg="CreateContainer within sandbox \"915099e5a987659a6cf4769d68f4db3115d7dde679f0fe734d4974a36d9d95a7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 13 09:55:07.133039 env[1474]: time="2024-02-13T09:55:07.132793539Z" level=info msg="CreateContainer within sandbox \"915099e5a987659a6cf4769d68f4db3115d7dde679f0fe734d4974a36d9d95a7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5082a3fe32ae3d70d152efa342f7630203fe4280e0c56718e59e587632b62fb6\"" Feb 13 09:55:07.133657 env[1474]: time="2024-02-13T09:55:07.133616872Z" level=info msg="StartContainer for \"5082a3fe32ae3d70d152efa342f7630203fe4280e0c56718e59e587632b62fb6\"" Feb 13 09:55:07.142872 systemd[1]: Started cri-containerd-5082a3fe32ae3d70d152efa342f7630203fe4280e0c56718e59e587632b62fb6.scope. Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.173985 kernel: kauditd_printk_skb: 303 callbacks suppressed Feb 13 09:55:07.174062 kernel: audit: type=1400 audit(1707818107.147:1044): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.297686 kernel: audit: type=1400 audit(1707818107.147:1045): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.297725 kernel: audit: type=1400 audit(1707818107.147:1046): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.425189 kernel: audit: type=1400 audit(1707818107.147:1047): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.425220 kernel: audit: type=1400 audit(1707818107.147:1048): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.489531 kernel: audit: type=1400 audit(1707818107.147:1049): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.553927 kernel: audit: type=1400 audit(1707818107.147:1050): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.618409 kernel: audit: type=1400 audit(1707818107.147:1051): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.682901 kernel: audit: type=1400 audit(1707818107.147:1052): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.811127 kernel: audit: type=1400 audit(1707818107.234:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.234000 audit: BPF prog-id=120 op=LOAD Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2788 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:07.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383261336665333261653364373064313532656661333432663736 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2788 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:07.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383261336665333261653364373064313532656661333432663736 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.235000 audit: BPF prog-id=121 op=LOAD Feb 13 09:55:07.235000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d6d00 items=0 ppid=2788 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:07.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383261336665333261653364373064313532656661333432663736 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.359000 audit: BPF prog-id=122 op=LOAD Feb 13 09:55:07.359000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d6d48 items=0 ppid=2788 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:07.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383261336665333261653364373064313532656661333432663736 Feb 13 09:55:07.488000 audit: BPF prog-id=122 op=UNLOAD Feb 13 09:55:07.488000 audit: BPF prog-id=121 op=UNLOAD Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:07.488000 audit: BPF prog-id=123 op=LOAD Feb 13 09:55:07.488000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d7158 items=0 ppid=2788 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:07.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530383261336665333261653364373064313532656661333432663736 Feb 13 09:55:07.816142 env[1474]: time="2024-02-13T09:55:07.816117384Z" level=info msg="StartContainer for \"5082a3fe32ae3d70d152efa342f7630203fe4280e0c56718e59e587632b62fb6\" returns successfully" Feb 13 09:55:07.949336 kubelet[2572]: I0213 09:55:07.949170 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-dm75n" podStartSLOduration=2.509515633 podCreationTimestamp="2024-02-13 09:55:03 +0000 UTC" firstStartedPulling="2024-02-13 09:55:04.575445892 +0000 UTC m=+14.744229617" lastFinishedPulling="2024-02-13 09:55:07.015008566 +0000 UTC m=+17.183792358" observedRunningTime="2024-02-13 09:55:07.948684398 +0000 UTC m=+18.117468232" watchObservedRunningTime="2024-02-13 09:55:07.949078374 +0000 UTC m=+18.117862145" Feb 13 09:55:09.501000 audit[3045]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:09.501000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff07bc6400 a2=0 a3=7fff07bc63ec items=0 ppid=2846 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:09.503000 audit[3045]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:09.503000 audit[3045]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff07bc6400 a2=0 a3=31030 items=0 ppid=2846 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.503000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:09.526000 audit[3047]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:09.526000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff20526810 a2=0 a3=7fff205267fc items=0 ppid=2846 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:09.528000 audit[3047]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:09.528000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff20526810 a2=0 a3=31030 items=0 ppid=2846 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:09.634186 kubelet[2572]: I0213 09:55:09.634122 2572 topology_manager.go:215] "Topology Admit Handler" podUID="67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730" podNamespace="calico-system" podName="calico-typha-57fc489bd6-427xt" Feb 13 09:55:09.644505 systemd[1]: Created slice kubepods-besteffort-pod67c13f45_7bb1_4a5b_8ffb_7bb4b6f01730.slice. Feb 13 09:55:09.673475 kubelet[2572]: I0213 09:55:09.673452 2572 topology_manager.go:215] "Topology Admit Handler" podUID="0fb4da47-080a-4f93-8fde-ab08456e1d42" podNamespace="calico-system" podName="calico-node-d9897" Feb 13 09:55:09.677345 systemd[1]: Created slice kubepods-besteffort-pod0fb4da47_080a_4f93_8fde_ab08456e1d42.slice. Feb 13 09:55:09.720328 kubelet[2572]: I0213 09:55:09.720252 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730-typha-certs\") pod \"calico-typha-57fc489bd6-427xt\" (UID: \"67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730\") " pod="calico-system/calico-typha-57fc489bd6-427xt" Feb 13 09:55:09.720626 kubelet[2572]: I0213 09:55:09.720354 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-var-run-calico\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.720626 kubelet[2572]: I0213 09:55:09.720418 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-var-lib-calico\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.720626 kubelet[2572]: I0213 09:55:09.720538 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-cni-bin-dir\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.720985 kubelet[2572]: I0213 09:55:09.720752 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-72bkx\" (UniqueName: \"kubernetes.io/projected/0fb4da47-080a-4f93-8fde-ab08456e1d42-kube-api-access-72bkx\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.720985 kubelet[2572]: I0213 09:55:09.720883 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730-tigera-ca-bundle\") pod \"calico-typha-57fc489bd6-427xt\" (UID: \"67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730\") " pod="calico-system/calico-typha-57fc489bd6-427xt" Feb 13 09:55:09.720985 kubelet[2572]: I0213 09:55:09.720958 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-cni-net-dir\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721264 kubelet[2572]: I0213 09:55:09.721073 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-policysync\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721264 kubelet[2572]: I0213 09:55:09.721144 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-lib-modules\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721264 kubelet[2572]: I0213 09:55:09.721200 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-xtables-lock\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721535 kubelet[2572]: I0213 09:55:09.721328 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-cni-log-dir\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721535 kubelet[2572]: I0213 09:55:09.721428 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0fb4da47-080a-4f93-8fde-ab08456e1d42-tigera-ca-bundle\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721535 kubelet[2572]: I0213 09:55:09.721487 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0fb4da47-080a-4f93-8fde-ab08456e1d42-node-certs\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721793 kubelet[2572]: I0213 09:55:09.721558 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0fb4da47-080a-4f93-8fde-ab08456e1d42-flexvol-driver-host\") pod \"calico-node-d9897\" (UID: \"0fb4da47-080a-4f93-8fde-ab08456e1d42\") " pod="calico-system/calico-node-d9897" Feb 13 09:55:09.721793 kubelet[2572]: I0213 09:55:09.721620 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2rpp5\" (UniqueName: \"kubernetes.io/projected/67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730-kube-api-access-2rpp5\") pod \"calico-typha-57fc489bd6-427xt\" (UID: \"67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730\") " pod="calico-system/calico-typha-57fc489bd6-427xt" Feb 13 09:55:09.804818 kubelet[2572]: I0213 09:55:09.804632 2572 topology_manager.go:215] "Topology Admit Handler" podUID="25321284-19a1-4fad-84b5-db985c324966" podNamespace="calico-system" podName="csi-node-driver-w8rcv" Feb 13 09:55:09.805693 kubelet[2572]: E0213 09:55:09.805629 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:09.822395 kubelet[2572]: I0213 09:55:09.822289 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/25321284-19a1-4fad-84b5-db985c324966-varrun\") pod \"csi-node-driver-w8rcv\" (UID: \"25321284-19a1-4fad-84b5-db985c324966\") " pod="calico-system/csi-node-driver-w8rcv" Feb 13 09:55:09.822862 kubelet[2572]: I0213 09:55:09.822797 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/25321284-19a1-4fad-84b5-db985c324966-socket-dir\") pod \"csi-node-driver-w8rcv\" (UID: \"25321284-19a1-4fad-84b5-db985c324966\") " pod="calico-system/csi-node-driver-w8rcv" Feb 13 09:55:09.824101 kubelet[2572]: I0213 09:55:09.824008 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/25321284-19a1-4fad-84b5-db985c324966-registration-dir\") pod \"csi-node-driver-w8rcv\" (UID: \"25321284-19a1-4fad-84b5-db985c324966\") " pod="calico-system/csi-node-driver-w8rcv" Feb 13 09:55:09.825428 kubelet[2572]: I0213 09:55:09.825361 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/25321284-19a1-4fad-84b5-db985c324966-kubelet-dir\") pod \"csi-node-driver-w8rcv\" (UID: \"25321284-19a1-4fad-84b5-db985c324966\") " pod="calico-system/csi-node-driver-w8rcv" Feb 13 09:55:09.826145 kubelet[2572]: I0213 09:55:09.826066 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-95w8m\" (UniqueName: \"kubernetes.io/projected/25321284-19a1-4fad-84b5-db985c324966-kube-api-access-95w8m\") pod \"csi-node-driver-w8rcv\" (UID: \"25321284-19a1-4fad-84b5-db985c324966\") " pod="calico-system/csi-node-driver-w8rcv" Feb 13 09:55:09.837503 kubelet[2572]: E0213 09:55:09.837469 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.837503 kubelet[2572]: W0213 09:55:09.837497 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.837711 kubelet[2572]: E0213 09:55:09.837532 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.837982 kubelet[2572]: E0213 09:55:09.837961 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.838041 kubelet[2572]: W0213 09:55:09.837984 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.838041 kubelet[2572]: E0213 09:55:09.838015 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.838268 kubelet[2572]: E0213 09:55:09.838246 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.838268 kubelet[2572]: W0213 09:55:09.838258 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.838399 kubelet[2572]: E0213 09:55:09.838331 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.838495 kubelet[2572]: E0213 09:55:09.838455 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.838495 kubelet[2572]: W0213 09:55:09.838470 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.838640 kubelet[2572]: E0213 09:55:09.838534 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.838713 kubelet[2572]: E0213 09:55:09.838660 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.838713 kubelet[2572]: W0213 09:55:09.838673 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.838713 kubelet[2572]: E0213 09:55:09.838696 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.838923 kubelet[2572]: E0213 09:55:09.838840 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.838923 kubelet[2572]: W0213 09:55:09.838869 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.838923 kubelet[2572]: E0213 09:55:09.838885 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.839124 kubelet[2572]: E0213 09:55:09.839107 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.839124 kubelet[2572]: W0213 09:55:09.839117 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.839240 kubelet[2572]: E0213 09:55:09.839131 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.840722 kubelet[2572]: E0213 09:55:09.840700 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.840722 kubelet[2572]: W0213 09:55:09.840714 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.840908 kubelet[2572]: E0213 09:55:09.840734 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.842041 kubelet[2572]: E0213 09:55:09.841996 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.842041 kubelet[2572]: W0213 09:55:09.842011 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.842041 kubelet[2572]: E0213 09:55:09.842032 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.842336 kubelet[2572]: E0213 09:55:09.842296 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.842336 kubelet[2572]: W0213 09:55:09.842311 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.842336 kubelet[2572]: E0213 09:55:09.842330 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.927359 kubelet[2572]: E0213 09:55:09.927341 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.927359 kubelet[2572]: W0213 09:55:09.927353 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.927498 kubelet[2572]: E0213 09:55:09.927370 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.927544 kubelet[2572]: E0213 09:55:09.927536 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.927544 kubelet[2572]: W0213 09:55:09.927543 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.927599 kubelet[2572]: E0213 09:55:09.927554 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.927706 kubelet[2572]: E0213 09:55:09.927699 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.927733 kubelet[2572]: W0213 09:55:09.927706 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.927733 kubelet[2572]: E0213 09:55:09.927717 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.927837 kubelet[2572]: E0213 09:55:09.927830 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.927837 kubelet[2572]: W0213 09:55:09.927836 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.927899 kubelet[2572]: E0213 09:55:09.927858 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.927965 kubelet[2572]: E0213 09:55:09.927958 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.927991 kubelet[2572]: W0213 09:55:09.927965 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.927991 kubelet[2572]: E0213 09:55:09.927975 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928102 kubelet[2572]: E0213 09:55:09.928096 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928102 kubelet[2572]: W0213 09:55:09.928102 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928154 kubelet[2572]: E0213 09:55:09.928111 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928243 kubelet[2572]: E0213 09:55:09.928237 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928270 kubelet[2572]: W0213 09:55:09.928242 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928270 kubelet[2572]: E0213 09:55:09.928253 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928356 kubelet[2572]: E0213 09:55:09.928350 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928384 kubelet[2572]: W0213 09:55:09.928356 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928384 kubelet[2572]: E0213 09:55:09.928365 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928476 kubelet[2572]: E0213 09:55:09.928469 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928503 kubelet[2572]: W0213 09:55:09.928475 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928503 kubelet[2572]: E0213 09:55:09.928485 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928674 kubelet[2572]: E0213 09:55:09.928663 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928674 kubelet[2572]: W0213 09:55:09.928673 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928742 kubelet[2572]: E0213 09:55:09.928687 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928807 kubelet[2572]: E0213 09:55:09.928800 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928834 kubelet[2572]: W0213 09:55:09.928807 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928834 kubelet[2572]: E0213 09:55:09.928830 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.928925 kubelet[2572]: E0213 09:55:09.928918 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.928925 kubelet[2572]: W0213 09:55:09.928924 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.928974 kubelet[2572]: E0213 09:55:09.928944 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929037 kubelet[2572]: E0213 09:55:09.929031 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929063 kubelet[2572]: W0213 09:55:09.929037 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929063 kubelet[2572]: E0213 09:55:09.929056 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929149 kubelet[2572]: E0213 09:55:09.929142 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929176 kubelet[2572]: W0213 09:55:09.929149 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929176 kubelet[2572]: E0213 09:55:09.929164 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929260 kubelet[2572]: E0213 09:55:09.929253 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929288 kubelet[2572]: W0213 09:55:09.929260 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929288 kubelet[2572]: E0213 09:55:09.929270 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929405 kubelet[2572]: E0213 09:55:09.929398 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929433 kubelet[2572]: W0213 09:55:09.929406 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929433 kubelet[2572]: E0213 09:55:09.929418 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929538 kubelet[2572]: E0213 09:55:09.929531 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929565 kubelet[2572]: W0213 09:55:09.929538 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929565 kubelet[2572]: E0213 09:55:09.929550 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929680 kubelet[2572]: E0213 09:55:09.929673 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929680 kubelet[2572]: W0213 09:55:09.929679 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929728 kubelet[2572]: E0213 09:55:09.929689 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929853 kubelet[2572]: E0213 09:55:09.929838 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929853 kubelet[2572]: W0213 09:55:09.929849 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.929924 kubelet[2572]: E0213 09:55:09.929861 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.929962 kubelet[2572]: E0213 09:55:09.929955 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.929962 kubelet[2572]: W0213 09:55:09.929961 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.930011 kubelet[2572]: E0213 09:55:09.929970 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.930124 kubelet[2572]: E0213 09:55:09.930117 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.930154 kubelet[2572]: W0213 09:55:09.930124 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.930154 kubelet[2572]: E0213 09:55:09.930133 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.930249 kubelet[2572]: E0213 09:55:09.930242 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.930276 kubelet[2572]: W0213 09:55:09.930249 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.930276 kubelet[2572]: E0213 09:55:09.930260 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.930384 kubelet[2572]: E0213 09:55:09.930377 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.930413 kubelet[2572]: W0213 09:55:09.930384 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.930413 kubelet[2572]: E0213 09:55:09.930397 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.930507 kubelet[2572]: E0213 09:55:09.930500 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.930507 kubelet[2572]: W0213 09:55:09.930506 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.930560 kubelet[2572]: E0213 09:55:09.930515 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.930674 kubelet[2572]: E0213 09:55:09.930666 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.930674 kubelet[2572]: W0213 09:55:09.930673 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.930729 kubelet[2572]: E0213 09:55:09.930681 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.935681 kubelet[2572]: E0213 09:55:09.935667 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:09.935681 kubelet[2572]: W0213 09:55:09.935678 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:09.935773 kubelet[2572]: E0213 09:55:09.935692 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:09.947149 env[1474]: time="2024-02-13T09:55:09.947121952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57fc489bd6-427xt,Uid:67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730,Namespace:calico-system,Attempt:0,}" Feb 13 09:55:09.955531 env[1474]: time="2024-02-13T09:55:09.955483578Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:55:09.955531 env[1474]: time="2024-02-13T09:55:09.955517255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:55:09.955531 env[1474]: time="2024-02-13T09:55:09.955527486Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:55:09.955693 env[1474]: time="2024-02-13T09:55:09.955622167Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43f3f2de236112b94ea55f1ac0cc2e674a68074688ac75b66c3641c90cd28114 pid=3098 runtime=io.containerd.runc.v2 Feb 13 09:55:09.963328 systemd[1]: Started cri-containerd-43f3f2de236112b94ea55f1ac0cc2e674a68074688ac75b66c3641c90cd28114.scope. Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit: BPF prog-id=124 op=LOAD Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433663366326465323336313132623934656135356631616330636332 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433663366326465323336313132623934656135356631616330636332 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit: BPF prog-id=125 op=LOAD Feb 13 09:55:09.971000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000301850 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433663366326465323336313132623934656135356631616330636332 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit: BPF prog-id=126 op=LOAD Feb 13 09:55:09.971000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000301898 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433663366326465323336313132623934656135356631616330636332 Feb 13 09:55:09.971000 audit: BPF prog-id=126 op=UNLOAD Feb 13 09:55:09.971000 audit: BPF prog-id=125 op=UNLOAD Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:09.971000 audit: BPF prog-id=127 op=LOAD Feb 13 09:55:09.971000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000301ca8 items=0 ppid=3098 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:09.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433663366326465323336313132623934656135356631616330636332 Feb 13 09:55:09.980078 env[1474]: time="2024-02-13T09:55:09.980048848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d9897,Uid:0fb4da47-080a-4f93-8fde-ab08456e1d42,Namespace:calico-system,Attempt:0,}" Feb 13 09:55:09.988082 env[1474]: time="2024-02-13T09:55:09.988035872Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 09:55:09.988082 env[1474]: time="2024-02-13T09:55:09.988066945Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 09:55:09.988082 env[1474]: time="2024-02-13T09:55:09.988077269Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 09:55:09.988281 env[1474]: time="2024-02-13T09:55:09.988180266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e pid=3132 runtime=io.containerd.runc.v2 Feb 13 09:55:09.996002 env[1474]: time="2024-02-13T09:55:09.995962702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57fc489bd6-427xt,Uid:67c13f45-7bb1-4a5b-8ffb-7bb4b6f01730,Namespace:calico-system,Attempt:0,} returns sandbox id \"43f3f2de236112b94ea55f1ac0cc2e674a68074688ac75b66c3641c90cd28114\"" Feb 13 09:55:09.996012 systemd[1]: Started cri-containerd-3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e.scope. Feb 13 09:55:09.997013 env[1474]: time="2024-02-13T09:55:09.996992467Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit: BPF prog-id=128 op=LOAD Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3132 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633363643031623364633265326265313431646435633636383937 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3132 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633363643031623364633265326265313431646435633636383937 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit: BPF prog-id=129 op=LOAD Feb 13 09:55:10.003000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028a7c0 items=0 ppid=3132 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633363643031623364633265326265313431646435633636383937 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit: BPF prog-id=130 op=LOAD Feb 13 09:55:10.003000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028a808 items=0 ppid=3132 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633363643031623364633265326265313431646435633636383937 Feb 13 09:55:10.003000 audit: BPF prog-id=130 op=UNLOAD Feb 13 09:55:10.003000 audit: BPF prog-id=129 op=UNLOAD Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { perfmon } for pid=3141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit[3141]: AVC avc: denied { bpf } for pid=3141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:10.003000 audit: BPF prog-id=131 op=LOAD Feb 13 09:55:10.003000 audit[3141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028ac18 items=0 ppid=3132 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361633363643031623364633265326265313431646435633636383937 Feb 13 09:55:10.009437 env[1474]: time="2024-02-13T09:55:10.009397705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d9897,Uid:0fb4da47-080a-4f93-8fde-ab08456e1d42,Namespace:calico-system,Attempt:0,} returns sandbox id \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\"" Feb 13 09:55:10.553000 audit[3172]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=3172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:10.553000 audit[3172]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcb2f91ec0 a2=0 a3=7ffcb2f91eac items=0 ppid=2846 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.553000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:10.554000 audit[3172]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3172 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:10.554000 audit[3172]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcb2f91ec0 a2=0 a3=31030 items=0 ppid=2846 pid=3172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:10.554000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:11.885464 kubelet[2572]: E0213 09:55:11.885376 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:13.885316 kubelet[2572]: E0213 09:55:13.885230 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:14.191989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3899862845.mount: Deactivated successfully. Feb 13 09:55:15.884949 kubelet[2572]: E0213 09:55:15.884857 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:17.885119 kubelet[2572]: E0213 09:55:17.885057 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:19.885158 kubelet[2572]: E0213 09:55:19.885065 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:20.624219 env[1474]: time="2024-02-13T09:55:20.624174455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:20.624852 env[1474]: time="2024-02-13T09:55:20.624807930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:20.626043 env[1474]: time="2024-02-13T09:55:20.626001550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:20.627444 env[1474]: time="2024-02-13T09:55:20.627422111Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:20.628834 env[1474]: time="2024-02-13T09:55:20.628819081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 13 09:55:20.629258 env[1474]: time="2024-02-13T09:55:20.629232110Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 13 09:55:20.633250 env[1474]: time="2024-02-13T09:55:20.633174080Z" level=info msg="CreateContainer within sandbox \"43f3f2de236112b94ea55f1ac0cc2e674a68074688ac75b66c3641c90cd28114\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 13 09:55:20.637794 env[1474]: time="2024-02-13T09:55:20.637750045Z" level=info msg="CreateContainer within sandbox \"43f3f2de236112b94ea55f1ac0cc2e674a68074688ac75b66c3641c90cd28114\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"2689f84399f7d99cfd8dd78a21fb89ed3b50ffda434d189dd4add57d85a09428\"" Feb 13 09:55:20.638054 env[1474]: time="2024-02-13T09:55:20.638007808Z" level=info msg="StartContainer for \"2689f84399f7d99cfd8dd78a21fb89ed3b50ffda434d189dd4add57d85a09428\"" Feb 13 09:55:20.646381 systemd[1]: Started cri-containerd-2689f84399f7d99cfd8dd78a21fb89ed3b50ffda434d189dd4add57d85a09428.scope. Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.681635 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 13 09:55:20.681733 kernel: audit: type=1400 audit(1707818120.652:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809829 kernel: audit: type=1400 audit(1707818120.652:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809926 kernel: audit: type=1400 audit(1707818120.652:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.939211 kernel: audit: type=1400 audit(1707818120.652:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.939244 kernel: audit: type=1400 audit(1707818120.652:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:21.067925 kernel: audit: type=1400 audit(1707818120.652:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:21.067952 kernel: audit: type=1400 audit(1707818120.652:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:21.196728 kernel: audit: type=1400 audit(1707818120.652:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:21.196769 kernel: audit: type=1400 audit(1707818120.652:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:21.260896 kernel: audit: type=1400 audit(1707818120.744:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.744000 audit: BPF prog-id=132 op=LOAD Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3098 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:20.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383966383433393966376439396366643864643738613231666238 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3098 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:20.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383966383433393966376439396366643864643738613231666238 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.745000 audit: BPF prog-id=133 op=LOAD Feb 13 09:55:20.745000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00032d8c0 items=0 ppid=3098 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:20.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383966383433393966376439396366643864643738613231666238 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.809000 audit: BPF prog-id=134 op=LOAD Feb 13 09:55:20.809000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00032d908 items=0 ppid=3098 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:20.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383966383433393966376439396366643864643738613231666238 Feb 13 09:55:20.874000 audit: BPF prog-id=134 op=UNLOAD Feb 13 09:55:20.874000 audit: BPF prog-id=133 op=UNLOAD Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { perfmon } for pid=3183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit[3183]: AVC avc: denied { bpf } for pid=3183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:20.874000 audit: BPF prog-id=135 op=LOAD Feb 13 09:55:20.874000 audit[3183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00032dd18 items=0 ppid=3098 pid=3183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:20.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236383966383433393966376439396366643864643738613231666238 Feb 13 09:55:21.344372 env[1474]: time="2024-02-13T09:55:21.344316700Z" level=info msg="StartContainer for \"2689f84399f7d99cfd8dd78a21fb89ed3b50ffda434d189dd4add57d85a09428\" returns successfully" Feb 13 09:55:21.884635 kubelet[2572]: E0213 09:55:21.884537 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:21.994748 kubelet[2572]: I0213 09:55:21.994730 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-57fc489bd6-427xt" podStartSLOduration=2.3623766379999998 podCreationTimestamp="2024-02-13 09:55:09 +0000 UTC" firstStartedPulling="2024-02-13 09:55:09.996735413 +0000 UTC m=+20.165519146" lastFinishedPulling="2024-02-13 09:55:20.629060707 +0000 UTC m=+30.797844432" observedRunningTime="2024-02-13 09:55:21.994242354 +0000 UTC m=+32.163026080" watchObservedRunningTime="2024-02-13 09:55:21.994701924 +0000 UTC m=+32.163485647" Feb 13 09:55:22.013130 kubelet[2572]: E0213 09:55:22.013108 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.013130 kubelet[2572]: W0213 09:55:22.013117 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.013130 kubelet[2572]: E0213 09:55:22.013128 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.013302 kubelet[2572]: E0213 09:55:22.013272 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.013302 kubelet[2572]: W0213 09:55:22.013279 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.013302 kubelet[2572]: E0213 09:55:22.013288 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.013475 kubelet[2572]: E0213 09:55:22.013448 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.013475 kubelet[2572]: W0213 09:55:22.013455 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.013475 kubelet[2572]: E0213 09:55:22.013464 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.013644 kubelet[2572]: E0213 09:55:22.013621 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.013644 kubelet[2572]: W0213 09:55:22.013628 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.013644 kubelet[2572]: E0213 09:55:22.013636 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.013769 kubelet[2572]: E0213 09:55:22.013763 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.013769 kubelet[2572]: W0213 09:55:22.013769 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.013822 kubelet[2572]: E0213 09:55:22.013776 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.013916 kubelet[2572]: E0213 09:55:22.013868 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.013916 kubelet[2572]: W0213 09:55:22.013873 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.013916 kubelet[2572]: E0213 09:55:22.013881 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014012 kubelet[2572]: E0213 09:55:22.013987 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014012 kubelet[2572]: W0213 09:55:22.013991 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014012 kubelet[2572]: E0213 09:55:22.013999 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014114 kubelet[2572]: E0213 09:55:22.014108 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014114 kubelet[2572]: W0213 09:55:22.014113 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014172 kubelet[2572]: E0213 09:55:22.014119 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014201 kubelet[2572]: E0213 09:55:22.014192 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014201 kubelet[2572]: W0213 09:55:22.014196 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014251 kubelet[2572]: E0213 09:55:22.014202 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014276 kubelet[2572]: E0213 09:55:22.014267 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014276 kubelet[2572]: W0213 09:55:22.014271 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014276 kubelet[2572]: E0213 09:55:22.014277 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014349 kubelet[2572]: E0213 09:55:22.014343 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014349 kubelet[2572]: W0213 09:55:22.014348 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014402 kubelet[2572]: E0213 09:55:22.014354 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014428 kubelet[2572]: E0213 09:55:22.014419 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014428 kubelet[2572]: W0213 09:55:22.014423 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014475 kubelet[2572]: E0213 09:55:22.014429 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014499 kubelet[2572]: E0213 09:55:22.014495 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014526 kubelet[2572]: W0213 09:55:22.014499 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014526 kubelet[2572]: E0213 09:55:22.014506 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014577 kubelet[2572]: E0213 09:55:22.014572 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014577 kubelet[2572]: W0213 09:55:22.014577 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014628 kubelet[2572]: E0213 09:55:22.014583 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.014653 kubelet[2572]: E0213 09:55:22.014648 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.014677 kubelet[2572]: W0213 09:55:22.014653 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.014677 kubelet[2572]: E0213 09:55:22.014659 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.021077 kubelet[2572]: E0213 09:55:22.021065 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.021077 kubelet[2572]: W0213 09:55:22.021074 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.021177 kubelet[2572]: E0213 09:55:22.021088 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.021308 kubelet[2572]: E0213 09:55:22.021296 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.021308 kubelet[2572]: W0213 09:55:22.021306 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.021408 kubelet[2572]: E0213 09:55:22.021324 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.021529 kubelet[2572]: E0213 09:55:22.021483 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.021529 kubelet[2572]: W0213 09:55:22.021492 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.021529 kubelet[2572]: E0213 09:55:22.021505 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.021641 kubelet[2572]: E0213 09:55:22.021635 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.021675 kubelet[2572]: W0213 09:55:22.021641 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.021675 kubelet[2572]: E0213 09:55:22.021651 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.021749 kubelet[2572]: E0213 09:55:22.021743 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.021749 kubelet[2572]: W0213 09:55:22.021749 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.021808 kubelet[2572]: E0213 09:55:22.021758 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.021888 kubelet[2572]: E0213 09:55:22.021880 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.021888 kubelet[2572]: W0213 09:55:22.021886 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.021952 kubelet[2572]: E0213 09:55:22.021896 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022094 kubelet[2572]: E0213 09:55:22.022085 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022131 kubelet[2572]: W0213 09:55:22.022094 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022131 kubelet[2572]: E0213 09:55:22.022107 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022284 kubelet[2572]: E0213 09:55:22.022250 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022284 kubelet[2572]: W0213 09:55:22.022256 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022284 kubelet[2572]: E0213 09:55:22.022266 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022374 kubelet[2572]: E0213 09:55:22.022362 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022374 kubelet[2572]: W0213 09:55:22.022368 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022436 kubelet[2572]: E0213 09:55:22.022377 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022470 kubelet[2572]: E0213 09:55:22.022457 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022470 kubelet[2572]: W0213 09:55:22.022462 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022532 kubelet[2572]: E0213 09:55:22.022476 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022563 kubelet[2572]: E0213 09:55:22.022554 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022563 kubelet[2572]: W0213 09:55:22.022559 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022632 kubelet[2572]: E0213 09:55:22.022593 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022669 kubelet[2572]: E0213 09:55:22.022662 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022669 kubelet[2572]: W0213 09:55:22.022668 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022726 kubelet[2572]: E0213 09:55:22.022677 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.022778 kubelet[2572]: E0213 09:55:22.022772 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.022778 kubelet[2572]: W0213 09:55:22.022778 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.022833 kubelet[2572]: E0213 09:55:22.022788 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.023219 kubelet[2572]: E0213 09:55:22.023177 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.023219 kubelet[2572]: W0213 09:55:22.023193 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.023219 kubelet[2572]: E0213 09:55:22.023215 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.023428 kubelet[2572]: E0213 09:55:22.023412 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.023478 kubelet[2572]: W0213 09:55:22.023428 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.023478 kubelet[2572]: E0213 09:55:22.023451 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.023951 kubelet[2572]: E0213 09:55:22.023630 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.023951 kubelet[2572]: W0213 09:55:22.023647 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.023951 kubelet[2572]: E0213 09:55:22.023669 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.024094 kubelet[2572]: E0213 09:55:22.024016 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.024094 kubelet[2572]: W0213 09:55:22.024031 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.024094 kubelet[2572]: E0213 09:55:22.024050 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.024373 kubelet[2572]: E0213 09:55:22.024353 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:22.024373 kubelet[2572]: W0213 09:55:22.024364 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:22.024373 kubelet[2572]: E0213 09:55:22.024376 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:22.982885 kubelet[2572]: I0213 09:55:22.982787 2572 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 13 09:55:23.023428 kubelet[2572]: E0213 09:55:23.023326 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.023428 kubelet[2572]: W0213 09:55:23.023371 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.023428 kubelet[2572]: E0213 09:55:23.023424 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.024031 kubelet[2572]: E0213 09:55:23.023947 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.024031 kubelet[2572]: W0213 09:55:23.023973 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.024031 kubelet[2572]: E0213 09:55:23.024006 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.024555 kubelet[2572]: E0213 09:55:23.024470 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.024555 kubelet[2572]: W0213 09:55:23.024500 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.024555 kubelet[2572]: E0213 09:55:23.024536 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.025090 kubelet[2572]: E0213 09:55:23.025053 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.025090 kubelet[2572]: W0213 09:55:23.025086 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.025282 kubelet[2572]: E0213 09:55:23.025124 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.025710 kubelet[2572]: E0213 09:55:23.025625 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.025710 kubelet[2572]: W0213 09:55:23.025656 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.025710 kubelet[2572]: E0213 09:55:23.025692 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.026285 kubelet[2572]: E0213 09:55:23.026209 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.026285 kubelet[2572]: W0213 09:55:23.026240 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.026285 kubelet[2572]: E0213 09:55:23.026277 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.026731 kubelet[2572]: E0213 09:55:23.026704 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.026731 kubelet[2572]: W0213 09:55:23.026728 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.026973 kubelet[2572]: E0213 09:55:23.026760 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.027280 kubelet[2572]: E0213 09:55:23.027204 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.027280 kubelet[2572]: W0213 09:55:23.027235 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.027280 kubelet[2572]: E0213 09:55:23.027272 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.027727 kubelet[2572]: E0213 09:55:23.027700 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.027727 kubelet[2572]: W0213 09:55:23.027724 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.027963 kubelet[2572]: E0213 09:55:23.027757 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.028294 kubelet[2572]: E0213 09:55:23.028218 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.028294 kubelet[2572]: W0213 09:55:23.028249 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.028294 kubelet[2572]: E0213 09:55:23.028285 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.028765 kubelet[2572]: E0213 09:55:23.028738 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.028898 kubelet[2572]: W0213 09:55:23.028766 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.028898 kubelet[2572]: E0213 09:55:23.028799 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.029283 kubelet[2572]: E0213 09:55:23.029219 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.029283 kubelet[2572]: W0213 09:55:23.029242 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.029283 kubelet[2572]: E0213 09:55:23.029270 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.029691 kubelet[2572]: E0213 09:55:23.029667 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.029691 kubelet[2572]: W0213 09:55:23.029689 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.029922 kubelet[2572]: E0213 09:55:23.029718 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.030150 kubelet[2572]: E0213 09:55:23.030086 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.030150 kubelet[2572]: W0213 09:55:23.030107 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.030150 kubelet[2572]: E0213 09:55:23.030136 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.030525 kubelet[2572]: E0213 09:55:23.030473 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.030525 kubelet[2572]: W0213 09:55:23.030493 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.030525 kubelet[2572]: E0213 09:55:23.030520 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.031119 kubelet[2572]: E0213 09:55:23.031034 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.031119 kubelet[2572]: W0213 09:55:23.031065 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.031119 kubelet[2572]: E0213 09:55:23.031102 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.031664 kubelet[2572]: E0213 09:55:23.031615 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.031664 kubelet[2572]: W0213 09:55:23.031639 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.031935 kubelet[2572]: E0213 09:55:23.031678 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.032255 kubelet[2572]: E0213 09:55:23.032174 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.032255 kubelet[2572]: W0213 09:55:23.032206 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.032255 kubelet[2572]: E0213 09:55:23.032253 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.032734 kubelet[2572]: E0213 09:55:23.032701 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.032839 kubelet[2572]: W0213 09:55:23.032735 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.032839 kubelet[2572]: E0213 09:55:23.032781 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.033304 kubelet[2572]: E0213 09:55:23.033252 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.033304 kubelet[2572]: W0213 09:55:23.033284 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.033503 kubelet[2572]: E0213 09:55:23.033406 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.033734 kubelet[2572]: E0213 09:55:23.033709 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.033842 kubelet[2572]: W0213 09:55:23.033734 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.034009 kubelet[2572]: E0213 09:55:23.033860 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.034282 kubelet[2572]: E0213 09:55:23.034226 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.034282 kubelet[2572]: W0213 09:55:23.034257 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.034478 kubelet[2572]: E0213 09:55:23.034359 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.034791 kubelet[2572]: E0213 09:55:23.034765 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.034945 kubelet[2572]: W0213 09:55:23.034791 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.034945 kubelet[2572]: E0213 09:55:23.034834 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.035303 kubelet[2572]: E0213 09:55:23.035276 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.035403 kubelet[2572]: W0213 09:55:23.035304 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.035403 kubelet[2572]: E0213 09:55:23.035354 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.035740 kubelet[2572]: E0213 09:55:23.035718 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.035865 kubelet[2572]: W0213 09:55:23.035740 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.035865 kubelet[2572]: E0213 09:55:23.035774 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.036237 kubelet[2572]: E0213 09:55:23.036166 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.036237 kubelet[2572]: W0213 09:55:23.036190 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.036520 kubelet[2572]: E0213 09:55:23.036300 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.036622 kubelet[2572]: E0213 09:55:23.036600 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.036714 kubelet[2572]: W0213 09:55:23.036621 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.036714 kubelet[2572]: E0213 09:55:23.036701 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.037089 kubelet[2572]: E0213 09:55:23.037019 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.037089 kubelet[2572]: W0213 09:55:23.037040 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.037355 kubelet[2572]: E0213 09:55:23.037151 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.037474 kubelet[2572]: E0213 09:55:23.037445 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.037474 kubelet[2572]: W0213 09:55:23.037469 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.037687 kubelet[2572]: E0213 09:55:23.037507 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.038154 kubelet[2572]: E0213 09:55:23.038078 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.038154 kubelet[2572]: W0213 09:55:23.038109 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.038154 kubelet[2572]: E0213 09:55:23.038146 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.038648 kubelet[2572]: E0213 09:55:23.038618 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.038648 kubelet[2572]: W0213 09:55:23.038644 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.038883 kubelet[2572]: E0213 09:55:23.038687 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.039244 kubelet[2572]: E0213 09:55:23.039173 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.039244 kubelet[2572]: W0213 09:55:23.039197 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.039244 kubelet[2572]: E0213 09:55:23.039236 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.039664 kubelet[2572]: E0213 09:55:23.039638 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:23.039664 kubelet[2572]: W0213 09:55:23.039660 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:23.039898 kubelet[2572]: E0213 09:55:23.039688 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:23.884911 kubelet[2572]: E0213 09:55:23.884807 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:24.136510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4133609905.mount: Deactivated successfully. Feb 13 09:55:25.885418 kubelet[2572]: E0213 09:55:25.885301 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:27.884534 kubelet[2572]: E0213 09:55:27.884487 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:28.900883 kubelet[2572]: I0213 09:55:28.900763 2572 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 13 09:55:28.914000 audit[3295]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3295 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:28.942498 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 13 09:55:28.942551 kernel: audit: type=1325 audit(1707818128.914:1122): table=filter:95 family=2 entries=15 op=nft_register_rule pid=3295 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:28.971451 kubelet[2572]: E0213 09:55:28.971440 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.971451 kubelet[2572]: W0213 09:55:28.971448 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.971525 kubelet[2572]: E0213 09:55:28.971459 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.971661 kubelet[2572]: E0213 09:55:28.971596 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.971661 kubelet[2572]: W0213 09:55:28.971623 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.971661 kubelet[2572]: E0213 09:55:28.971630 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.971771 kubelet[2572]: E0213 09:55:28.971762 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.971771 kubelet[2572]: W0213 09:55:28.971766 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.971771 kubelet[2572]: E0213 09:55:28.971771 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.971835 kubelet[2572]: E0213 09:55:28.971830 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.971835 kubelet[2572]: W0213 09:55:28.971835 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.971899 kubelet[2572]: E0213 09:55:28.971840 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972153 kubelet[2572]: E0213 09:55:28.972087 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972153 kubelet[2572]: W0213 09:55:28.972093 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972153 kubelet[2572]: E0213 09:55:28.972121 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972226 kubelet[2572]: E0213 09:55:28.972211 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972226 kubelet[2572]: W0213 09:55:28.972216 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972226 kubelet[2572]: E0213 09:55:28.972222 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972287 kubelet[2572]: E0213 09:55:28.972282 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972287 kubelet[2572]: W0213 09:55:28.972286 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972329 kubelet[2572]: E0213 09:55:28.972292 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972420 kubelet[2572]: E0213 09:55:28.972354 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972420 kubelet[2572]: W0213 09:55:28.972358 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972420 kubelet[2572]: E0213 09:55:28.972364 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972534 kubelet[2572]: E0213 09:55:28.972531 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972570 kubelet[2572]: W0213 09:55:28.972535 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972570 kubelet[2572]: E0213 09:55:28.972541 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972611 kubelet[2572]: E0213 09:55:28.972608 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972629 kubelet[2572]: W0213 09:55:28.972612 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972629 kubelet[2572]: E0213 09:55:28.972617 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972686 kubelet[2572]: E0213 09:55:28.972681 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972686 kubelet[2572]: W0213 09:55:28.972685 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972724 kubelet[2572]: E0213 09:55:28.972690 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972769 kubelet[2572]: E0213 09:55:28.972745 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972790 kubelet[2572]: W0213 09:55:28.972770 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972790 kubelet[2572]: E0213 09:55:28.972777 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972839 kubelet[2572]: E0213 09:55:28.972835 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972881 kubelet[2572]: W0213 09:55:28.972839 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.972881 kubelet[2572]: E0213 09:55:28.972851 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.972985 kubelet[2572]: E0213 09:55:28.972981 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.972985 kubelet[2572]: W0213 09:55:28.972985 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973039 kubelet[2572]: E0213 09:55:28.972990 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973105 kubelet[2572]: E0213 09:55:28.973101 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973105 kubelet[2572]: W0213 09:55:28.973105 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973180 kubelet[2572]: E0213 09:55:28.973110 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973294 kubelet[2572]: E0213 09:55:28.973290 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973294 kubelet[2572]: W0213 09:55:28.973294 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973370 kubelet[2572]: E0213 09:55:28.973299 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973472 kubelet[2572]: E0213 09:55:28.973468 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973494 kubelet[2572]: W0213 09:55:28.973472 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973494 kubelet[2572]: E0213 09:55:28.973479 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973545 kubelet[2572]: E0213 09:55:28.973540 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973566 kubelet[2572]: W0213 09:55:28.973544 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973566 kubelet[2572]: E0213 09:55:28.973550 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973689 kubelet[2572]: E0213 09:55:28.973683 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973715 kubelet[2572]: W0213 09:55:28.973689 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973715 kubelet[2572]: E0213 09:55:28.973700 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973780 kubelet[2572]: E0213 09:55:28.973775 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973800 kubelet[2572]: W0213 09:55:28.973780 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973800 kubelet[2572]: E0213 09:55:28.973787 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.973853 kubelet[2572]: E0213 09:55:28.973849 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.973853 kubelet[2572]: W0213 09:55:28.973853 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.973917 kubelet[2572]: E0213 09:55:28.973881 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.974127 kubelet[2572]: E0213 09:55:28.974110 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.974148 kubelet[2572]: W0213 09:55:28.974131 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.974208 kubelet[2572]: E0213 09:55:28.974166 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.974393 kubelet[2572]: E0213 09:55:28.974379 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.974416 kubelet[2572]: W0213 09:55:28.974397 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.974452 kubelet[2572]: E0213 09:55:28.974445 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.974662 kubelet[2572]: E0213 09:55:28.974650 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.974683 kubelet[2572]: W0213 09:55:28.974665 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.974703 kubelet[2572]: E0213 09:55:28.974690 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.974972 kubelet[2572]: E0213 09:55:28.974930 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.974972 kubelet[2572]: W0213 09:55:28.974939 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.975064 kubelet[2572]: E0213 09:55:28.975026 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.975211 kubelet[2572]: E0213 09:55:28.975170 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.975211 kubelet[2572]: W0213 09:55:28.975207 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.975296 kubelet[2572]: E0213 09:55:28.975265 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.975484 kubelet[2572]: E0213 09:55:28.975456 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.975484 kubelet[2572]: W0213 09:55:28.975473 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.975562 kubelet[2572]: E0213 09:55:28.975514 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.975685 kubelet[2572]: E0213 09:55:28.975670 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.975708 kubelet[2572]: W0213 09:55:28.975688 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.975728 kubelet[2572]: E0213 09:55:28.975713 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.976014 kubelet[2572]: E0213 09:55:28.975973 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.976014 kubelet[2572]: W0213 09:55:28.975991 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.976086 kubelet[2572]: E0213 09:55:28.976035 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.976174 kubelet[2572]: E0213 09:55:28.976168 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.976215 kubelet[2572]: W0213 09:55:28.976174 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.976215 kubelet[2572]: E0213 09:55:28.976204 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.976376 kubelet[2572]: E0213 09:55:28.976372 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.976399 kubelet[2572]: W0213 09:55:28.976377 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.976399 kubelet[2572]: E0213 09:55:28.976383 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.976465 kubelet[2572]: E0213 09:55:28.976461 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.976529 kubelet[2572]: W0213 09:55:28.976465 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.976529 kubelet[2572]: E0213 09:55:28.976496 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.976829 kubelet[2572]: E0213 09:55:28.976825 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:28.976857 kubelet[2572]: W0213 09:55:28.976829 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:28.976857 kubelet[2572]: E0213 09:55:28.976835 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:28.914000 audit[3295]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc23378420 a2=0 a3=7ffc2337840c items=0 ppid=2846 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:29.074075 kubelet[2572]: E0213 09:55:29.074015 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074075 kubelet[2572]: W0213 09:55:29.074022 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074075 kubelet[2572]: E0213 09:55:29.074032 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074172 kubelet[2572]: E0213 09:55:29.074142 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074172 kubelet[2572]: W0213 09:55:29.074148 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074172 kubelet[2572]: E0213 09:55:29.074155 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074335 kubelet[2572]: E0213 09:55:29.074295 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074335 kubelet[2572]: W0213 09:55:29.074302 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074335 kubelet[2572]: E0213 09:55:29.074310 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074462 kubelet[2572]: E0213 09:55:29.074417 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074462 kubelet[2572]: W0213 09:55:29.074421 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074462 kubelet[2572]: E0213 09:55:29.074427 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074532 kubelet[2572]: E0213 09:55:29.074502 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074532 kubelet[2572]: W0213 09:55:29.074506 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074532 kubelet[2572]: E0213 09:55:29.074511 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074588 kubelet[2572]: E0213 09:55:29.074568 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074588 kubelet[2572]: W0213 09:55:29.074572 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074588 kubelet[2572]: E0213 09:55:29.074577 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074639 kubelet[2572]: E0213 09:55:29.074637 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074659 kubelet[2572]: W0213 09:55:29.074641 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074659 kubelet[2572]: E0213 09:55:29.074646 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074707 kubelet[2572]: E0213 09:55:29.074703 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074707 kubelet[2572]: W0213 09:55:29.074707 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074742 kubelet[2572]: E0213 09:55:29.074713 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074780 kubelet[2572]: E0213 09:55:29.074775 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074780 kubelet[2572]: W0213 09:55:29.074779 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074817 kubelet[2572]: E0213 09:55:29.074785 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074857 kubelet[2572]: E0213 09:55:29.074848 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074857 kubelet[2572]: W0213 09:55:29.074854 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074900 kubelet[2572]: E0213 09:55:29.074859 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.074934 kubelet[2572]: E0213 09:55:29.074930 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.074956 kubelet[2572]: W0213 09:55:29.074934 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.074956 kubelet[2572]: E0213 09:55:29.074940 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.075037 kubelet[2572]: E0213 09:55:29.075032 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.075037 kubelet[2572]: W0213 09:55:29.075036 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.075073 kubelet[2572]: E0213 09:55:29.075042 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.075105 kubelet[2572]: E0213 09:55:29.075101 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.075124 kubelet[2572]: W0213 09:55:29.075105 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.075124 kubelet[2572]: E0213 09:55:29.075110 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.075170 kubelet[2572]: E0213 09:55:29.075166 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.075170 kubelet[2572]: W0213 09:55:29.075170 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.075208 kubelet[2572]: E0213 09:55:29.075175 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.075234 kubelet[2572]: E0213 09:55:29.075230 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.075253 kubelet[2572]: W0213 09:55:29.075234 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.075253 kubelet[2572]: E0213 09:55:29.075239 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.102491 kernel: audit: type=1300 audit(1707818128.914:1122): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffc23378420 a2=0 a3=7ffc2337840c items=0 ppid=2846 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:29.102524 kernel: audit: type=1327 audit(1707818128.914:1122): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:28.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:29.172000 audit[3295]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3295 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:29.173991 kubelet[2572]: E0213 09:55:29.173982 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.173991 kubelet[2572]: W0213 09:55:29.173989 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.174049 kubelet[2572]: E0213 09:55:29.173999 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.174186 kubelet[2572]: E0213 09:55:29.174132 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.174186 kubelet[2572]: W0213 09:55:29.174138 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.174186 kubelet[2572]: E0213 09:55:29.174147 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.174397 kubelet[2572]: E0213 09:55:29.174353 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.174397 kubelet[2572]: W0213 09:55:29.174372 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.174397 kubelet[2572]: E0213 09:55:29.174394 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.174600 kubelet[2572]: E0213 09:55:29.174549 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.174600 kubelet[2572]: W0213 09:55:29.174561 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.174600 kubelet[2572]: E0213 09:55:29.174577 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.174703 kubelet[2572]: E0213 09:55:29.174695 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.174728 kubelet[2572]: W0213 09:55:29.174706 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.174728 kubelet[2572]: E0213 09:55:29.174725 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.174906 kubelet[2572]: E0213 09:55:29.174896 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.174933 kubelet[2572]: W0213 09:55:29.174906 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.174933 kubelet[2572]: E0213 09:55:29.174921 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.175081 kubelet[2572]: E0213 09:55:29.175047 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.175081 kubelet[2572]: W0213 09:55:29.175053 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.175081 kubelet[2572]: E0213 09:55:29.175061 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.175229 kubelet[2572]: E0213 09:55:29.175190 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.175229 kubelet[2572]: W0213 09:55:29.175202 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.175229 kubelet[2572]: E0213 09:55:29.175222 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.175397 kubelet[2572]: E0213 09:55:29.175362 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.175397 kubelet[2572]: W0213 09:55:29.175374 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.175397 kubelet[2572]: E0213 09:55:29.175390 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.175521 kubelet[2572]: E0213 09:55:29.175512 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.175545 kubelet[2572]: W0213 09:55:29.175524 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.175564 kubelet[2572]: E0213 09:55:29.175545 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.175684 kubelet[2572]: E0213 09:55:29.175674 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.175712 kubelet[2572]: W0213 09:55:29.175687 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.175712 kubelet[2572]: E0213 09:55:29.175703 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.175838 kubelet[2572]: E0213 09:55:29.175831 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.175863 kubelet[2572]: W0213 09:55:29.175841 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.175883 kubelet[2572]: E0213 09:55:29.175870 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.176005 kubelet[2572]: E0213 09:55:29.175996 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.176028 kubelet[2572]: W0213 09:55:29.176008 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.176028 kubelet[2572]: E0213 09:55:29.176024 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.176170 kubelet[2572]: E0213 09:55:29.176161 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.176189 kubelet[2572]: W0213 09:55:29.176175 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.176208 kubelet[2572]: E0213 09:55:29.176195 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.176323 kubelet[2572]: E0213 09:55:29.176318 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.176341 kubelet[2572]: W0213 09:55:29.176323 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.176341 kubelet[2572]: E0213 09:55:29.176331 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.176416 kubelet[2572]: E0213 09:55:29.176412 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.176437 kubelet[2572]: W0213 09:55:29.176416 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.176437 kubelet[2572]: E0213 09:55:29.176422 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.176619 kubelet[2572]: E0213 09:55:29.176610 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.176639 kubelet[2572]: W0213 09:55:29.176623 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.176659 kubelet[2572]: E0213 09:55:29.176639 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.176792 kubelet[2572]: E0213 09:55:29.176784 2572 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 09:55:29.176813 kubelet[2572]: W0213 09:55:29.176794 2572 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 09:55:29.176813 kubelet[2572]: E0213 09:55:29.176807 2572 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 09:55:29.172000 audit[3295]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc23378420 a2=0 a3=7ffc2337840c items=0 ppid=2846 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:29.331921 kernel: audit: type=1325 audit(1707818129.172:1123): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3295 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 09:55:29.331951 kernel: audit: type=1300 audit(1707818129.172:1123): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffc23378420 a2=0 a3=7ffc2337840c items=0 ppid=2846 pid=3295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:29.331964 kernel: audit: type=1327 audit(1707818129.172:1123): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:29.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 09:55:29.884628 kubelet[2572]: E0213 09:55:29.884610 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:31.884928 kubelet[2572]: E0213 09:55:31.884815 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:33.885321 kubelet[2572]: E0213 09:55:33.885246 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:35.884804 kubelet[2572]: E0213 09:55:35.884699 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:37.884515 kubelet[2572]: E0213 09:55:37.884411 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:39.884840 kubelet[2572]: E0213 09:55:39.884793 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:41.507362 env[1474]: time="2024-02-13T09:55:41.507297098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:41.509081 env[1474]: time="2024-02-13T09:55:41.509000852Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:41.512370 env[1474]: time="2024-02-13T09:55:41.512306885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:41.515391 env[1474]: time="2024-02-13T09:55:41.515321958Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 09:55:41.516921 env[1474]: time="2024-02-13T09:55:41.516863720Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 13 09:55:41.519567 env[1474]: time="2024-02-13T09:55:41.519496836Z" level=info msg="CreateContainer within sandbox \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 13 09:55:41.529497 env[1474]: time="2024-02-13T09:55:41.529418672Z" level=info msg="CreateContainer within sandbox \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645\"" Feb 13 09:55:41.530037 env[1474]: time="2024-02-13T09:55:41.529970439Z" level=info msg="StartContainer for \"e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645\"" Feb 13 09:55:41.554188 systemd[1]: Started cri-containerd-e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645.scope. Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f98bc73aa08 items=0 ppid=3132 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:41.735612 kernel: audit: type=1400 audit(1707818141.572:1124): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.735688 kernel: audit: type=1300 audit(1707818141.572:1124): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f98bc73aa08 items=0 ppid=3132 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:41.735706 kernel: audit: type=1327 audit(1707818141.572:1124): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383238653762373831393661383363323736636232386138323138 Feb 13 09:55:41.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383238653762373831393661383363323736636232386138323138 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.829851 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.884942 kubelet[2572]: E0213 09:55:41.884928 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.957829 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.957872 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:42.022206 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:42.027942 env[1474]: time="2024-02-13T09:55:42.027916348Z" level=info msg="StartContainer for \"e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645\" returns successfully" Feb 13 09:55:42.087007 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:42.087254 systemd[1]: cri-containerd-e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645.scope: Deactivated successfully. Feb 13 09:55:42.096470 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645-rootfs.mount: Deactivated successfully. Feb 13 09:55:42.151836 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:42.281576 kernel: audit: type=1400 audit(1707818141.572:1125): avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.572000 audit: BPF prog-id=136 op=LOAD Feb 13 09:55:41.572000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a8068 items=0 ppid=3132 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:41.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383238653762373831393661383363323736636232386138323138 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.734000 audit: BPF prog-id=137 op=LOAD Feb 13 09:55:41.734000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003a80b8 items=0 ppid=3132 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:41.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383238653762373831393661383363323736636232386138323138 Feb 13 09:55:41.828000 audit: BPF prog-id=137 op=UNLOAD Feb 13 09:55:41.828000 audit: BPF prog-id=136 op=UNLOAD Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 09:55:41.828000 audit: BPF prog-id=138 op=LOAD Feb 13 09:55:41.828000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003a8148 items=0 ppid=3132 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 09:55:41.828000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383238653762373831393661383363323736636232386138323138 Feb 13 09:55:42.284000 audit: BPF prog-id=138 op=UNLOAD Feb 13 09:55:42.357053 env[1474]: time="2024-02-13T09:55:42.356811297Z" level=info msg="shim disconnected" id=e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645 Feb 13 09:55:42.357053 env[1474]: time="2024-02-13T09:55:42.356948322Z" level=warning msg="cleaning up after shim disconnected" id=e2828e7b78196a83c276cb28a8218b4d8ef74f0427e5457bf429457ae7747645 namespace=k8s.io Feb 13 09:55:42.357053 env[1474]: time="2024-02-13T09:55:42.356991659Z" level=info msg="cleaning up dead shim" Feb 13 09:55:42.372208 env[1474]: time="2024-02-13T09:55:42.372123747Z" level=warning msg="cleanup warnings time=\"2024-02-13T09:55:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3415 runtime=io.containerd.runc.v2\n" Feb 13 09:55:43.038072 env[1474]: time="2024-02-13T09:55:43.037959758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 13 09:55:43.884599 kubelet[2572]: E0213 09:55:43.884434 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:45.884603 kubelet[2572]: E0213 09:55:45.884498 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:46.207000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.207000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.207000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fa41b0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:46.207000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000480080 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:46.207000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:46.207000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007d81bc0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:55:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:55:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007497bf0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:55:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:55:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00a9774c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:55:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:55:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007d81c20 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:55:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:55:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c007497c50 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:55:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:55:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c004b65d60 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:55:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:55:46.518436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3303775420.mount: Deactivated successfully. Feb 13 09:55:47.885466 kubelet[2572]: E0213 09:55:47.885372 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:49.884290 kubelet[2572]: E0213 09:55:49.884242 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:50.033000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.061775 kernel: kauditd_printk_skb: 58 callbacks suppressed Feb 13 09:55:50.061816 kernel: audit: type=1400 audit(1707818150.033:1139): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.033000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012bc320 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.277110 kernel: audit: type=1300 audit(1707818150.033:1139): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012bc320 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.277148 kernel: audit: type=1327 audit(1707818150.033:1139): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:50.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:50.371291 kernel: audit: type=1400 audit(1707818150.034:1140): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012bc360 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.584789 kernel: audit: type=1300 audit(1707818150.034:1140): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012bc360 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.584824 kernel: audit: type=1327 audit(1707818150.034:1140): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.770537 kernel: audit: type=1400 audit(1707818150.034:1141): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.770568 kernel: audit: type=1300 audit(1707818150.034:1141): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0004808c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0004808c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:50.986660 kernel: audit: type=1327 audit(1707818150.034:1141): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:50.986695 kernel: audit: type=1400 audit(1707818150.036:1142): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.036000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:55:50.036000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000480940 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:55:50.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:55:51.884733 kubelet[2572]: E0213 09:55:51.884667 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:53.884830 kubelet[2572]: E0213 09:55:53.884752 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:55.885100 kubelet[2572]: E0213 09:55:55.885000 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:57.884376 kubelet[2572]: E0213 09:55:57.884348 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:55:59.885787 kubelet[2572]: E0213 09:55:59.885715 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:01.884726 kubelet[2572]: E0213 09:56:01.884659 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:03.885552 kubelet[2572]: E0213 09:56:03.885433 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:05.884730 kubelet[2572]: E0213 09:56:05.884627 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:07.885187 kubelet[2572]: E0213 09:56:07.885104 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:09.884280 kubelet[2572]: E0213 09:56:09.884241 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:11.884521 kubelet[2572]: E0213 09:56:11.884428 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:13.885370 kubelet[2572]: E0213 09:56:13.885300 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:15.885571 kubelet[2572]: E0213 09:56:15.885459 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:17.884937 kubelet[2572]: E0213 09:56:17.884830 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:19.885613 kubelet[2572]: E0213 09:56:19.885505 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:21.884664 kubelet[2572]: E0213 09:56:21.884585 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:23.884624 kubelet[2572]: E0213 09:56:23.884530 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:25.885277 kubelet[2572]: E0213 09:56:25.885157 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:27.884936 kubelet[2572]: E0213 09:56:27.884824 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:29.885250 kubelet[2572]: E0213 09:56:29.885230 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:31.884528 kubelet[2572]: E0213 09:56:31.884444 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:33.884822 kubelet[2572]: E0213 09:56:33.884723 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:35.885224 kubelet[2572]: E0213 09:56:35.885124 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:37.885142 kubelet[2572]: E0213 09:56:37.885078 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:39.885751 kubelet[2572]: E0213 09:56:39.885634 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:41.885414 kubelet[2572]: E0213 09:56:41.885341 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:43.884927 kubelet[2572]: E0213 09:56:43.884819 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:45.885210 kubelet[2572]: E0213 09:56:45.885137 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:46.207000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.248811 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 09:56:46.248900 kernel: audit: type=1400 audit(1707818206.207:1143): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.207000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011b16c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:46.460034 kernel: audit: type=1300 audit(1707818206.207:1143): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011b16c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:46.460063 kernel: audit: type=1327 audit(1707818206.207:1143): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:46.207000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:46.553220 kernel: audit: type=1400 audit(1707818206.207:1144): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.207000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.644347 kernel: audit: type=1300 audit(1707818206.207:1144): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007381e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:46.207000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0007381e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:46.764910 kernel: audit: type=1327 audit(1707818206.207:1144): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:46.207000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:46.858134 kernel: audit: type=1400 audit(1707818206.466:1145): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.466000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.949250 kernel: audit: type=1300 audit(1707818206.466:1145): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c22e870 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:46.466000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c22e870 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:47.047579 kernel: audit: type=1327 audit(1707818206.466:1145): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:46.466000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:47.140782 kernel: audit: type=1400 audit(1707818206.467:1146): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0077100c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c22eb70 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c22ecc0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c005c3ee40 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:46.467000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:46.467000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c22ee40 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:56:46.467000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:56:47.884780 kubelet[2572]: E0213 09:56:47.884683 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:49.884199 kubelet[2572]: E0213 09:56:49.884183 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:49.951511 kubelet[2572]: E0213 09:56:49.951400 2572 kubelet_node_status.go:452] "Node not becoming ready in time after startup" Feb 13 09:56:50.033000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:50.033000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002725480 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:50.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0027254a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00261a800 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:56:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b083a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:56:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:56:51.884597 kubelet[2572]: E0213 09:56:51.884491 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:53.885195 kubelet[2572]: E0213 09:56:53.885092 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:54.936342 kubelet[2572]: E0213 09:56:54.936238 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:56:55.884989 kubelet[2572]: E0213 09:56:55.884897 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:57.885023 kubelet[2572]: E0213 09:56:57.884956 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:59.884723 kubelet[2572]: E0213 09:56:59.884648 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:56:59.938356 kubelet[2572]: E0213 09:56:59.938256 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:01.885259 kubelet[2572]: E0213 09:57:01.885149 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:03.885159 kubelet[2572]: E0213 09:57:03.885096 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:04.940328 kubelet[2572]: E0213 09:57:04.940222 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:05.885280 kubelet[2572]: E0213 09:57:05.885171 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:07.885301 kubelet[2572]: E0213 09:57:07.885193 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:09.884997 kubelet[2572]: E0213 09:57:09.884960 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:09.941945 kubelet[2572]: E0213 09:57:09.941899 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:11.885185 kubelet[2572]: E0213 09:57:11.885083 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:13.885508 kubelet[2572]: E0213 09:57:13.885321 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:14.942832 kubelet[2572]: E0213 09:57:14.942788 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:15.884592 kubelet[2572]: E0213 09:57:15.884518 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:17.885255 kubelet[2572]: E0213 09:57:17.885182 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:19.885112 kubelet[2572]: E0213 09:57:19.885005 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:19.944381 kubelet[2572]: E0213 09:57:19.944278 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:21.885063 kubelet[2572]: E0213 09:57:21.884992 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:23.884674 kubelet[2572]: E0213 09:57:23.884606 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:24.946491 kubelet[2572]: E0213 09:57:24.946386 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:25.885146 kubelet[2572]: E0213 09:57:25.885036 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:27.172804 systemd[1]: Started sshd@7-139.178.70.11:22-5.135.90.165:52340.service. Feb 13 09:57:27.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.11:22-5.135.90.165:52340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:27.200137 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 13 09:57:27.200174 kernel: audit: type=1130 audit(1707818247.172:1155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.11:22-5.135.90.165:52340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:27.432832 sshd[3441]: kex_exchange_identification: Connection closed by remote host Feb 13 09:57:27.432832 sshd[3441]: Connection closed by 5.135.90.165 port 52340 Feb 13 09:57:27.434408 systemd[1]: sshd@7-139.178.70.11:22-5.135.90.165:52340.service: Deactivated successfully. Feb 13 09:57:27.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.11:22-5.135.90.165:52340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:27.531034 kernel: audit: type=1131 audit(1707818247.434:1156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.11:22-5.135.90.165:52340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:27.884990 kubelet[2572]: E0213 09:57:27.884916 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:29.884359 kubelet[2572]: E0213 09:57:29.884304 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:29.948352 kubelet[2572]: E0213 09:57:29.948259 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:31.885055 kubelet[2572]: E0213 09:57:31.884984 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:33.884550 kubelet[2572]: E0213 09:57:33.884452 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:34.950064 kubelet[2572]: E0213 09:57:34.949947 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:35.885638 kubelet[2572]: E0213 09:57:35.885518 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:37.884882 kubelet[2572]: E0213 09:57:37.884770 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:39.885250 kubelet[2572]: E0213 09:57:39.885141 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:39.951789 kubelet[2572]: E0213 09:57:39.951681 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:41.885107 kubelet[2572]: E0213 09:57:41.885009 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:42.979561 systemd[1]: Started sshd@8-139.178.70.11:22-5.135.90.165:59526.service. Feb 13 09:57:42.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.11:22-5.135.90.165:59526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:43.070855 kernel: audit: type=1130 audit(1707818262.978:1157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.11:22-5.135.90.165:59526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:43.131409 sshd[3446]: Unable to negotiate with 5.135.90.165 port 59526: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:57:43.133100 systemd[1]: sshd@8-139.178.70.11:22-5.135.90.165:59526.service: Deactivated successfully. Feb 13 09:57:43.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.11:22-5.135.90.165:59526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:43.227036 kernel: audit: type=1131 audit(1707818263.132:1158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.11:22-5.135.90.165:59526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:43.885282 kubelet[2572]: E0213 09:57:43.885201 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:44.953842 kubelet[2572]: E0213 09:57:44.953737 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:45.884749 kubelet[2572]: E0213 09:57:45.884647 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:46.208000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.208000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00245ae40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:46.302908 kernel: audit: type=1400 audit(1707818266.208:1159): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.302931 kernel: audit: type=1300 audit(1707818266.208:1159): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00245ae40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:46.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:46.519657 kernel: audit: type=1327 audit(1707818266.208:1159): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:46.519732 kernel: audit: type=1400 audit(1707818266.208:1160): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.208000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.611534 kernel: audit: type=1300 audit(1707818266.208:1160): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131c7e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:46.208000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131c7e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:46.733347 kernel: audit: type=1327 audit(1707818266.208:1160): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:46.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:46.826411 kernel: audit: type=1400 audit(1707818266.468:1161): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.916329 kernel: audit: type=1400 audit(1707818266.468:1162): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c51d950 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:57:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c004c28960 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:57:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:57:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:57:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0073ae0f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:57:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:57:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006f8bd40 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:57:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:57:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c51da70 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:57:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:57:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0043f62a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:57:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:57:47.884792 kubelet[2572]: E0213 09:57:47.884689 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:48.090052 systemd[1]: Started sshd@9-139.178.70.11:22-5.135.90.165:55474.service. Feb 13 09:57:48.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.11:22-5.135.90.165:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:48.117832 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 09:57:48.117886 kernel: audit: type=1130 audit(1707818268.089:1167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.11:22-5.135.90.165:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:48.270927 sshd[3450]: Unable to negotiate with 5.135.90.165 port 55474: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:57:48.271563 systemd[1]: sshd@9-139.178.70.11:22-5.135.90.165:55474.service: Deactivated successfully. Feb 13 09:57:48.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.11:22-5.135.90.165:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:48.362928 kernel: audit: type=1131 audit(1707818268.270:1168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.11:22-5.135.90.165:55474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:49.885333 kubelet[2572]: E0213 09:57:49.885295 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:49.955235 kubelet[2572]: E0213 09:57:49.955144 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131ccc0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.252207 kernel: audit: type=1400 audit(1707818270.034:1169): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.252255 kernel: audit: type=1300 audit(1707818270.034:1169): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131ccc0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.252270 kernel: audit: type=1327 audit(1707818270.034:1169): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:50.345489 kernel: audit: type=1400 audit(1707818270.035:1170): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.435686 kernel: audit: type=1300 audit(1707818270.035:1170): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e78de0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e78de0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.556369 kernel: audit: type=1327 audit(1707818270.035:1170): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:50.649693 kernel: audit: type=1400 audit(1707818270.035:1171): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.739917 kernel: audit: type=1300 audit(1707818270.035:1171): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c3c80 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c3c80 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:50.036000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:57:50.036000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c3cc0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:57:50.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:57:51.884938 kubelet[2572]: E0213 09:57:51.884839 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:53.786369 systemd[1]: Started sshd@10-139.178.70.11:22-5.135.90.165:51510.service. Feb 13 09:57:53.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.11:22-5.135.90.165:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:53.813768 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 09:57:53.813835 kernel: audit: type=1130 audit(1707818273.785:1173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.11:22-5.135.90.165:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:53.884723 kubelet[2572]: E0213 09:57:53.884709 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:53.941451 sshd[3456]: Unable to negotiate with 5.135.90.165 port 51510: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:57:53.943263 systemd[1]: sshd@10-139.178.70.11:22-5.135.90.165:51510.service: Deactivated successfully. Feb 13 09:57:53.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.11:22-5.135.90.165:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:54.032855 kernel: audit: type=1131 audit(1707818273.942:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.11:22-5.135.90.165:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:54.957134 kubelet[2572]: E0213 09:57:54.957033 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:57:55.885424 kubelet[2572]: E0213 09:57:55.885322 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:57.884979 kubelet[2572]: E0213 09:57:57.884901 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:59.676475 systemd[1]: Started sshd@11-139.178.70.11:22-5.135.90.165:48010.service. Feb 13 09:57:59.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.11:22-5.135.90.165:48010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:59.766856 kernel: audit: type=1130 audit(1707818279.675:1175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.11:22-5.135.90.165:48010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:59.834109 sshd[3460]: Unable to negotiate with 5.135.90.165 port 48010: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:57:59.836001 systemd[1]: sshd@11-139.178.70.11:22-5.135.90.165:48010.service: Deactivated successfully. Feb 13 09:57:59.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.11:22-5.135.90.165:48010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:59.884301 kubelet[2572]: E0213 09:57:59.884275 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:57:59.931926 kernel: audit: type=1131 audit(1707818279.835:1176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.11:22-5.135.90.165:48010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:57:59.958307 kubelet[2572]: E0213 09:57:59.958287 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:01.884841 kubelet[2572]: E0213 09:58:01.884757 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:03.885342 kubelet[2572]: E0213 09:58:03.885238 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:04.402480 systemd[1]: Started sshd@12-139.178.70.11:22-5.135.90.165:43614.service. Feb 13 09:58:04.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.11:22-5.135.90.165:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:04.495036 kernel: audit: type=1130 audit(1707818284.401:1177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.11:22-5.135.90.165:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:04.559705 sshd[3464]: Unable to negotiate with 5.135.90.165 port 43614: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:04.560390 systemd[1]: sshd@12-139.178.70.11:22-5.135.90.165:43614.service: Deactivated successfully. Feb 13 09:58:04.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.11:22-5.135.90.165:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:04.652040 kernel: audit: type=1131 audit(1707818284.559:1178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.11:22-5.135.90.165:43614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:04.960081 kubelet[2572]: E0213 09:58:04.960023 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:05.885558 kubelet[2572]: E0213 09:58:05.885456 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:07.885468 kubelet[2572]: E0213 09:58:07.885410 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:08.935898 systemd[1]: Started sshd@13-139.178.70.11:22-5.135.90.165:39562.service. Feb 13 09:58:08.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.11:22-5.135.90.165:39562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:09.027852 kernel: audit: type=1130 audit(1707818288.935:1179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.11:22-5.135.90.165:39562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:09.091020 sshd[3470]: Unable to negotiate with 5.135.90.165 port 39562: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:09.092761 systemd[1]: sshd@13-139.178.70.11:22-5.135.90.165:39562.service: Deactivated successfully. Feb 13 09:58:09.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.11:22-5.135.90.165:39562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:09.184928 kernel: audit: type=1131 audit(1707818289.092:1180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.11:22-5.135.90.165:39562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:09.884950 kubelet[2572]: E0213 09:58:09.884888 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:09.962063 kubelet[2572]: E0213 09:58:09.961961 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:11.885022 kubelet[2572]: E0213 09:58:11.884927 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:13.884909 kubelet[2572]: E0213 09:58:13.884816 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:13.939208 systemd[1]: Started sshd@14-139.178.70.11:22-5.135.90.165:35554.service. Feb 13 09:58:13.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.11:22-5.135.90.165:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:14.033922 kernel: audit: type=1130 audit(1707818293.938:1181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.11:22-5.135.90.165:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:14.114902 sshd[3474]: Unable to negotiate with 5.135.90.165 port 35554: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:14.115373 systemd[1]: sshd@14-139.178.70.11:22-5.135.90.165:35554.service: Deactivated successfully. Feb 13 09:58:14.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.11:22-5.135.90.165:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:14.206016 kernel: audit: type=1131 audit(1707818294.114:1182): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.11:22-5.135.90.165:35554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:14.963781 kubelet[2572]: E0213 09:58:14.963719 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:15.885192 kubelet[2572]: E0213 09:58:15.885161 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:17.885468 kubelet[2572]: E0213 09:58:17.885392 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:18.250129 systemd[1]: Started sshd@15-139.178.70.11:22-5.135.90.165:59926.service. Feb 13 09:58:18.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.11:22-5.135.90.165:59926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:18.341852 kernel: audit: type=1130 audit(1707818298.249:1183): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.11:22-5.135.90.165:59926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:18.403619 sshd[3478]: Unable to negotiate with 5.135.90.165 port 59926: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:18.404231 systemd[1]: sshd@15-139.178.70.11:22-5.135.90.165:59926.service: Deactivated successfully. Feb 13 09:58:18.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.11:22-5.135.90.165:59926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:18.494924 kernel: audit: type=1131 audit(1707818298.403:1184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.11:22-5.135.90.165:59926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:19.885516 kubelet[2572]: E0213 09:58:19.885405 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:19.965338 kubelet[2572]: E0213 09:58:19.965267 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:21.884703 kubelet[2572]: E0213 09:58:21.884601 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:23.099021 systemd[1]: Started sshd@16-139.178.70.11:22-5.135.90.165:56040.service. Feb 13 09:58:23.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.11:22-5.135.90.165:56040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:23.190850 kernel: audit: type=1130 audit(1707818303.097:1185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.11:22-5.135.90.165:56040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:23.248888 sshd[3482]: Unable to negotiate with 5.135.90.165 port 56040: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:23.250695 systemd[1]: sshd@16-139.178.70.11:22-5.135.90.165:56040.service: Deactivated successfully. Feb 13 09:58:23.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.11:22-5.135.90.165:56040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:23.348043 kernel: audit: type=1131 audit(1707818303.250:1186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.11:22-5.135.90.165:56040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:23.885340 kubelet[2572]: E0213 09:58:23.885238 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:24.967211 kubelet[2572]: E0213 09:58:24.967146 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:25.885369 kubelet[2572]: E0213 09:58:25.885262 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:27.509409 systemd[1]: Started sshd@17-139.178.70.11:22-5.135.90.165:51920.service. Feb 13 09:58:27.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.11:22-5.135.90.165:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:27.601922 kernel: audit: type=1130 audit(1707818307.508:1187): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.11:22-5.135.90.165:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:27.683234 sshd[3486]: Unable to negotiate with 5.135.90.165 port 51920: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:27.683665 systemd[1]: sshd@17-139.178.70.11:22-5.135.90.165:51920.service: Deactivated successfully. Feb 13 09:58:27.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.11:22-5.135.90.165:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:27.775039 kernel: audit: type=1131 audit(1707818307.682:1188): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.11:22-5.135.90.165:51920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:27.885255 kubelet[2572]: E0213 09:58:27.885149 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:29.885014 kubelet[2572]: E0213 09:58:29.884965 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:29.968658 kubelet[2572]: E0213 09:58:29.968561 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:31.885672 kubelet[2572]: E0213 09:58:31.885596 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:32.862569 systemd[1]: Started sshd@18-139.178.70.11:22-5.135.90.165:47908.service. Feb 13 09:58:32.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.11:22-5.135.90.165:47908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:32.955934 kernel: audit: type=1130 audit(1707818312.861:1189): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.11:22-5.135.90.165:47908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:33.017612 sshd[3490]: Unable to negotiate with 5.135.90.165 port 47908: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:33.018226 systemd[1]: sshd@18-139.178.70.11:22-5.135.90.165:47908.service: Deactivated successfully. Feb 13 09:58:33.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.11:22-5.135.90.165:47908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:33.109916 kernel: audit: type=1131 audit(1707818313.017:1190): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.11:22-5.135.90.165:47908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:33.884828 kubelet[2572]: E0213 09:58:33.884754 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:34.969903 kubelet[2572]: E0213 09:58:34.969825 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:35.885188 kubelet[2572]: E0213 09:58:35.885100 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:37.523751 systemd[1]: Started sshd@19-139.178.70.11:22-5.135.90.165:43956.service. Feb 13 09:58:37.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.11:22-5.135.90.165:43956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:37.616910 kernel: audit: type=1130 audit(1707818317.523:1191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.11:22-5.135.90.165:43956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:37.674955 sshd[3496]: Unable to negotiate with 5.135.90.165 port 43956: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:37.675557 systemd[1]: sshd@19-139.178.70.11:22-5.135.90.165:43956.service: Deactivated successfully. Feb 13 09:58:37.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.11:22-5.135.90.165:43956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:37.768048 kernel: audit: type=1131 audit(1707818317.674:1192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.11:22-5.135.90.165:43956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:37.884967 kubelet[2572]: E0213 09:58:37.884897 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:39.885437 kubelet[2572]: E0213 09:58:39.885335 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:39.971808 kubelet[2572]: E0213 09:58:39.971713 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:41.884756 kubelet[2572]: E0213 09:58:41.884696 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:42.884094 systemd[1]: Started sshd@20-139.178.70.11:22-5.135.90.165:39974.service. Feb 13 09:58:42.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:42.979915 kernel: audit: type=1130 audit(1707818322.883:1193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:43.083075 sshd[3500]: Unable to negotiate with 5.135.90.165 port 39974: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:43.084982 systemd[1]: sshd@20-139.178.70.11:22-5.135.90.165:39974.service: Deactivated successfully. Feb 13 09:58:43.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:43.177921 kernel: audit: type=1131 audit(1707818323.084:1194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:43.885608 kubelet[2572]: E0213 09:58:43.885424 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:44.973199 kubelet[2572]: E0213 09:58:44.973134 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:45.884786 kubelet[2572]: E0213 09:58:45.884763 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:46.209000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.209000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012a1710 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:46.309917 kernel: audit: type=1400 audit(1707818326.209:1195): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.309967 kernel: audit: type=1300 audit(1707818326.209:1195): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012a1710 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:46.209000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:46.529132 kernel: audit: type=1327 audit(1707818326.209:1195): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:46.529161 kernel: audit: type=1400 audit(1707818326.209:1196): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.209000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.620352 kernel: audit: type=1300 audit(1707818326.209:1196): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00035b5c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:46.209000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00035b5c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:46.209000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:46.840507 kernel: audit: type=1327 audit(1707818326.209:1196): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:46.840539 kernel: audit: type=1400 audit(1707818326.468:1197): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.934296 kernel: audit: type=1300 audit(1707818326.468:1197): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0139d8ff0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0139d8ff0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:58:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c0759b0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:58:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c011aab940 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:58:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00844c060 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:58:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0043f6a00 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:58:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00844c0c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:58:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:58:47.307374 systemd[1]: Started sshd@21-139.178.70.11:22-5.135.90.165:36230.service. Feb 13 09:58:47.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.11:22-5.135.90.165:36230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:47.456777 sshd[3504]: Unable to negotiate with 5.135.90.165 port 36230: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:47.458528 systemd[1]: sshd@21-139.178.70.11:22-5.135.90.165:36230.service: Deactivated successfully. Feb 13 09:58:47.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.11:22-5.135.90.165:36230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:47.885348 kubelet[2572]: E0213 09:58:47.885235 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:49.884728 kubelet[2572]: E0213 09:58:49.884688 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:49.974834 kubelet[2572]: E0213 09:58:49.974737 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:50.034000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.079170 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 13 09:58:50.079244 kernel: audit: type=1400 audit(1707818330.034:1205): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.034000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011d42a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.294602 kernel: audit: type=1300 audit(1707818330.034:1205): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011d42a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.294679 kernel: audit: type=1327 audit(1707818330.034:1205): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:50.034000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:50.390854 kernel: audit: type=1400 audit(1707818330.035:1206): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.481882 kernel: audit: type=1300 audit(1707818330.035:1206): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccbd60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ccbd60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.603387 kernel: audit: type=1327 audit(1707818330.035:1206): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:50.697406 kernel: audit: type=1400 audit(1707818330.036:1207): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.036000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.788445 kernel: audit: type=1300 audit(1707818330.036:1207): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011d42c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.036000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0011d42c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.909919 kernel: audit: type=1327 audit(1707818330.036:1207): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:50.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:51.003988 kernel: audit: type=1400 audit(1707818330.037:1208): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.037000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:58:50.037000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011d42e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:58:50.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:58:51.885036 kubelet[2572]: E0213 09:58:51.884939 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:52.029735 systemd[1]: Started sshd@22-139.178.70.11:22-5.135.90.165:60258.service. Feb 13 09:58:52.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.11:22-5.135.90.165:60258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:52.183408 sshd[3510]: Unable to negotiate with 5.135.90.165 port 60258: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:52.185025 systemd[1]: sshd@22-139.178.70.11:22-5.135.90.165:60258.service: Deactivated successfully. Feb 13 09:58:52.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.11:22-5.135.90.165:60258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:53.885434 kubelet[2572]: E0213 09:58:53.885328 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:54.976071 kubelet[2572]: E0213 09:58:54.975973 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:58:55.885066 kubelet[2572]: E0213 09:58:55.885008 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:57.351832 systemd[1]: Started sshd@23-139.178.70.11:22-5.135.90.165:56298.service. Feb 13 09:58:57.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.11:22-5.135.90.165:56298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:57.379249 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 09:58:57.379312 kernel: audit: type=1130 audit(1707818337.351:1211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.11:22-5.135.90.165:56298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:57.507927 sshd[3514]: Unable to negotiate with 5.135.90.165 port 56298: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:58:57.508401 systemd[1]: sshd@23-139.178.70.11:22-5.135.90.165:56298.service: Deactivated successfully. Feb 13 09:58:57.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.11:22-5.135.90.165:56298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:57.598032 kernel: audit: type=1131 audit(1707818337.507:1212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-139.178.70.11:22-5.135.90.165:56298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:58:57.884918 kubelet[2572]: E0213 09:58:57.884819 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:59.885375 kubelet[2572]: E0213 09:58:59.885258 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:58:59.978039 kubelet[2572]: E0213 09:58:59.977949 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:01.884810 kubelet[2572]: E0213 09:59:01.884746 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:03.577256 systemd[1]: Started sshd@24-139.178.70.11:22-5.135.90.165:52380.service. Feb 13 09:59:03.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.11:22-5.135.90.165:52380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:03.668039 kernel: audit: type=1130 audit(1707818343.576:1213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.11:22-5.135.90.165:52380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:03.739686 sshd[3518]: Unable to negotiate with 5.135.90.165 port 52380: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:03.740447 systemd[1]: sshd@24-139.178.70.11:22-5.135.90.165:52380.service: Deactivated successfully. Feb 13 09:59:03.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.11:22-5.135.90.165:52380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:03.831029 kernel: audit: type=1131 audit(1707818343.739:1214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-139.178.70.11:22-5.135.90.165:52380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:03.885232 kubelet[2572]: E0213 09:59:03.885134 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:04.982372 kubelet[2572]: E0213 09:59:04.982307 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:05.885057 kubelet[2572]: E0213 09:59:05.884942 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:07.884967 kubelet[2572]: E0213 09:59:07.884890 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:08.576760 systemd[1]: Started sshd@25-139.178.70.11:22-5.135.90.165:48404.service. Feb 13 09:59:08.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.11:22-5.135.90.165:48404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:08.666880 kernel: audit: type=1130 audit(1707818348.576:1215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.11:22-5.135.90.165:48404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:08.725432 sshd[3524]: Unable to negotiate with 5.135.90.165 port 48404: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:08.725978 systemd[1]: sshd@25-139.178.70.11:22-5.135.90.165:48404.service: Deactivated successfully. Feb 13 09:59:08.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.11:22-5.135.90.165:48404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:08.817029 kernel: audit: type=1131 audit(1707818348.725:1216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-139.178.70.11:22-5.135.90.165:48404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:09.884465 kubelet[2572]: E0213 09:59:09.884424 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:09.984142 kubelet[2572]: E0213 09:59:09.984056 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:11.885296 kubelet[2572]: E0213 09:59:11.885228 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:13.350820 systemd[1]: Started sshd@26-139.178.70.11:22-5.135.90.165:44388.service. Feb 13 09:59:13.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.11:22-5.135.90.165:44388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:13.441858 kernel: audit: type=1130 audit(1707818353.350:1217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.11:22-5.135.90.165:44388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:13.540975 sshd[3528]: Unable to negotiate with 5.135.90.165 port 44388: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:13.542278 systemd[1]: sshd@26-139.178.70.11:22-5.135.90.165:44388.service: Deactivated successfully. Feb 13 09:59:13.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.11:22-5.135.90.165:44388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:13.638904 kernel: audit: type=1131 audit(1707818353.540:1218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-139.178.70.11:22-5.135.90.165:44388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:13.885274 kubelet[2572]: E0213 09:59:13.885203 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:14.985489 kubelet[2572]: E0213 09:59:14.985429 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:15.885230 kubelet[2572]: E0213 09:59:15.885123 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:17.885429 kubelet[2572]: E0213 09:59:17.885319 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:18.506164 systemd[1]: Started sshd@27-139.178.70.11:22-5.135.90.165:40354.service. Feb 13 09:59:18.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.11:22-5.135.90.165:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:18.598918 kernel: audit: type=1130 audit(1707818358.504:1219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.11:22-5.135.90.165:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:18.666028 sshd[3533]: Unable to negotiate with 5.135.90.165 port 40354: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:18.667867 systemd[1]: sshd@27-139.178.70.11:22-5.135.90.165:40354.service: Deactivated successfully. Feb 13 09:59:18.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.11:22-5.135.90.165:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:18.759924 kernel: audit: type=1131 audit(1707818358.666:1220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-139.178.70.11:22-5.135.90.165:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:19.885596 kubelet[2572]: E0213 09:59:19.885515 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:19.986990 kubelet[2572]: E0213 09:59:19.986921 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:21.885435 kubelet[2572]: E0213 09:59:21.885319 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:23.491361 systemd[1]: Started sshd@28-139.178.70.11:22-5.135.90.165:36460.service. Feb 13 09:59:23.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.11:22-5.135.90.165:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:23.583890 kernel: audit: type=1130 audit(1707818363.491:1221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.11:22-5.135.90.165:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:23.646097 sshd[3537]: Unable to negotiate with 5.135.90.165 port 36460: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:23.646741 systemd[1]: sshd@28-139.178.70.11:22-5.135.90.165:36460.service: Deactivated successfully. Feb 13 09:59:23.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.11:22-5.135.90.165:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:23.737850 kernel: audit: type=1131 audit(1707818363.646:1222): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-139.178.70.11:22-5.135.90.165:36460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:23.884525 kubelet[2572]: E0213 09:59:23.884414 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:24.988698 kubelet[2572]: E0213 09:59:24.988592 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:25.884486 kubelet[2572]: E0213 09:59:25.884425 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:27.885415 kubelet[2572]: E0213 09:59:27.885354 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:28.526626 systemd[1]: Started sshd@29-139.178.70.11:22-5.135.90.165:60674.service. Feb 13 09:59:28.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.11:22-5.135.90.165:60674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:28.617852 kernel: audit: type=1130 audit(1707818368.525:1223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.11:22-5.135.90.165:60674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:28.686950 sshd[3545]: Unable to negotiate with 5.135.90.165 port 60674: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:28.688750 systemd[1]: sshd@29-139.178.70.11:22-5.135.90.165:60674.service: Deactivated successfully. Feb 13 09:59:28.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.11:22-5.135.90.165:60674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:28.785953 kernel: audit: type=1131 audit(1707818368.688:1224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-139.178.70.11:22-5.135.90.165:60674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:29.885104 kubelet[2572]: E0213 09:59:29.885059 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:29.989712 kubelet[2572]: E0213 09:59:29.989642 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:31.885332 kubelet[2572]: E0213 09:59:31.885224 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:33.884528 kubelet[2572]: E0213 09:59:33.884423 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:34.019694 systemd[1]: Started sshd@30-139.178.70.11:22-5.135.90.165:56758.service. Feb 13 09:59:34.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.11:22-5.135.90.165:56758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:34.111911 kernel: audit: type=1130 audit(1707818374.018:1225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.11:22-5.135.90.165:56758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:34.172776 sshd[3550]: Unable to negotiate with 5.135.90.165 port 56758: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:34.173357 systemd[1]: sshd@30-139.178.70.11:22-5.135.90.165:56758.service: Deactivated successfully. Feb 13 09:59:34.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.11:22-5.135.90.165:56758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:34.264853 kernel: audit: type=1131 audit(1707818374.172:1226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-139.178.70.11:22-5.135.90.165:56758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:34.991609 kubelet[2572]: E0213 09:59:34.991509 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:35.885317 kubelet[2572]: E0213 09:59:35.885216 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:37.884474 kubelet[2572]: E0213 09:59:37.884363 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:39.885561 kubelet[2572]: E0213 09:59:39.885477 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:39.993466 kubelet[2572]: E0213 09:59:39.993403 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:40.020253 systemd[1]: Started sshd@31-139.178.70.11:22-5.135.90.165:52700.service. Feb 13 09:59:40.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.11:22-5.135.90.165:52700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:40.114034 kernel: audit: type=1130 audit(1707818380.019:1227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.11:22-5.135.90.165:52700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:40.169539 sshd[3557]: Unable to negotiate with 5.135.90.165 port 52700: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:40.170111 systemd[1]: sshd@31-139.178.70.11:22-5.135.90.165:52700.service: Deactivated successfully. Feb 13 09:59:40.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.11:22-5.135.90.165:52700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:40.262020 kernel: audit: type=1131 audit(1707818380.169:1228): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-139.178.70.11:22-5.135.90.165:52700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:41.885376 kubelet[2572]: E0213 09:59:41.885307 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:43.884606 kubelet[2572]: E0213 09:59:43.884540 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:44.995684 kubelet[2572]: E0213 09:59:44.995610 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:45.867080 systemd[1]: Started sshd@32-139.178.70.11:22-5.135.90.165:48754.service. Feb 13 09:59:45.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.11:22-5.135.90.165:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:45.884952 kubelet[2572]: E0213 09:59:45.884889 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:45.961853 kernel: audit: type=1130 audit(1707818385.866:1229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.11:22-5.135.90.165:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:46.063773 sshd[3561]: Unable to negotiate with 5.135.90.165 port 48754: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:46.065592 systemd[1]: sshd@32-139.178.70.11:22-5.135.90.165:48754.service: Deactivated successfully. Feb 13 09:59:46.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.11:22-5.135.90.165:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:46.161964 kernel: audit: type=1131 audit(1707818386.065:1230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-139.178.70.11:22-5.135.90.165:48754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:46.209000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.209000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002515920 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:46.305887 kernel: audit: type=1400 audit(1707818386.209:1231): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.305921 kernel: audit: type=1300 audit(1707818386.209:1231): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002515920 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:46.209000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:46.521660 kernel: audit: type=1327 audit(1707818386.209:1231): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:46.521748 kernel: audit: type=1400 audit(1707818386.209:1232): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.209000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.613005 kernel: audit: type=1300 audit(1707818386.209:1232): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b09080 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:46.209000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001b09080 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:46.209000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:46.829294 kernel: audit: type=1327 audit(1707818386.209:1232): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:46.829326 kernel: audit: type=1400 audit(1707818386.469:1233): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.920273 kernel: audit: type=1300 audit(1707818386.469:1233): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c005facf60 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c005facf60 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:59:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c205920 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:59:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c000b73830 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:59:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c000b73890 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:59:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00c151260 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:59:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0139391a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 09:59:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 09:59:47.885071 kubelet[2572]: E0213 09:59:47.885004 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:49.884271 kubelet[2572]: E0213 09:59:49.884234 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:49.997313 kubelet[2572]: E0213 09:59:49.997248 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016943e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:50.036000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:50.036000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001694400 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:50.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:50.036000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:50.036000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fba000 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:50.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:50.038000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 09:59:50.038000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fba020 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 09:59:50.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 09:59:51.409508 systemd[1]: Started sshd@33-139.178.70.11:22-5.135.90.165:44740.service. Feb 13 09:59:51.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.11:22-5.135.90.165:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:51.437269 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 13 09:59:51.437304 kernel: audit: type=1130 audit(1707818391.408:1243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.11:22-5.135.90.165:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:51.580343 sshd[3567]: Unable to negotiate with 5.135.90.165 port 44740: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:51.580881 systemd[1]: sshd@33-139.178.70.11:22-5.135.90.165:44740.service: Deactivated successfully. Feb 13 09:59:51.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.11:22-5.135.90.165:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:51.673036 kernel: audit: type=1131 audit(1707818391.580:1244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-139.178.70.11:22-5.135.90.165:44740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:51.884492 kubelet[2572]: E0213 09:59:51.884418 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:53.885504 kubelet[2572]: E0213 09:59:53.885430 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:54.999453 kubelet[2572]: E0213 09:59:54.999342 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 09:59:55.885427 kubelet[2572]: E0213 09:59:55.885356 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:56.472968 systemd[1]: Started sshd@34-139.178.70.11:22-5.135.90.165:40818.service. Feb 13 09:59:56.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.11:22-5.135.90.165:40818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:56.565038 kernel: audit: type=1130 audit(1707818396.472:1245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.11:22-5.135.90.165:40818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:56.624541 sshd[3571]: Unable to negotiate with 5.135.90.165 port 40818: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 09:59:56.625200 systemd[1]: sshd@34-139.178.70.11:22-5.135.90.165:40818.service: Deactivated successfully. Feb 13 09:59:56.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.11:22-5.135.90.165:40818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:56.715944 kernel: audit: type=1131 audit(1707818396.624:1246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-139.178.70.11:22-5.135.90.165:40818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 09:59:57.885262 kubelet[2572]: E0213 09:59:57.885155 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 09:59:59.885460 kubelet[2572]: E0213 09:59:59.885345 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:00.001235 kubelet[2572]: E0213 10:00:00.001173 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:01.885445 kubelet[2572]: E0213 10:00:01.885348 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:02.307098 systemd[1]: Started sshd@35-139.178.70.11:22-5.135.90.165:36884.service. Feb 13 10:00:02.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.11:22-5.135.90.165:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:02.400033 kernel: audit: type=1130 audit(1707818402.306:1247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.11:22-5.135.90.165:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:02.459927 sshd[3575]: Unable to negotiate with 5.135.90.165 port 36884: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:02.461810 systemd[1]: sshd@35-139.178.70.11:22-5.135.90.165:36884.service: Deactivated successfully. Feb 13 10:00:02.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.11:22-5.135.90.165:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:02.558905 kernel: audit: type=1131 audit(1707818402.461:1248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-139.178.70.11:22-5.135.90.165:36884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:03.884828 kubelet[2572]: E0213 10:00:03.884762 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:05.002616 kubelet[2572]: E0213 10:00:05.002513 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:05.885319 kubelet[2572]: E0213 10:00:05.885220 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:07.882198 systemd[1]: Started sshd@36-139.178.70.11:22-5.135.90.165:32874.service. Feb 13 10:00:07.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.11:22-5.135.90.165:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:07.885021 kubelet[2572]: E0213 10:00:07.885005 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:07.973904 kernel: audit: type=1130 audit(1707818407.881:1249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.11:22-5.135.90.165:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:08.031777 sshd[3581]: Unable to negotiate with 5.135.90.165 port 32874: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:08.032378 systemd[1]: sshd@36-139.178.70.11:22-5.135.90.165:32874.service: Deactivated successfully. Feb 13 10:00:08.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.11:22-5.135.90.165:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:08.124045 kernel: audit: type=1131 audit(1707818408.031:1250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-139.178.70.11:22-5.135.90.165:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:09.884860 kubelet[2572]: E0213 10:00:09.884819 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:10.003691 kubelet[2572]: E0213 10:00:10.003599 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:11.885306 kubelet[2572]: E0213 10:00:11.885233 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:13.015113 systemd[1]: Started sshd@37-139.178.70.11:22-5.135.90.165:57196.service. Feb 13 10:00:13.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.11:22-5.135.90.165:57196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:13.107853 kernel: audit: type=1130 audit(1707818413.014:1251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.11:22-5.135.90.165:57196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:13.169388 sshd[3585]: Unable to negotiate with 5.135.90.165 port 57196: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:13.170022 systemd[1]: sshd@37-139.178.70.11:22-5.135.90.165:57196.service: Deactivated successfully. Feb 13 10:00:13.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.11:22-5.135.90.165:57196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:13.260910 kernel: audit: type=1131 audit(1707818413.169:1252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-139.178.70.11:22-5.135.90.165:57196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:13.885011 kubelet[2572]: E0213 10:00:13.884812 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:15.005171 kubelet[2572]: E0213 10:00:15.005068 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:15.885486 kubelet[2572]: E0213 10:00:15.885371 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:17.885512 kubelet[2572]: E0213 10:00:17.885396 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:18.796136 systemd[1]: Started sshd@38-139.178.70.11:22-5.135.90.165:53370.service. Feb 13 10:00:18.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.11:22-5.135.90.165:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:18.888905 kernel: audit: type=1130 audit(1707818418.795:1253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.11:22-5.135.90.165:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:18.962698 sshd[3590]: Unable to negotiate with 5.135.90.165 port 53370: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:18.964572 systemd[1]: sshd@38-139.178.70.11:22-5.135.90.165:53370.service: Deactivated successfully. Feb 13 10:00:18.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.11:22-5.135.90.165:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:19.062045 kernel: audit: type=1131 audit(1707818418.964:1254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-139.178.70.11:22-5.135.90.165:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:19.885941 kubelet[2572]: E0213 10:00:19.885812 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:20.007443 kubelet[2572]: E0213 10:00:20.007348 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:21.885537 kubelet[2572]: E0213 10:00:21.885431 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:23.837879 systemd[1]: Started sshd@39-139.178.70.11:22-5.135.90.165:49400.service. Feb 13 10:00:23.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.11:22-5.135.90.165:49400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:23.885146 kubelet[2572]: E0213 10:00:23.885107 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:23.931036 kernel: audit: type=1130 audit(1707818423.837:1255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.11:22-5.135.90.165:49400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:23.990050 sshd[3594]: Unable to negotiate with 5.135.90.165 port 49400: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:23.990632 systemd[1]: sshd@39-139.178.70.11:22-5.135.90.165:49400.service: Deactivated successfully. Feb 13 10:00:23.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.11:22-5.135.90.165:49400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:24.083037 kernel: audit: type=1131 audit(1707818423.989:1256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-139.178.70.11:22-5.135.90.165:49400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:25.009354 kubelet[2572]: E0213 10:00:25.009248 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:25.885134 kubelet[2572]: E0213 10:00:25.885019 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:27.884715 kubelet[2572]: E0213 10:00:27.884603 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:29.885023 kubelet[2572]: E0213 10:00:29.884982 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:30.010306 kubelet[2572]: E0213 10:00:30.010251 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:30.186635 systemd[1]: Started sshd@40-139.178.70.11:22-5.135.90.165:45274.service. Feb 13 10:00:30.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.11:22-5.135.90.165:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:30.280038 kernel: audit: type=1130 audit(1707818430.185:1257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.11:22-5.135.90.165:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:30.347490 sshd[3598]: Unable to negotiate with 5.135.90.165 port 45274: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:30.349422 systemd[1]: sshd@40-139.178.70.11:22-5.135.90.165:45274.service: Deactivated successfully. Feb 13 10:00:30.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.11:22-5.135.90.165:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:30.446909 kernel: audit: type=1131 audit(1707818430.349:1258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-139.178.70.11:22-5.135.90.165:45274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:31.884593 kubelet[2572]: E0213 10:00:31.884513 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:33.885163 kubelet[2572]: E0213 10:00:33.885094 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:35.008135 systemd[1]: Started sshd@41-139.178.70.11:22-5.135.90.165:41266.service. Feb 13 10:00:35.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.11:22-5.135.90.165:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:35.011672 kubelet[2572]: E0213 10:00:35.011620 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:35.102030 kernel: audit: type=1130 audit(1707818435.007:1259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.11:22-5.135.90.165:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:35.182059 sshd[3604]: Unable to negotiate with 5.135.90.165 port 41266: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:35.183955 systemd[1]: sshd@41-139.178.70.11:22-5.135.90.165:41266.service: Deactivated successfully. Feb 13 10:00:35.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.11:22-5.135.90.165:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:35.275924 kernel: audit: type=1131 audit(1707818435.183:1260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-139.178.70.11:22-5.135.90.165:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:35.884487 kubelet[2572]: E0213 10:00:35.884372 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:37.885258 kubelet[2572]: E0213 10:00:37.885138 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:39.885180 kubelet[2572]: E0213 10:00:39.885075 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:40.013622 kubelet[2572]: E0213 10:00:40.013559 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:41.885411 kubelet[2572]: E0213 10:00:41.885306 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:42.786528 systemd[1]: Started sshd@42-139.178.70.11:22-5.135.90.165:37350.service. Feb 13 10:00:42.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.11:22-5.135.90.165:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:42.882966 kernel: audit: type=1130 audit(1707818442.785:1261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.11:22-5.135.90.165:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:42.959719 sshd[3608]: Unable to negotiate with 5.135.90.165 port 37350: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:42.961497 systemd[1]: sshd@42-139.178.70.11:22-5.135.90.165:37350.service: Deactivated successfully. Feb 13 10:00:42.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.11:22-5.135.90.165:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:43.058956 kernel: audit: type=1131 audit(1707818442.960:1262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-139.178.70.11:22-5.135.90.165:37350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:43.884656 kubelet[2572]: E0213 10:00:43.884586 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:45.015568 kubelet[2572]: E0213 10:00:45.015496 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:45.885067 kubelet[2572]: E0213 10:00:45.885002 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:46.208000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.208000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00079b5e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:46.306902 kernel: audit: type=1400 audit(1707818446.208:1263): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.306942 kernel: audit: type=1300 audit(1707818446.208:1263): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00079b5e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:46.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:46.522647 kernel: audit: type=1327 audit(1707818446.208:1263): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:46.522682 kernel: audit: type=1400 audit(1707818446.208:1264): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.208000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.208000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019891d0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:46.737201 kernel: audit: type=1300 audit(1707818446.208:1264): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019891d0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:46.737285 kernel: audit: type=1327 audit(1707818446.208:1264): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:46.208000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.923744 kernel: audit: type=1400 audit(1707818446.468:1265): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.923792 kernel: audit: type=1300 audit(1707818446.468:1265): arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006dcb080 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c006dcb080 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:00:46.468000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.468000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00ee697d0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.468000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:00:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c0fb080 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:00:46.469000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.469000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c0120b70e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.469000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:00:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=60 a1=c00ee698f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:00:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a977280 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:00:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:00:47.884539 kubelet[2572]: E0213 10:00:47.884470 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:48.674283 systemd[1]: Started sshd@43-139.178.70.11:22-5.135.90.165:33352.service. Feb 13 10:00:48.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.11:22-5.135.90.165:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:48.702054 kernel: kauditd_printk_skb: 16 callbacks suppressed Feb 13 10:00:48.702092 kernel: audit: type=1130 audit(1707818448.673:1271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.11:22-5.135.90.165:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:48.855449 sshd[3613]: Unable to negotiate with 5.135.90.165 port 33352: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:48.856096 systemd[1]: sshd@43-139.178.70.11:22-5.135.90.165:33352.service: Deactivated successfully. Feb 13 10:00:48.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.11:22-5.135.90.165:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:48.949044 kernel: audit: type=1131 audit(1707818448.855:1272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-139.178.70.11:22-5.135.90.165:33352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:49.885074 kubelet[2572]: E0213 10:00:49.885036 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:50.017200 kubelet[2572]: E0213 10:00:50.017106 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:50.035000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.035000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00079b820 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.252403 kernel: audit: type=1400 audit(1707818450.035:1273): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.252442 kernel: audit: type=1300 audit(1707818450.035:1273): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00079b820 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.252458 kernel: audit: type=1327 audit(1707818450.035:1273): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:50.035000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:50.347622 kernel: audit: type=1400 audit(1707818450.037:1274): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.037000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.440342 kernel: audit: type=1300 audit(1707818450.037:1274): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c2200 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.037000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c2200 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.562586 kernel: audit: type=1327 audit(1707818450.037:1274): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:50.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:50.037000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.747602 kernel: audit: type=1400 audit(1707818450.037:1275): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.747631 kernel: audit: type=1300 audit(1707818450.037:1275): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00079b840 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.037000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00079b840 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:50.038000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:00:50.038000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00035b800 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:00:50.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:00:51.885001 kubelet[2572]: E0213 10:00:51.884893 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:53.884564 kubelet[2572]: E0213 10:00:53.884473 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:54.414023 systemd[1]: Started sshd@44-139.178.70.11:22-5.135.90.165:57614.service. Feb 13 10:00:54.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.11:22-5.135.90.165:57614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:54.441531 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 10:00:54.441601 kernel: audit: type=1130 audit(1707818454.413:1277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.11:22-5.135.90.165:57614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:54.575780 sshd[3619]: Unable to negotiate with 5.135.90.165 port 57614: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:00:54.576324 systemd[1]: sshd@44-139.178.70.11:22-5.135.90.165:57614.service: Deactivated successfully. Feb 13 10:00:54.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.11:22-5.135.90.165:57614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:54.668038 kernel: audit: type=1131 audit(1707818454.575:1278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-139.178.70.11:22-5.135.90.165:57614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:00:55.019204 kubelet[2572]: E0213 10:00:55.019100 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:00:55.884675 kubelet[2572]: E0213 10:00:55.884577 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:57.885410 kubelet[2572]: E0213 10:00:57.885353 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:00:59.477670 update_engine[1464]: I0213 10:00:59.477559 1464 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 10:00:59.477670 update_engine[1464]: I0213 10:00:59.477638 1464 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 10:00:59.479631 update_engine[1464]: I0213 10:00:59.479549 1464 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 10:00:59.480503 update_engine[1464]: I0213 10:00:59.480430 1464 omaha_request_params.cc:62] Current group set to lts Feb 13 10:00:59.480752 update_engine[1464]: I0213 10:00:59.480722 1464 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 10:00:59.480752 update_engine[1464]: I0213 10:00:59.480742 1464 update_attempter.cc:643] Scheduling an action processor start. Feb 13 10:00:59.481013 update_engine[1464]: I0213 10:00:59.480775 1464 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 10:00:59.481013 update_engine[1464]: I0213 10:00:59.480839 1464 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 10:00:59.481013 update_engine[1464]: I0213 10:00:59.480991 1464 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 10:00:59.481013 update_engine[1464]: I0213 10:00:59.481009 1464 omaha_request_action.cc:271] Request: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.481013 update_engine[1464]: Feb 13 10:00:59.482111 update_engine[1464]: I0213 10:00:59.481019 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:00:59.482222 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 10:00:59.484134 update_engine[1464]: I0213 10:00:59.484045 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:00:59.484339 update_engine[1464]: E0213 10:00:59.484277 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:00:59.484465 update_engine[1464]: I0213 10:00:59.484431 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 10:00:59.885878 kubelet[2572]: E0213 10:00:59.885729 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:00.021378 kubelet[2572]: E0213 10:01:00.021284 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:00.194090 systemd[1]: Started sshd@45-139.178.70.11:22-5.135.90.165:53678.service. Feb 13 10:01:00.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.11:22-5.135.90.165:53678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:00.285868 kernel: audit: type=1130 audit(1707818460.193:1279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.11:22-5.135.90.165:53678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:00.354077 sshd[3624]: Unable to negotiate with 5.135.90.165 port 53678: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:00.354941 systemd[1]: sshd@45-139.178.70.11:22-5.135.90.165:53678.service: Deactivated successfully. Feb 13 10:01:00.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.11:22-5.135.90.165:53678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:00.446851 kernel: audit: type=1131 audit(1707818460.354:1280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-139.178.70.11:22-5.135.90.165:53678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:01.885547 kubelet[2572]: E0213 10:01:01.885441 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:03.885261 kubelet[2572]: E0213 10:01:03.885157 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:05.023624 kubelet[2572]: E0213 10:01:05.023557 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:05.884763 kubelet[2572]: E0213 10:01:05.884653 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:06.263521 systemd[1]: Started sshd@46-139.178.70.11:22-5.135.90.165:49804.service. Feb 13 10:01:06.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.11:22-5.135.90.165:49804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:06.356041 kernel: audit: type=1130 audit(1707818466.262:1281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.11:22-5.135.90.165:49804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:06.447399 sshd[3630]: Unable to negotiate with 5.135.90.165 port 49804: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:06.449286 systemd[1]: sshd@46-139.178.70.11:22-5.135.90.165:49804.service: Deactivated successfully. Feb 13 10:01:06.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.11:22-5.135.90.165:49804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:06.547010 kernel: audit: type=1131 audit(1707818466.448:1282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-139.178.70.11:22-5.135.90.165:49804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:07.884557 kubelet[2572]: E0213 10:01:07.884444 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:09.387547 update_engine[1464]: I0213 10:01:09.387451 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:01:09.388236 update_engine[1464]: I0213 10:01:09.387837 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:01:09.388236 update_engine[1464]: E0213 10:01:09.388044 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:01:09.388236 update_engine[1464]: I0213 10:01:09.388193 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 10:01:09.885194 kubelet[2572]: E0213 10:01:09.885174 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:10.025035 kubelet[2572]: E0213 10:01:10.024936 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:11.332275 systemd[1]: Started sshd@47-139.178.70.11:22-5.135.90.165:45704.service. Feb 13 10:01:11.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.11:22-5.135.90.165:45704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:11.424032 kernel: audit: type=1130 audit(1707818471.331:1283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.11:22-5.135.90.165:45704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:11.491035 sshd[3634]: Unable to negotiate with 5.135.90.165 port 45704: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:11.491731 systemd[1]: sshd@47-139.178.70.11:22-5.135.90.165:45704.service: Deactivated successfully. Feb 13 10:01:11.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.11:22-5.135.90.165:45704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:11.583035 kernel: audit: type=1131 audit(1707818471.491:1284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-139.178.70.11:22-5.135.90.165:45704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:11.885270 kubelet[2572]: E0213 10:01:11.885186 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:13.884776 kubelet[2572]: E0213 10:01:13.884699 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:15.026734 kubelet[2572]: E0213 10:01:15.026633 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:15.885312 kubelet[2572]: E0213 10:01:15.885247 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:16.832599 systemd[1]: Started sshd@48-139.178.70.11:22-139.178.68.195:56878.service. Feb 13 10:01:16.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.11:22-139.178.68.195:56878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:16.922856 kernel: audit: type=1130 audit(1707818476.831:1285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.11:22-139.178.68.195:56878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:16.943000 audit[3639]: USER_ACCT pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:16.944821 sshd[3639]: Accepted publickey for core from 139.178.68.195 port 56878 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:16.947771 sshd[3639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:16.958123 systemd-logind[1462]: New session 10 of user core. Feb 13 10:01:16.960054 systemd[1]: Started session-10.scope. Feb 13 10:01:16.945000 audit[3639]: CRED_ACQ pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.050349 sshd[3639]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:17.051718 systemd[1]: sshd@48-139.178.70.11:22-139.178.68.195:56878.service: Deactivated successfully. Feb 13 10:01:17.052151 systemd[1]: session-10.scope: Deactivated successfully. Feb 13 10:01:17.052545 systemd-logind[1462]: Session 10 logged out. Waiting for processes to exit. Feb 13 10:01:17.053071 systemd-logind[1462]: Removed session 10. Feb 13 10:01:17.129425 kernel: audit: type=1101 audit(1707818476.943:1286): pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.129461 kernel: audit: type=1103 audit(1707818476.945:1287): pid=3639 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.129476 kernel: audit: type=1006 audit(1707818476.946:1288): pid=3639 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 13 10:01:16.946000 audit[3639]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb4e7a760 a2=3 a3=0 items=0 ppid=1 pid=3639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:17.281881 kernel: audit: type=1300 audit(1707818476.946:1288): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb4e7a760 a2=3 a3=0 items=0 ppid=1 pid=3639 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:17.281945 kernel: audit: type=1327 audit(1707818476.946:1288): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:16.946000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:17.312930 kernel: audit: type=1105 audit(1707818476.966:1289): pid=3639 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:16.966000 audit[3639]: USER_START pid=3639 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.408733 kernel: audit: type=1103 audit(1707818476.967:1290): pid=3641 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:16.967000 audit[3641]: CRED_ACQ pid=3641 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.498422 kernel: audit: type=1106 audit(1707818477.050:1291): pid=3639 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.050000 audit[3639]: USER_END pid=3639 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.594829 kernel: audit: type=1104 audit(1707818477.050:1292): pid=3639 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.050000 audit[3639]: CRED_DISP pid=3639 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:17.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-139.178.70.11:22-139.178.68.195:56878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:17.706764 systemd[1]: Started sshd@49-139.178.70.11:22-5.135.90.165:41734.service. Feb 13 10:01:17.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.11:22-5.135.90.165:41734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:17.859725 sshd[3665]: Unable to negotiate with 5.135.90.165 port 41734: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:17.861467 systemd[1]: sshd@49-139.178.70.11:22-5.135.90.165:41734.service: Deactivated successfully. Feb 13 10:01:17.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-139.178.70.11:22-5.135.90.165:41734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:17.885308 kubelet[2572]: E0213 10:01:17.885212 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:19.379626 update_engine[1464]: I0213 10:01:19.379503 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:01:19.380440 update_engine[1464]: I0213 10:01:19.379985 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:01:19.380440 update_engine[1464]: E0213 10:01:19.380175 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:01:19.380440 update_engine[1464]: I0213 10:01:19.380334 1464 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 10:01:19.885132 kubelet[2572]: E0213 10:01:19.885072 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:20.028558 kubelet[2572]: E0213 10:01:20.028460 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:21.884736 kubelet[2572]: E0213 10:01:21.884634 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:22.057482 systemd[1]: Started sshd@50-139.178.70.11:22-139.178.68.195:56892.service. Feb 13 10:01:22.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.11:22-139.178.68.195:56892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:22.085151 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:01:22.085216 kernel: audit: type=1130 audit(1707818482.056:1296): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.11:22-139.178.68.195:56892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:22.197000 audit[3669]: USER_ACCT pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.198030 sshd[3669]: Accepted publickey for core from 139.178.68.195 port 56892 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:22.199159 sshd[3669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:22.201427 systemd-logind[1462]: New session 11 of user core. Feb 13 10:01:22.201923 systemd[1]: Started session-11.scope. Feb 13 10:01:22.281434 sshd[3669]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:22.282731 systemd[1]: sshd@50-139.178.70.11:22-139.178.68.195:56892.service: Deactivated successfully. Feb 13 10:01:22.283170 systemd[1]: session-11.scope: Deactivated successfully. Feb 13 10:01:22.283463 systemd-logind[1462]: Session 11 logged out. Waiting for processes to exit. Feb 13 10:01:22.283825 systemd-logind[1462]: Removed session 11. Feb 13 10:01:22.198000 audit[3669]: CRED_ACQ pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.381784 kernel: audit: type=1101 audit(1707818482.197:1297): pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.381818 kernel: audit: type=1103 audit(1707818482.198:1298): pid=3669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.381835 kernel: audit: type=1006 audit(1707818482.198:1299): pid=3669 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 13 10:01:22.440917 kernel: audit: type=1300 audit(1707818482.198:1299): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd9e8a790 a2=3 a3=0 items=0 ppid=1 pid=3669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:22.198000 audit[3669]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd9e8a790 a2=3 a3=0 items=0 ppid=1 pid=3669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:22.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:22.564373 kernel: audit: type=1327 audit(1707818482.198:1299): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:22.564405 kernel: audit: type=1105 audit(1707818482.203:1300): pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.203000 audit[3669]: USER_START pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.627577 systemd[1]: Started sshd@51-139.178.70.11:22-5.135.90.165:37704.service. Feb 13 10:01:22.659712 kernel: audit: type=1103 audit(1707818482.204:1301): pid=3672 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.204000 audit[3672]: CRED_ACQ pid=3672 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.281000 audit[3669]: USER_END pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.784076 sshd[3696]: Unable to negotiate with 5.135.90.165 port 37704: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:22.784482 systemd[1]: sshd@51-139.178.70.11:22-5.135.90.165:37704.service: Deactivated successfully. Feb 13 10:01:22.844486 kernel: audit: type=1106 audit(1707818482.281:1302): pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.844519 kernel: audit: type=1104 audit(1707818482.281:1303): pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.281000 audit[3669]: CRED_DISP pid=3669 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:22.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-139.178.70.11:22-139.178.68.195:56892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:22.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.11:22-5.135.90.165:37704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:22.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-139.178.70.11:22-5.135.90.165:37704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:23.885490 kubelet[2572]: E0213 10:01:23.885387 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:25.030438 kubelet[2572]: E0213 10:01:25.030369 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:25.885230 kubelet[2572]: E0213 10:01:25.885130 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:27.292764 systemd[1]: Started sshd@52-139.178.70.11:22-139.178.68.195:55946.service. Feb 13 10:01:27.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.11:22-139.178.68.195:55946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:27.320448 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:01:27.320500 kernel: audit: type=1130 audit(1707818487.292:1307): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.11:22-139.178.68.195:55946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:27.431000 audit[3700]: USER_ACCT pid=3700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.432090 sshd[3700]: Accepted publickey for core from 139.178.68.195 port 55946 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:27.434151 sshd[3700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:27.436552 systemd-logind[1462]: New session 12 of user core. Feb 13 10:01:27.437214 systemd[1]: Started session-12.scope. Feb 13 10:01:27.517480 sshd[3700]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:27.518952 systemd[1]: sshd@52-139.178.70.11:22-139.178.68.195:55946.service: Deactivated successfully. Feb 13 10:01:27.519407 systemd[1]: session-12.scope: Deactivated successfully. Feb 13 10:01:27.519779 systemd-logind[1462]: Session 12 logged out. Waiting for processes to exit. Feb 13 10:01:27.520378 systemd-logind[1462]: Removed session 12. Feb 13 10:01:27.433000 audit[3700]: CRED_ACQ pid=3700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.613817 kernel: audit: type=1101 audit(1707818487.431:1308): pid=3700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.613860 kernel: audit: type=1103 audit(1707818487.433:1309): pid=3700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.613879 kernel: audit: type=1006 audit(1707818487.433:1310): pid=3700 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 13 10:01:27.672354 kernel: audit: type=1300 audit(1707818487.433:1310): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9d46e40 a2=3 a3=0 items=0 ppid=1 pid=3700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:27.433000 audit[3700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd9d46e40 a2=3 a3=0 items=0 ppid=1 pid=3700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:27.764372 kernel: audit: type=1327 audit(1707818487.433:1310): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:27.433000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:27.794848 kernel: audit: type=1105 audit(1707818487.438:1311): pid=3700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.438000 audit[3700]: USER_START pid=3700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.884615 kubelet[2572]: E0213 10:01:27.884569 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:27.889378 kernel: audit: type=1103 audit(1707818487.439:1312): pid=3702 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.439000 audit[3702]: CRED_ACQ pid=3702 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.978570 kernel: audit: type=1106 audit(1707818487.517:1313): pid=3700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.517000 audit[3700]: USER_END pid=3700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:28.074197 kernel: audit: type=1104 audit(1707818487.517:1314): pid=3700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.517000 audit[3700]: CRED_DISP pid=3700 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:27.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-139.178.70.11:22-139.178.68.195:55946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:28.578244 systemd[1]: Started sshd@53-139.178.70.11:22-5.135.90.165:33630.service. Feb 13 10:01:28.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.70.11:22-5.135.90.165:33630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:28.731299 sshd[3726]: Unable to negotiate with 5.135.90.165 port 33630: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:28.733126 systemd[1]: sshd@53-139.178.70.11:22-5.135.90.165:33630.service: Deactivated successfully. Feb 13 10:01:28.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-139.178.70.11:22-5.135.90.165:33630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:29.379307 update_engine[1464]: I0213 10:01:29.379196 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:01:29.380058 update_engine[1464]: I0213 10:01:29.379622 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:01:29.380058 update_engine[1464]: E0213 10:01:29.379813 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:01:29.380058 update_engine[1464]: I0213 10:01:29.379973 1464 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 10:01:29.380058 update_engine[1464]: I0213 10:01:29.379989 1464 omaha_request_action.cc:621] Omaha request response: Feb 13 10:01:29.380382 update_engine[1464]: E0213 10:01:29.380126 1464 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380151 1464 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380159 1464 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380167 1464 update_attempter.cc:306] Processing Done. Feb 13 10:01:29.380382 update_engine[1464]: E0213 10:01:29.380192 1464 update_attempter.cc:619] Update failed. Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380200 1464 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380208 1464 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380216 1464 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 10:01:29.380382 update_engine[1464]: I0213 10:01:29.380355 1464 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.380401 1464 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.380410 1464 omaha_request_action.cc:271] Request: Feb 13 10:01:29.381173 update_engine[1464]: Feb 13 10:01:29.381173 update_engine[1464]: Feb 13 10:01:29.381173 update_engine[1464]: Feb 13 10:01:29.381173 update_engine[1464]: Feb 13 10:01:29.381173 update_engine[1464]: Feb 13 10:01:29.381173 update_engine[1464]: Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.380419 1464 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.380694 1464 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 10:01:29.381173 update_engine[1464]: E0213 10:01:29.380839 1464 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.380977 1464 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.380991 1464 omaha_request_action.cc:621] Omaha request response: Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.381000 1464 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.381007 1464 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.381014 1464 update_attempter.cc:306] Processing Done. Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.381021 1464 update_attempter.cc:310] Error event sent. Feb 13 10:01:29.381173 update_engine[1464]: I0213 10:01:29.381039 1464 update_check_scheduler.cc:74] Next update check in 44m41s Feb 13 10:01:29.382602 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 10:01:29.382602 locksmithd[1509]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 10:01:29.884589 kubelet[2572]: E0213 10:01:29.884544 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:30.031805 kubelet[2572]: E0213 10:01:30.031702 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:31.884478 kubelet[2572]: E0213 10:01:31.884364 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:32.524988 systemd[1]: Started sshd@54-139.178.70.11:22-139.178.68.195:55956.service. Feb 13 10:01:32.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.70.11:22-139.178.68.195:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:32.552518 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:01:32.552551 kernel: audit: type=1130 audit(1707818492.524:1318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.70.11:22-139.178.68.195:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:32.663000 audit[3730]: USER_ACCT pid=3730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.664427 sshd[3730]: Accepted publickey for core from 139.178.68.195 port 55956 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:32.666596 sshd[3730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:32.672574 systemd-logind[1462]: New session 13 of user core. Feb 13 10:01:32.673838 systemd[1]: Started session-13.scope. Feb 13 10:01:32.665000 audit[3730]: CRED_ACQ pid=3730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.758774 sshd[3730]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:32.760282 systemd[1]: sshd@54-139.178.70.11:22-139.178.68.195:55956.service: Deactivated successfully. Feb 13 10:01:32.760698 systemd[1]: session-13.scope: Deactivated successfully. Feb 13 10:01:32.761078 systemd-logind[1462]: Session 13 logged out. Waiting for processes to exit. Feb 13 10:01:32.761651 systemd-logind[1462]: Removed session 13. Feb 13 10:01:32.845922 kernel: audit: type=1101 audit(1707818492.663:1319): pid=3730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.845957 kernel: audit: type=1103 audit(1707818492.665:1320): pid=3730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.845972 kernel: audit: type=1006 audit(1707818492.665:1321): pid=3730 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 13 10:01:32.904474 kernel: audit: type=1300 audit(1707818492.665:1321): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec65d0140 a2=3 a3=0 items=0 ppid=1 pid=3730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:32.665000 audit[3730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec65d0140 a2=3 a3=0 items=0 ppid=1 pid=3730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:32.996395 kernel: audit: type=1327 audit(1707818492.665:1321): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:32.665000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:33.026866 kernel: audit: type=1105 audit(1707818492.679:1322): pid=3730 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.679000 audit[3730]: USER_START pid=3730 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:33.121334 kernel: audit: type=1103 audit(1707818492.681:1323): pid=3732 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.681000 audit[3732]: CRED_ACQ pid=3732 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:33.210671 kernel: audit: type=1106 audit(1707818492.758:1324): pid=3730 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.758000 audit[3730]: USER_END pid=3730 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:33.306172 kernel: audit: type=1104 audit(1707818492.758:1325): pid=3730 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.758000 audit[3730]: CRED_DISP pid=3730 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:32.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-139.178.70.11:22-139.178.68.195:55956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:33.885309 kubelet[2572]: E0213 10:01:33.885212 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:34.277931 systemd[1]: Started sshd@55-139.178.70.11:22-5.135.90.165:58044.service. Feb 13 10:01:34.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.70.11:22-5.135.90.165:58044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:34.435465 sshd[3756]: Unable to negotiate with 5.135.90.165 port 58044: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:34.437263 systemd[1]: sshd@55-139.178.70.11:22-5.135.90.165:58044.service: Deactivated successfully. Feb 13 10:01:34.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-139.178.70.11:22-5.135.90.165:58044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:35.033364 kubelet[2572]: E0213 10:01:35.033279 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:35.885001 kubelet[2572]: E0213 10:01:35.884906 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:37.767734 systemd[1]: Started sshd@56-139.178.70.11:22-139.178.68.195:59794.service. Feb 13 10:01:37.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.70.11:22-139.178.68.195:59794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:37.794608 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:01:37.794661 kernel: audit: type=1130 audit(1707818497.766:1329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.70.11:22-139.178.68.195:59794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:37.885148 kubelet[2572]: E0213 10:01:37.885107 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:37.905888 sshd[3762]: Accepted publickey for core from 139.178.68.195 port 59794 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:37.904000 audit[3762]: USER_ACCT pid=3762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:37.907570 sshd[3762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:37.910191 systemd-logind[1462]: New session 14 of user core. Feb 13 10:01:37.910684 systemd[1]: Started session-14.scope. Feb 13 10:01:37.906000 audit[3762]: CRED_ACQ pid=3762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.003499 sshd[3762]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:38.004890 systemd[1]: sshd@56-139.178.70.11:22-139.178.68.195:59794.service: Deactivated successfully. Feb 13 10:01:38.005314 systemd[1]: session-14.scope: Deactivated successfully. Feb 13 10:01:38.005718 systemd-logind[1462]: Session 14 logged out. Waiting for processes to exit. Feb 13 10:01:38.006279 systemd-logind[1462]: Removed session 14. Feb 13 10:01:38.089901 kernel: audit: type=1101 audit(1707818497.904:1330): pid=3762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.089935 kernel: audit: type=1103 audit(1707818497.906:1331): pid=3762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.089951 kernel: audit: type=1006 audit(1707818497.906:1332): pid=3762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 13 10:01:37.906000 audit[3762]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe446353a0 a2=3 a3=0 items=0 ppid=1 pid=3762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:38.240653 kernel: audit: type=1300 audit(1707818497.906:1332): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe446353a0 a2=3 a3=0 items=0 ppid=1 pid=3762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:38.240684 kernel: audit: type=1327 audit(1707818497.906:1332): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:37.906000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:38.271181 kernel: audit: type=1105 audit(1707818497.912:1333): pid=3762 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:37.912000 audit[3762]: USER_START pid=3762 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.365744 kernel: audit: type=1103 audit(1707818497.913:1334): pid=3764 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:37.913000 audit[3764]: CRED_ACQ pid=3764 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.455028 kernel: audit: type=1106 audit(1707818498.003:1335): pid=3762 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.003000 audit[3762]: USER_END pid=3762 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.550653 kernel: audit: type=1104 audit(1707818498.003:1336): pid=3762 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.003000 audit[3762]: CRED_DISP pid=3762 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:38.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-139.178.70.11:22-139.178.68.195:59794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:39.885372 kubelet[2572]: E0213 10:01:39.885301 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:40.035610 kubelet[2572]: E0213 10:01:40.035536 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:40.370090 systemd[1]: Started sshd@57-139.178.70.11:22-5.135.90.165:54076.service. Feb 13 10:01:40.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.70.11:22-5.135.90.165:54076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:40.549388 sshd[3788]: Unable to negotiate with 5.135.90.165 port 54076: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:40.551338 systemd[1]: sshd@57-139.178.70.11:22-5.135.90.165:54076.service: Deactivated successfully. Feb 13 10:01:40.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-139.178.70.11:22-5.135.90.165:54076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:41.884418 kubelet[2572]: E0213 10:01:41.884334 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:43.013811 systemd[1]: Started sshd@58-139.178.70.11:22-139.178.68.195:59804.service. Feb 13 10:01:43.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.70.11:22-139.178.68.195:59804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:43.040808 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:01:43.040865 kernel: audit: type=1130 audit(1707818503.013:1340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.70.11:22-139.178.68.195:59804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:43.150991 sshd[3792]: Accepted publickey for core from 139.178.68.195 port 59804 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:43.150000 audit[3792]: USER_ACCT pid=3792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.153887 sshd[3792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:43.156293 systemd-logind[1462]: New session 15 of user core. Feb 13 10:01:43.156779 systemd[1]: Started session-15.scope. Feb 13 10:01:43.235842 sshd[3792]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:43.237210 systemd[1]: sshd@58-139.178.70.11:22-139.178.68.195:59804.service: Deactivated successfully. Feb 13 10:01:43.237638 systemd[1]: session-15.scope: Deactivated successfully. Feb 13 10:01:43.238009 systemd-logind[1462]: Session 15 logged out. Waiting for processes to exit. Feb 13 10:01:43.238527 systemd-logind[1462]: Removed session 15. Feb 13 10:01:43.152000 audit[3792]: CRED_ACQ pid=3792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.332928 kernel: audit: type=1101 audit(1707818503.150:1341): pid=3792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.332963 kernel: audit: type=1103 audit(1707818503.152:1342): pid=3792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.332984 kernel: audit: type=1006 audit(1707818503.152:1343): pid=3792 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 13 10:01:43.391459 kernel: audit: type=1300 audit(1707818503.152:1343): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9419040 a2=3 a3=0 items=0 ppid=1 pid=3792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:43.152000 audit[3792]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9419040 a2=3 a3=0 items=0 ppid=1 pid=3792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:43.483575 kernel: audit: type=1327 audit(1707818503.152:1343): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:43.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:43.514074 kernel: audit: type=1105 audit(1707818503.158:1344): pid=3792 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.158000 audit[3792]: USER_START pid=3792 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.158000 audit[3794]: CRED_ACQ pid=3794 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.697757 kernel: audit: type=1103 audit(1707818503.158:1345): pid=3794 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.697799 kernel: audit: type=1106 audit(1707818503.235:1346): pid=3792 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.235000 audit[3792]: USER_END pid=3792 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.793270 kernel: audit: type=1104 audit(1707818503.235:1347): pid=3792 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.235000 audit[3792]: CRED_DISP pid=3792 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:43.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-139.178.70.11:22-139.178.68.195:59804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:43.885089 kubelet[2572]: E0213 10:01:43.885068 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:45.037125 kubelet[2572]: E0213 10:01:45.037034 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:45.873827 systemd[1]: Started sshd@59-139.178.70.11:22-5.135.90.165:50056.service. Feb 13 10:01:45.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.70.11:22-5.135.90.165:50056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:45.884452 kubelet[2572]: E0213 10:01:45.884411 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:46.030986 sshd[3818]: Unable to negotiate with 5.135.90.165 port 50056: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:46.032821 systemd[1]: sshd@59-139.178.70.11:22-5.135.90.165:50056.service: Deactivated successfully. Feb 13 10:01:46.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-139.178.70.11:22-5.135.90.165:50056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:46.210000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.210000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.210000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0007541a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:01:46.210000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00123d950 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:01:46.210000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:01:46.210000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:01:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c6f5470 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:01:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:01:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00c1280c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:01:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:01:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00c19b3b0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:01:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:01:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f774000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:01:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:01:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00542ed80 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:01:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:01:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0049f3140 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:01:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:01:47.885553 kubelet[2572]: E0213 10:01:47.885480 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:48.245397 systemd[1]: Started sshd@60-139.178.70.11:22-139.178.68.195:42700.service. Feb 13 10:01:48.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.70.11:22-139.178.68.195:42700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:48.272883 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 10:01:48.272939 kernel: audit: type=1130 audit(1707818508.244:1359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.70.11:22-139.178.68.195:42700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:48.383000 audit[3822]: USER_ACCT pid=3822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.384186 sshd[3822]: Accepted publickey for core from 139.178.68.195 port 42700 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:48.385744 sshd[3822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:48.388347 systemd-logind[1462]: New session 16 of user core. Feb 13 10:01:48.388922 systemd[1]: Started session-16.scope. Feb 13 10:01:48.470220 sshd[3822]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:48.471676 systemd[1]: sshd@60-139.178.70.11:22-139.178.68.195:42700.service: Deactivated successfully. Feb 13 10:01:48.472146 systemd[1]: session-16.scope: Deactivated successfully. Feb 13 10:01:48.472544 systemd-logind[1462]: Session 16 logged out. Waiting for processes to exit. Feb 13 10:01:48.473117 systemd-logind[1462]: Removed session 16. Feb 13 10:01:48.384000 audit[3822]: CRED_ACQ pid=3822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.567820 kernel: audit: type=1101 audit(1707818508.383:1360): pid=3822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.567869 kernel: audit: type=1103 audit(1707818508.384:1361): pid=3822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.567887 kernel: audit: type=1006 audit(1707818508.384:1362): pid=3822 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 13 10:01:48.626385 kernel: audit: type=1300 audit(1707818508.384:1362): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6575f950 a2=3 a3=0 items=0 ppid=1 pid=3822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:48.384000 audit[3822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6575f950 a2=3 a3=0 items=0 ppid=1 pid=3822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:48.718325 kernel: audit: type=1327 audit(1707818508.384:1362): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:48.384000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:48.748819 kernel: audit: type=1105 audit(1707818508.390:1363): pid=3822 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.390000 audit[3822]: USER_START pid=3822 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.843265 kernel: audit: type=1103 audit(1707818508.391:1364): pid=3824 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.391000 audit[3824]: CRED_ACQ pid=3824 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.932393 kernel: audit: type=1106 audit(1707818508.470:1365): pid=3822 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.470000 audit[3822]: USER_END pid=3822 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:49.027852 kernel: audit: type=1104 audit(1707818508.470:1366): pid=3822 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.470000 audit[3822]: CRED_DISP pid=3822 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:48.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-139.178.70.11:22-139.178.68.195:42700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:49.884367 kubelet[2572]: E0213 10:01:49.884348 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:50.036000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:50.036000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000754620 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:01:50.036000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:01:50.037997 kubelet[2572]: E0213 10:01:50.037931 2572 kubelet.go:2855] "Container runtime network not ready" networkReady="NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" Feb 13 10:01:50.037000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:50.037000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a2ad40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:01:50.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:01:50.037000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:50.037000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a2ad60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:01:50.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:01:50.039000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:01:50.039000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00283bbe0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:01:50.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:01:51.002410 systemd[1]: Started sshd@61-139.178.70.11:22-5.135.90.165:46158.service. Feb 13 10:01:51.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.70.11:22-5.135.90.165:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:51.117337 env[1474]: time="2024-02-13T10:01:51.117311848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:01:51.117816 env[1474]: time="2024-02-13T10:01:51.117803795Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:01:51.118653 env[1474]: time="2024-02-13T10:01:51.118642796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:01:51.119784 env[1474]: time="2024-02-13T10:01:51.119767943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:01:51.120100 env[1474]: time="2024-02-13T10:01:51.120051690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 13 10:01:51.131825 env[1474]: time="2024-02-13T10:01:51.131810586Z" level=info msg="CreateContainer within sandbox \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 13 10:01:51.136385 env[1474]: time="2024-02-13T10:01:51.136339488Z" level=info msg="CreateContainer within sandbox \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db\"" Feb 13 10:01:51.136693 env[1474]: time="2024-02-13T10:01:51.136629685Z" level=info msg="StartContainer for \"e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db\"" Feb 13 10:01:51.147549 systemd[1]: Started cri-containerd-e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db.scope. Feb 13 10:01:51.150567 sshd[3850]: Unable to negotiate with 5.135.90.165 port 46158: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:51.150997 systemd[1]: sshd@61-139.178.70.11:22-5.135.90.165:46158.service: Deactivated successfully. Feb 13 10:01:51.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-139.178.70.11:22-5.135.90.165:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f0947b4e1a8 items=0 ppid=3132 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:51.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366132396433656563613530326539643539383364396330663566 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit: BPF prog-id=139 op=LOAD Feb 13 10:01:51.153000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f7f68 items=0 ppid=3132 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:51.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366132396433656563613530326539643539383364396330663566 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit: BPF prog-id=140 op=LOAD Feb 13 10:01:51.153000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f7fb8 items=0 ppid=3132 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:51.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366132396433656563613530326539643539383364396330663566 Feb 13 10:01:51.153000 audit: BPF prog-id=140 op=UNLOAD Feb 13 10:01:51.153000 audit: BPF prog-id=139 op=UNLOAD Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:01:51.153000 audit: BPF prog-id=141 op=LOAD Feb 13 10:01:51.153000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e8048 items=0 ppid=3132 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:51.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533366132396433656563613530326539643539383364396330663566 Feb 13 10:01:51.160608 env[1474]: time="2024-02-13T10:01:51.160561785Z" level=info msg="StartContainer for \"e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db\" returns successfully" Feb 13 10:01:51.818903 systemd[1]: cri-containerd-e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db.scope: Deactivated successfully. Feb 13 10:01:51.836000 audit: BPF prog-id=141 op=UNLOAD Feb 13 10:01:51.884468 kubelet[2572]: E0213 10:01:51.884366 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:52.140032 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db-rootfs.mount: Deactivated successfully. Feb 13 10:01:52.253888 env[1474]: time="2024-02-13T10:01:52.253731348Z" level=info msg="shim disconnected" id=e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db Feb 13 10:01:52.254728 env[1474]: time="2024-02-13T10:01:52.253903809Z" level=warning msg="cleaning up after shim disconnected" id=e36a29d3eeca502e9d5983d9c0f5f1232f12bda3eb6db3ce6638d527722799db namespace=k8s.io Feb 13 10:01:52.254728 env[1474]: time="2024-02-13T10:01:52.253941679Z" level=info msg="cleaning up dead shim" Feb 13 10:01:52.269617 env[1474]: time="2024-02-13T10:01:52.269510620Z" level=warning msg="cleanup warnings time=\"2024-02-13T10:01:52Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3923 runtime=io.containerd.runc.v2\n" Feb 13 10:01:53.034615 env[1474]: time="2024-02-13T10:01:53.034539880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 13 10:01:53.479317 systemd[1]: Started sshd@62-139.178.70.11:22-139.178.68.195:42702.service. Feb 13 10:01:53.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.70.11:22-139.178.68.195:42702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:53.506408 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 13 10:01:53.506485 kernel: audit: type=1130 audit(1707818513.478:1381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.70.11:22-139.178.68.195:42702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:53.616000 audit[3936]: USER_ACCT pid=3936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.617733 sshd[3936]: Accepted publickey for core from 139.178.68.195 port 42702 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:53.620125 sshd[3936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:53.622575 systemd-logind[1462]: New session 17 of user core. Feb 13 10:01:53.623157 systemd[1]: Started session-17.scope. Feb 13 10:01:53.703629 sshd[3936]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:53.705071 systemd[1]: sshd@62-139.178.70.11:22-139.178.68.195:42702.service: Deactivated successfully. Feb 13 10:01:53.705485 systemd[1]: session-17.scope: Deactivated successfully. Feb 13 10:01:53.705801 systemd-logind[1462]: Session 17 logged out. Waiting for processes to exit. Feb 13 10:01:53.706372 systemd-logind[1462]: Removed session 17. Feb 13 10:01:53.619000 audit[3936]: CRED_ACQ pid=3936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.801033 kernel: audit: type=1101 audit(1707818513.616:1382): pid=3936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.801066 kernel: audit: type=1103 audit(1707818513.619:1383): pid=3936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.801082 kernel: audit: type=1006 audit(1707818513.619:1384): pid=3936 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 13 10:01:53.859501 kernel: audit: type=1300 audit(1707818513.619:1384): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ef9c3a0 a2=3 a3=0 items=0 ppid=1 pid=3936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:53.619000 audit[3936]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ef9c3a0 a2=3 a3=0 items=0 ppid=1 pid=3936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:53.884608 kubelet[2572]: E0213 10:01:53.884570 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:53.951439 kernel: audit: type=1327 audit(1707818513.619:1384): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:53.619000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:53.981908 kernel: audit: type=1105 audit(1707818513.624:1385): pid=3936 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.624000 audit[3936]: USER_START pid=3936 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:54.076299 kernel: audit: type=1103 audit(1707818513.625:1386): pid=3938 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.625000 audit[3938]: CRED_ACQ pid=3938 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:54.165452 kernel: audit: type=1106 audit(1707818513.703:1387): pid=3936 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.703000 audit[3936]: USER_END pid=3936 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:54.260875 kernel: audit: type=1104 audit(1707818513.703:1388): pid=3936 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.703000 audit[3936]: CRED_DISP pid=3936 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:53.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-139.178.70.11:22-139.178.68.195:42702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:55.897048 systemd[1]: Created slice kubepods-besteffort-pod25321284_19a1_4fad_84b5_db985c324966.slice. Feb 13 10:01:55.901706 env[1474]: time="2024-02-13T10:01:55.901589795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w8rcv,Uid:25321284-19a1-4fad-84b5-db985c324966,Namespace:calico-system,Attempt:0,}" Feb 13 10:01:55.938042 env[1474]: time="2024-02-13T10:01:55.937970165Z" level=error msg="Failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:55.938204 env[1474]: time="2024-02-13T10:01:55.938185785Z" level=error msg="encountered an error cleaning up failed sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:55.938250 env[1474]: time="2024-02-13T10:01:55.938216734Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w8rcv,Uid:25321284-19a1-4fad-84b5-db985c324966,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:55.938420 kubelet[2572]: E0213 10:01:55.938405 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:55.938612 kubelet[2572]: E0213 10:01:55.938458 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w8rcv" Feb 13 10:01:55.938612 kubelet[2572]: E0213 10:01:55.938478 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w8rcv" Feb 13 10:01:55.938612 kubelet[2572]: E0213 10:01:55.938525 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-w8rcv_calico-system(25321284-19a1-4fad-84b5-db985c324966)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-w8rcv_calico-system(25321284-19a1-4fad-84b5-db985c324966)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:55.939255 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f-shm.mount: Deactivated successfully. Feb 13 10:01:56.041318 kubelet[2572]: I0213 10:01:56.041231 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:01:56.042499 env[1474]: time="2024-02-13T10:01:56.042372355Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:01:56.091926 env[1474]: time="2024-02-13T10:01:56.091804433Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:56.092226 kubelet[2572]: E0213 10:01:56.092169 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:01:56.092369 kubelet[2572]: E0213 10:01:56.092356 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:01:56.092438 kubelet[2572]: E0213 10:01:56.092410 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:01:56.092549 kubelet[2572]: E0213 10:01:56.092466 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:01:56.583910 systemd[1]: Started sshd@63-139.178.70.11:22-5.135.90.165:42124.service. Feb 13 10:01:56.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.70.11:22-5.135.90.165:42124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:56.752452 sshd[4040]: Unable to negotiate with 5.135.90.165 port 42124: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:01:56.754239 systemd[1]: sshd@63-139.178.70.11:22-5.135.90.165:42124.service: Deactivated successfully. Feb 13 10:01:56.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-139.178.70.11:22-5.135.90.165:42124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:58.069099 kubelet[2572]: I0213 10:01:58.069016 2572 topology_manager.go:215] "Topology Admit Handler" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" podNamespace="kube-system" podName="coredns-5dd5756b68-p4vct" Feb 13 10:01:58.070319 kubelet[2572]: I0213 10:01:58.070200 2572 topology_manager.go:215] "Topology Admit Handler" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" podNamespace="kube-system" podName="coredns-5dd5756b68-npfv4" Feb 13 10:01:58.071343 kubelet[2572]: I0213 10:01:58.071288 2572 topology_manager.go:215] "Topology Admit Handler" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" podNamespace="calico-system" podName="calico-kube-controllers-7cdb6b9d57-v78qf" Feb 13 10:01:58.083263 systemd[1]: Created slice kubepods-burstable-podb217c7e3_c759_42d3_a900_2c8ca05116be.slice. Feb 13 10:01:58.095450 systemd[1]: Created slice kubepods-burstable-pod3e331d8a_1c45_4abd_a1a9_e47f55bcb21d.slice. Feb 13 10:01:58.107308 systemd[1]: Created slice kubepods-besteffort-pod46bb237c_2abc_45ef_94ac_007ed36d6a43.slice. Feb 13 10:01:58.220065 kubelet[2572]: I0213 10:01:58.219961 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/46bb237c-2abc-45ef-94ac-007ed36d6a43-tigera-ca-bundle\") pod \"calico-kube-controllers-7cdb6b9d57-v78qf\" (UID: \"46bb237c-2abc-45ef-94ac-007ed36d6a43\") " pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" Feb 13 10:01:58.220065 kubelet[2572]: I0213 10:01:58.220064 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b217c7e3-c759-42d3-a900-2c8ca05116be-config-volume\") pod \"coredns-5dd5756b68-p4vct\" (UID: \"b217c7e3-c759-42d3-a900-2c8ca05116be\") " pod="kube-system/coredns-5dd5756b68-p4vct" Feb 13 10:01:58.220465 kubelet[2572]: I0213 10:01:58.220317 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-49fvl\" (UniqueName: \"kubernetes.io/projected/b217c7e3-c759-42d3-a900-2c8ca05116be-kube-api-access-49fvl\") pod \"coredns-5dd5756b68-p4vct\" (UID: \"b217c7e3-c759-42d3-a900-2c8ca05116be\") " pod="kube-system/coredns-5dd5756b68-p4vct" Feb 13 10:01:58.220593 kubelet[2572]: I0213 10:01:58.220491 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3e331d8a-1c45-4abd-a1a9-e47f55bcb21d-config-volume\") pod \"coredns-5dd5756b68-npfv4\" (UID: \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\") " pod="kube-system/coredns-5dd5756b68-npfv4" Feb 13 10:01:58.220703 kubelet[2572]: I0213 10:01:58.220618 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xb587\" (UniqueName: \"kubernetes.io/projected/3e331d8a-1c45-4abd-a1a9-e47f55bcb21d-kube-api-access-xb587\") pod \"coredns-5dd5756b68-npfv4\" (UID: \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\") " pod="kube-system/coredns-5dd5756b68-npfv4" Feb 13 10:01:58.220807 kubelet[2572]: I0213 10:01:58.220749 2572 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vzbqz\" (UniqueName: \"kubernetes.io/projected/46bb237c-2abc-45ef-94ac-007ed36d6a43-kube-api-access-vzbqz\") pod \"calico-kube-controllers-7cdb6b9d57-v78qf\" (UID: \"46bb237c-2abc-45ef-94ac-007ed36d6a43\") " pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" Feb 13 10:01:58.390376 env[1474]: time="2024-02-13T10:01:58.390148552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-p4vct,Uid:b217c7e3-c759-42d3-a900-2c8ca05116be,Namespace:kube-system,Attempt:0,}" Feb 13 10:01:58.401439 env[1474]: time="2024-02-13T10:01:58.401331273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-npfv4,Uid:3e331d8a-1c45-4abd-a1a9-e47f55bcb21d,Namespace:kube-system,Attempt:0,}" Feb 13 10:01:58.412763 env[1474]: time="2024-02-13T10:01:58.412659519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cdb6b9d57-v78qf,Uid:46bb237c-2abc-45ef-94ac-007ed36d6a43,Namespace:calico-system,Attempt:0,}" Feb 13 10:01:58.457758 env[1474]: time="2024-02-13T10:01:58.457718239Z" level=error msg="Failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.458005 env[1474]: time="2024-02-13T10:01:58.457957272Z" level=error msg="encountered an error cleaning up failed sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.458005 env[1474]: time="2024-02-13T10:01:58.457995317Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-p4vct,Uid:b217c7e3-c759-42d3-a900-2c8ca05116be,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.458205 kubelet[2572]: E0213 10:01:58.458165 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.458254 kubelet[2572]: E0213 10:01:58.458208 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-p4vct" Feb 13 10:01:58.458254 kubelet[2572]: E0213 10:01:58.458226 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-p4vct" Feb 13 10:01:58.458305 kubelet[2572]: E0213 10:01:58.458268 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-p4vct_kube-system(b217c7e3-c759-42d3-a900-2c8ca05116be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-p4vct_kube-system(b217c7e3-c759-42d3-a900-2c8ca05116be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:01:58.459679 env[1474]: time="2024-02-13T10:01:58.459657645Z" level=error msg="Failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.459839 env[1474]: time="2024-02-13T10:01:58.459821908Z" level=error msg="encountered an error cleaning up failed sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.459881 env[1474]: time="2024-02-13T10:01:58.459856888Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-npfv4,Uid:3e331d8a-1c45-4abd-a1a9-e47f55bcb21d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.459993 kubelet[2572]: E0213 10:01:58.459982 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.460034 kubelet[2572]: E0213 10:01:58.460011 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-npfv4" Feb 13 10:01:58.460034 kubelet[2572]: E0213 10:01:58.460025 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-npfv4" Feb 13 10:01:58.460084 kubelet[2572]: E0213 10:01:58.460054 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-npfv4_kube-system(3e331d8a-1c45-4abd-a1a9-e47f55bcb21d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-npfv4_kube-system(3e331d8a-1c45-4abd-a1a9-e47f55bcb21d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:01:58.462544 env[1474]: time="2024-02-13T10:01:58.462494318Z" level=error msg="Failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.462677 env[1474]: time="2024-02-13T10:01:58.462660962Z" level=error msg="encountered an error cleaning up failed sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.462703 env[1474]: time="2024-02-13T10:01:58.462689602Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cdb6b9d57-v78qf,Uid:46bb237c-2abc-45ef-94ac-007ed36d6a43,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.462805 kubelet[2572]: E0213 10:01:58.462795 2572 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:58.462838 kubelet[2572]: E0213 10:01:58.462824 2572 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" Feb 13 10:01:58.462876 kubelet[2572]: E0213 10:01:58.462839 2572 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" Feb 13 10:01:58.462902 kubelet[2572]: E0213 10:01:58.462883 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7cdb6b9d57-v78qf_calico-system(46bb237c-2abc-45ef-94ac-007ed36d6a43)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7cdb6b9d57-v78qf_calico-system(46bb237c-2abc-45ef-94ac-007ed36d6a43)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:01:58.713992 systemd[1]: Started sshd@64-139.178.70.11:22-139.178.68.195:55288.service. Feb 13 10:01:58.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.70.11:22-139.178.68.195:55288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:58.754919 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:01:58.755007 kernel: audit: type=1130 audit(1707818518.713:1392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.70.11:22-139.178.68.195:55288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:01:58.865000 audit[4204]: USER_ACCT pid=4204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.866314 sshd[4204]: Accepted publickey for core from 139.178.68.195 port 55288 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:01:58.870040 sshd[4204]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:01:58.875645 systemd-logind[1462]: New session 18 of user core. Feb 13 10:01:58.877021 systemd[1]: Started session-18.scope. Feb 13 10:01:58.868000 audit[4204]: CRED_ACQ pid=4204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.962498 sshd[4204]: pam_unix(sshd:session): session closed for user core Feb 13 10:01:58.963986 systemd[1]: sshd@64-139.178.70.11:22-139.178.68.195:55288.service: Deactivated successfully. Feb 13 10:01:58.964419 systemd[1]: session-18.scope: Deactivated successfully. Feb 13 10:01:58.964770 systemd-logind[1462]: Session 18 logged out. Waiting for processes to exit. Feb 13 10:01:58.965163 systemd-logind[1462]: Removed session 18. Feb 13 10:01:59.047903 kernel: audit: type=1101 audit(1707818518.865:1393): pid=4204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:59.047944 kernel: audit: type=1103 audit(1707818518.868:1394): pid=4204 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:59.047963 kernel: audit: type=1006 audit(1707818518.868:1395): pid=4204 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 13 10:01:59.048995 kubelet[2572]: I0213 10:01:59.048985 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:01:59.049280 env[1474]: time="2024-02-13T10:01:59.049263382Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:01:59.049387 kubelet[2572]: I0213 10:01:59.049379 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:01:59.049601 env[1474]: time="2024-02-13T10:01:59.049587501Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:01:59.049796 kubelet[2572]: I0213 10:01:59.049787 2572 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:01:59.049983 env[1474]: time="2024-02-13T10:01:59.049970736Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:01:59.062249 env[1474]: time="2024-02-13T10:01:59.062213436Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:59.062447 env[1474]: time="2024-02-13T10:01:59.062398555Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:59.062488 kubelet[2572]: E0213 10:01:59.062422 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:01:59.062488 kubelet[2572]: E0213 10:01:59.062456 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:01:59.062488 kubelet[2572]: E0213 10:01:59.062483 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:01:59.062579 kubelet[2572]: E0213 10:01:59.062498 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:01:59.062579 kubelet[2572]: E0213 10:01:59.062507 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:01:59.062579 kubelet[2572]: E0213 10:01:59.062514 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:01:59.062579 kubelet[2572]: E0213 10:01:59.062534 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:01:59.062682 kubelet[2572]: E0213 10:01:59.062548 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:01:59.065272 env[1474]: time="2024-02-13T10:01:59.065219894Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:01:59.065365 kubelet[2572]: E0213 10:01:59.065322 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:01:59.065365 kubelet[2572]: E0213 10:01:59.065337 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:01:59.065365 kubelet[2572]: E0213 10:01:59.065354 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:01:59.065456 kubelet[2572]: E0213 10:01:59.065368 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:01:59.106534 kernel: audit: type=1300 audit(1707818518.868:1395): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8474860 a2=3 a3=0 items=0 ppid=1 pid=4204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:58.868000 audit[4204]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8474860 a2=3 a3=0 items=0 ppid=1 pid=4204 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:01:59.198512 kernel: audit: type=1327 audit(1707818518.868:1395): proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:58.868000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:01:59.228995 kernel: audit: type=1105 audit(1707818518.882:1396): pid=4204 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.882000 audit[4204]: USER_START pid=4204 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:59.323475 kernel: audit: type=1103 audit(1707818518.883:1397): pid=4206 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.883000 audit[4206]: CRED_ACQ pid=4206 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:59.334642 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c-shm.mount: Deactivated successfully. Feb 13 10:01:59.334692 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1-shm.mount: Deactivated successfully. Feb 13 10:01:59.412673 kernel: audit: type=1106 audit(1707818518.962:1398): pid=4204 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.962000 audit[4204]: USER_END pid=4204 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:59.508214 kernel: audit: type=1104 audit(1707818518.962:1399): pid=4204 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.962000 audit[4204]: CRED_DISP pid=4204 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:01:58.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-139.178.70.11:22-139.178.68.195:55288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:02.357944 systemd[1]: Started sshd@65-139.178.70.11:22-5.135.90.165:38164.service. Feb 13 10:02:02.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.70.11:22-5.135.90.165:38164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:02.517728 sshd[4320]: Unable to negotiate with 5.135.90.165 port 38164: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:02.519508 systemd[1]: sshd@65-139.178.70.11:22-5.135.90.165:38164.service: Deactivated successfully. Feb 13 10:02:02.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-139.178.70.11:22-5.135.90.165:38164 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:03.964953 systemd[1]: Started sshd@66-139.178.70.11:22-139.178.68.195:55292.service. Feb 13 10:02:03.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.70.11:22-139.178.68.195:55292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:03.992063 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:03.992114 kernel: audit: type=1130 audit(1707818523.964:1403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.70.11:22-139.178.68.195:55292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:04.102000 audit[4324]: USER_ACCT pid=4324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.103495 sshd[4324]: Accepted publickey for core from 139.178.68.195 port 55292 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:04.104732 sshd[4324]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:04.107114 systemd-logind[1462]: New session 19 of user core. Feb 13 10:02:04.107830 systemd[1]: Started session-19.scope. Feb 13 10:02:04.103000 audit[4324]: CRED_ACQ pid=4324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.198590 sshd[4324]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:04.200100 systemd[1]: sshd@66-139.178.70.11:22-139.178.68.195:55292.service: Deactivated successfully. Feb 13 10:02:04.200575 systemd[1]: session-19.scope: Deactivated successfully. Feb 13 10:02:04.200926 systemd-logind[1462]: Session 19 logged out. Waiting for processes to exit. Feb 13 10:02:04.201364 systemd-logind[1462]: Removed session 19. Feb 13 10:02:04.285365 kernel: audit: type=1101 audit(1707818524.102:1404): pid=4324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.285403 kernel: audit: type=1103 audit(1707818524.103:1405): pid=4324 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.285424 kernel: audit: type=1006 audit(1707818524.103:1406): pid=4324 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 13 10:02:04.103000 audit[4324]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe906f95b0 a2=3 a3=0 items=0 ppid=1 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:04.435992 kernel: audit: type=1300 audit(1707818524.103:1406): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe906f95b0 a2=3 a3=0 items=0 ppid=1 pid=4324 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:04.436023 kernel: audit: type=1327 audit(1707818524.103:1406): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:04.103000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:04.466492 kernel: audit: type=1105 audit(1707818524.109:1407): pid=4324 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.109000 audit[4324]: USER_START pid=4324 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.560984 kernel: audit: type=1103 audit(1707818524.109:1408): pid=4326 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.109000 audit[4326]: CRED_ACQ pid=4326 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.650264 kernel: audit: type=1106 audit(1707818524.198:1409): pid=4324 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.198000 audit[4324]: USER_END pid=4324 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.745780 kernel: audit: type=1104 audit(1707818524.198:1410): pid=4324 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.198000 audit[4324]: CRED_DISP pid=4324 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:04.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-139.178.70.11:22-139.178.68.195:55292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:07.534326 systemd[1]: Started sshd@67-139.178.70.11:22-5.135.90.165:34420.service. Feb 13 10:02:07.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.70.11:22-5.135.90.165:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:07.691993 sshd[4351]: Unable to negotiate with 5.135.90.165 port 34420: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:07.692466 systemd[1]: sshd@67-139.178.70.11:22-5.135.90.165:34420.service: Deactivated successfully. Feb 13 10:02:07.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-139.178.70.11:22-5.135.90.165:34420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:09.208421 systemd[1]: Started sshd@68-139.178.70.11:22-139.178.68.195:44352.service. Feb 13 10:02:09.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.70.11:22-139.178.68.195:44352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:09.235646 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:09.235673 kernel: audit: type=1130 audit(1707818529.207:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.70.11:22-139.178.68.195:44352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:09.345000 audit[4355]: USER_ACCT pid=4355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.346468 sshd[4355]: Accepted publickey for core from 139.178.68.195 port 44352 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:09.347161 sshd[4355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:09.349616 systemd-logind[1462]: New session 20 of user core. Feb 13 10:02:09.350345 systemd[1]: Started session-20.scope. Feb 13 10:02:09.428907 sshd[4355]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:09.430372 systemd[1]: sshd@68-139.178.70.11:22-139.178.68.195:44352.service: Deactivated successfully. Feb 13 10:02:09.430817 systemd[1]: session-20.scope: Deactivated successfully. Feb 13 10:02:09.431208 systemd-logind[1462]: Session 20 logged out. Waiting for processes to exit. Feb 13 10:02:09.431635 systemd-logind[1462]: Removed session 20. Feb 13 10:02:09.346000 audit[4355]: CRED_ACQ pid=4355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.528277 kernel: audit: type=1101 audit(1707818529.345:1415): pid=4355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.528320 kernel: audit: type=1103 audit(1707818529.346:1416): pid=4355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.528342 kernel: audit: type=1006 audit(1707818529.346:1417): pid=4355 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 13 10:02:09.346000 audit[4355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde5b2e60 a2=3 a3=0 items=0 ppid=1 pid=4355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:09.586887 kernel: audit: type=1300 audit(1707818529.346:1417): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde5b2e60 a2=3 a3=0 items=0 ppid=1 pid=4355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:09.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:09.709317 kernel: audit: type=1327 audit(1707818529.346:1417): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:09.709347 kernel: audit: type=1105 audit(1707818529.351:1418): pid=4355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.351000 audit[4355]: USER_START pid=4355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.803703 kernel: audit: type=1103 audit(1707818529.352:1419): pid=4357 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.352000 audit[4357]: CRED_ACQ pid=4357 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.892837 kernel: audit: type=1106 audit(1707818529.428:1420): pid=4355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.428000 audit[4355]: USER_END pid=4355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.988453 kernel: audit: type=1104 audit(1707818529.428:1421): pid=4355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.428000 audit[4355]: CRED_DISP pid=4355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:09.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-139.178.70.11:22-139.178.68.195:44352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:11.885305 env[1474]: time="2024-02-13T10:02:11.885266226Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:02:11.885305 env[1474]: time="2024-02-13T10:02:11.885279233Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:02:11.903025 env[1474]: time="2024-02-13T10:02:11.902950046Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:11.903205 kubelet[2572]: E0213 10:02:11.903170 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:02:11.903205 kubelet[2572]: E0213 10:02:11.903206 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:02:11.903450 kubelet[2572]: E0213 10:02:11.903237 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:11.903450 kubelet[2572]: E0213 10:02:11.903262 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:02:11.904816 env[1474]: time="2024-02-13T10:02:11.904769179Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:11.904958 kubelet[2572]: E0213 10:02:11.904921 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:02:11.904958 kubelet[2572]: E0213 10:02:11.904949 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:02:11.905047 kubelet[2572]: E0213 10:02:11.904976 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:11.905047 kubelet[2572]: E0213 10:02:11.904997 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:02:12.886309 env[1474]: time="2024-02-13T10:02:12.886207396Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:02:12.912946 env[1474]: time="2024-02-13T10:02:12.912901469Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:12.913161 kubelet[2572]: E0213 10:02:12.913118 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:02:12.913161 kubelet[2572]: E0213 10:02:12.913152 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:02:12.913369 kubelet[2572]: E0213 10:02:12.913178 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:12.913369 kubelet[2572]: E0213 10:02:12.913202 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:02:13.150470 systemd[1]: Started sshd@69-139.178.70.11:22-5.135.90.165:58528.service. Feb 13 10:02:13.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.70.11:22-5.135.90.165:58528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:13.326470 sshd[4470]: Unable to negotiate with 5.135.90.165 port 58528: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:13.327829 systemd[1]: sshd@69-139.178.70.11:22-5.135.90.165:58528.service: Deactivated successfully. Feb 13 10:02:13.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-139.178.70.11:22-5.135.90.165:58528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:13.886587 env[1474]: time="2024-02-13T10:02:13.886445313Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:02:13.928711 env[1474]: time="2024-02-13T10:02:13.928644980Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:13.928905 kubelet[2572]: E0213 10:02:13.928867 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:02:13.929066 kubelet[2572]: E0213 10:02:13.928918 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:02:13.929066 kubelet[2572]: E0213 10:02:13.928940 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:13.929066 kubelet[2572]: E0213 10:02:13.928957 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:02:14.439152 systemd[1]: Started sshd@70-139.178.70.11:22-139.178.68.195:44360.service. Feb 13 10:02:14.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.70.11:22-139.178.68.195:44360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:14.479016 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:14.479082 kernel: audit: type=1130 audit(1707818534.438:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.70.11:22-139.178.68.195:44360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:14.587000 audit[4502]: USER_ACCT pid=4502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.589228 sshd[4502]: Accepted publickey for core from 139.178.68.195 port 44360 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:14.592114 sshd[4502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:14.599937 systemd-logind[1462]: New session 21 of user core. Feb 13 10:02:14.601992 systemd[1]: Started session-21.scope. Feb 13 10:02:14.590000 audit[4502]: CRED_ACQ pid=4502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.685292 sshd[4502]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:14.686634 systemd[1]: sshd@70-139.178.70.11:22-139.178.68.195:44360.service: Deactivated successfully. Feb 13 10:02:14.687072 systemd[1]: session-21.scope: Deactivated successfully. Feb 13 10:02:14.687496 systemd-logind[1462]: Session 21 logged out. Waiting for processes to exit. Feb 13 10:02:14.688050 systemd-logind[1462]: Removed session 21. Feb 13 10:02:14.770695 kernel: audit: type=1101 audit(1707818534.587:1426): pid=4502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.770732 kernel: audit: type=1103 audit(1707818534.590:1427): pid=4502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.770746 kernel: audit: type=1006 audit(1707818534.590:1428): pid=4502 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 13 10:02:14.829212 kernel: audit: type=1300 audit(1707818534.590:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8feefb50 a2=3 a3=0 items=0 ppid=1 pid=4502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:14.590000 audit[4502]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8feefb50 a2=3 a3=0 items=0 ppid=1 pid=4502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:14.921126 kernel: audit: type=1327 audit(1707818534.590:1428): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:14.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:14.951646 kernel: audit: type=1105 audit(1707818534.607:1429): pid=4502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.607000 audit[4502]: USER_START pid=4502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:15.046083 kernel: audit: type=1103 audit(1707818534.608:1430): pid=4504 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.608000 audit[4504]: CRED_ACQ pid=4504 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:15.135239 kernel: audit: type=1106 audit(1707818534.685:1431): pid=4502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.685000 audit[4502]: USER_END pid=4502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:15.230721 kernel: audit: type=1104 audit(1707818534.685:1432): pid=4502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.685000 audit[4502]: CRED_DISP pid=4502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:14.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-139.178.70.11:22-139.178.68.195:44360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:18.599313 systemd[1]: Started sshd@71-139.178.70.11:22-5.135.90.165:54488.service. Feb 13 10:02:18.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.70.11:22-5.135.90.165:54488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:18.755244 sshd[4527]: Unable to negotiate with 5.135.90.165 port 54488: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:18.757198 systemd[1]: sshd@71-139.178.70.11:22-5.135.90.165:54488.service: Deactivated successfully. Feb 13 10:02:18.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-139.178.70.11:22-5.135.90.165:54488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:19.688182 systemd[1]: Started sshd@72-139.178.70.11:22-139.178.68.195:58526.service. Feb 13 10:02:19.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.70.11:22-139.178.68.195:58526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:19.715240 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:19.715290 kernel: audit: type=1130 audit(1707818539.687:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.70.11:22-139.178.68.195:58526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:19.825000 audit[4531]: USER_ACCT pid=4531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:19.826702 sshd[4531]: Accepted publickey for core from 139.178.68.195 port 58526 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:19.828501 sshd[4531]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:19.830891 systemd-logind[1462]: New session 22 of user core. Feb 13 10:02:19.831361 systemd[1]: Started session-22.scope. Feb 13 10:02:19.910485 sshd[4531]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:19.911949 systemd[1]: sshd@72-139.178.70.11:22-139.178.68.195:58526.service: Deactivated successfully. Feb 13 10:02:19.912388 systemd[1]: session-22.scope: Deactivated successfully. Feb 13 10:02:19.912756 systemd-logind[1462]: Session 22 logged out. Waiting for processes to exit. Feb 13 10:02:19.913401 systemd-logind[1462]: Removed session 22. Feb 13 10:02:19.827000 audit[4531]: CRED_ACQ pid=4531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:20.008422 kernel: audit: type=1101 audit(1707818539.825:1437): pid=4531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:20.008454 kernel: audit: type=1103 audit(1707818539.827:1438): pid=4531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:20.008472 kernel: audit: type=1006 audit(1707818539.827:1439): pid=4531 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 13 10:02:20.066983 kernel: audit: type=1300 audit(1707818539.827:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47996eb0 a2=3 a3=0 items=0 ppid=1 pid=4531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:19.827000 audit[4531]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd47996eb0 a2=3 a3=0 items=0 ppid=1 pid=4531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:20.158987 kernel: audit: type=1327 audit(1707818539.827:1439): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:19.827000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:20.189495 kernel: audit: type=1105 audit(1707818539.832:1440): pid=4531 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:19.832000 audit[4531]: USER_START pid=4531 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:20.283927 kernel: audit: type=1103 audit(1707818539.833:1441): pid=4533 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:19.833000 audit[4533]: CRED_ACQ pid=4533 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:20.373191 kernel: audit: type=1106 audit(1707818539.910:1442): pid=4531 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:19.910000 audit[4531]: USER_END pid=4531 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:20.468694 kernel: audit: type=1104 audit(1707818539.910:1443): pid=4531 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:19.910000 audit[4531]: CRED_DISP pid=4531 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:19.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-139.178.70.11:22-139.178.68.195:58526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:22.886468 env[1474]: time="2024-02-13T10:02:22.886334244Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:02:22.912433 env[1474]: time="2024-02-13T10:02:22.912357531Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:22.912605 kubelet[2572]: E0213 10:02:22.912569 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:02:22.912605 kubelet[2572]: E0213 10:02:22.912595 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:02:22.912769 kubelet[2572]: E0213 10:02:22.912616 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:22.912769 kubelet[2572]: E0213 10:02:22.912634 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:02:23.482604 systemd[1]: Started sshd@73-139.178.70.11:22-5.135.90.165:50544.service. Feb 13 10:02:23.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.70.11:22-5.135.90.165:50544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:23.634452 sshd[4584]: Unable to negotiate with 5.135.90.165 port 50544: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:23.636244 systemd[1]: sshd@73-139.178.70.11:22-5.135.90.165:50544.service: Deactivated successfully. Feb 13 10:02:23.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-139.178.70.11:22-5.135.90.165:50544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:24.919514 systemd[1]: Started sshd@74-139.178.70.11:22-139.178.68.195:58536.service. Feb 13 10:02:24.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.70.11:22-139.178.68.195:58536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:24.946731 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:24.946771 kernel: audit: type=1130 audit(1707818544.918:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.70.11:22-139.178.68.195:58536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:25.056000 audit[4588]: USER_ACCT pid=4588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.057953 sshd[4588]: Accepted publickey for core from 139.178.68.195 port 58536 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:25.059093 sshd[4588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:25.061552 systemd-logind[1462]: New session 23 of user core. Feb 13 10:02:25.062107 systemd[1]: Started session-23.scope. Feb 13 10:02:25.140711 sshd[4588]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:25.142265 systemd[1]: sshd@74-139.178.70.11:22-139.178.68.195:58536.service: Deactivated successfully. Feb 13 10:02:25.142683 systemd[1]: session-23.scope: Deactivated successfully. Feb 13 10:02:25.143087 systemd-logind[1462]: Session 23 logged out. Waiting for processes to exit. Feb 13 10:02:25.143560 systemd-logind[1462]: Removed session 23. Feb 13 10:02:25.058000 audit[4588]: CRED_ACQ pid=4588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.240005 kernel: audit: type=1101 audit(1707818545.056:1448): pid=4588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.240046 kernel: audit: type=1103 audit(1707818545.058:1449): pid=4588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.240069 kernel: audit: type=1006 audit(1707818545.058:1450): pid=4588 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 13 10:02:25.298582 kernel: audit: type=1300 audit(1707818545.058:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37cdc340 a2=3 a3=0 items=0 ppid=1 pid=4588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:25.058000 audit[4588]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37cdc340 a2=3 a3=0 items=0 ppid=1 pid=4588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:25.390620 kernel: audit: type=1327 audit(1707818545.058:1450): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:25.058000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:25.421081 kernel: audit: type=1105 audit(1707818545.063:1451): pid=4588 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.063000 audit[4588]: USER_START pid=4588 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.515538 kernel: audit: type=1103 audit(1707818545.064:1452): pid=4590 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.064000 audit[4590]: CRED_ACQ pid=4590 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.604762 kernel: audit: type=1106 audit(1707818545.140:1453): pid=4588 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.140000 audit[4588]: USER_END pid=4588 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.700295 kernel: audit: type=1104 audit(1707818545.140:1454): pid=4588 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.140000 audit[4588]: CRED_DISP pid=4588 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:25.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-139.178.70.11:22-139.178.68.195:58536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:25.886176 env[1474]: time="2024-02-13T10:02:25.885969701Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:02:25.886176 env[1474]: time="2024-02-13T10:02:25.885971901Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:02:25.913697 env[1474]: time="2024-02-13T10:02:25.913662395Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:25.913809 env[1474]: time="2024-02-13T10:02:25.913695495Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:25.913913 kubelet[2572]: E0213 10:02:25.913857 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:02:25.913913 kubelet[2572]: E0213 10:02:25.913902 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:02:25.914110 kubelet[2572]: E0213 10:02:25.913924 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:25.914110 kubelet[2572]: E0213 10:02:25.913942 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:02:25.914110 kubelet[2572]: E0213 10:02:25.913857 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:02:25.914110 kubelet[2572]: E0213 10:02:25.913966 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:02:25.914236 kubelet[2572]: E0213 10:02:25.913995 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:25.914236 kubelet[2572]: E0213 10:02:25.914017 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:02:26.886273 env[1474]: time="2024-02-13T10:02:26.886148208Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:02:26.911931 env[1474]: time="2024-02-13T10:02:26.911833301Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:26.912046 kubelet[2572]: E0213 10:02:26.912016 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:02:26.912098 kubelet[2572]: E0213 10:02:26.912053 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:02:26.912098 kubelet[2572]: E0213 10:02:26.912090 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:26.912180 kubelet[2572]: E0213 10:02:26.912116 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:02:28.895828 systemd[1]: Started sshd@75-139.178.70.11:22-5.135.90.165:46558.service. Feb 13 10:02:28.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.70.11:22-5.135.90.165:46558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:29.053437 sshd[4700]: Unable to negotiate with 5.135.90.165 port 46558: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:29.055335 systemd[1]: sshd@75-139.178.70.11:22-5.135.90.165:46558.service: Deactivated successfully. Feb 13 10:02:29.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-139.178.70.11:22-5.135.90.165:46558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:30.152628 systemd[1]: Started sshd@76-139.178.70.11:22-139.178.68.195:37856.service. Feb 13 10:02:30.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.70.11:22-139.178.68.195:37856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:30.180259 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:30.180288 kernel: audit: type=1130 audit(1707818550.151:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.70.11:22-139.178.68.195:37856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:30.290000 audit[4704]: USER_ACCT pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.291644 sshd[4704]: Accepted publickey for core from 139.178.68.195 port 37856 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:30.293146 sshd[4704]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:30.295559 systemd-logind[1462]: New session 24 of user core. Feb 13 10:02:30.295983 systemd[1]: Started session-24.scope. Feb 13 10:02:30.374534 sshd[4704]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:30.376073 systemd[1]: sshd@76-139.178.70.11:22-139.178.68.195:37856.service: Deactivated successfully. Feb 13 10:02:30.376498 systemd[1]: session-24.scope: Deactivated successfully. Feb 13 10:02:30.376779 systemd-logind[1462]: Session 24 logged out. Waiting for processes to exit. Feb 13 10:02:30.377318 systemd-logind[1462]: Removed session 24. Feb 13 10:02:30.291000 audit[4704]: CRED_ACQ pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.473398 kernel: audit: type=1101 audit(1707818550.290:1459): pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.473437 kernel: audit: type=1103 audit(1707818550.291:1460): pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.473453 kernel: audit: type=1006 audit(1707818550.291:1461): pid=4704 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 13 10:02:30.531928 kernel: audit: type=1300 audit(1707818550.291:1461): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7e4d2c20 a2=3 a3=0 items=0 ppid=1 pid=4704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:30.291000 audit[4704]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7e4d2c20 a2=3 a3=0 items=0 ppid=1 pid=4704 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:30.623836 kernel: audit: type=1327 audit(1707818550.291:1461): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:30.291000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:30.654392 kernel: audit: type=1105 audit(1707818550.296:1462): pid=4704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.296000 audit[4704]: USER_START pid=4704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.748800 kernel: audit: type=1103 audit(1707818550.296:1463): pid=4706 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.296000 audit[4706]: CRED_ACQ pid=4706 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.837943 kernel: audit: type=1106 audit(1707818550.373:1464): pid=4704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.373000 audit[4704]: USER_END pid=4704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.933352 kernel: audit: type=1104 audit(1707818550.373:1465): pid=4704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.373000 audit[4704]: CRED_DISP pid=4704 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:30.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-139.178.70.11:22-139.178.68.195:37856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:34.781777 systemd[1]: Started sshd@77-139.178.70.11:22-5.135.90.165:42694.service. Feb 13 10:02:34.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.70.11:22-5.135.90.165:42694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:34.936614 sshd[4732]: Unable to negotiate with 5.135.90.165 port 42694: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:34.938506 systemd[1]: sshd@77-139.178.70.11:22-5.135.90.165:42694.service: Deactivated successfully. Feb 13 10:02:34.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-139.178.70.11:22-5.135.90.165:42694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:35.384303 systemd[1]: Started sshd@78-139.178.70.11:22-139.178.68.195:37864.service. Feb 13 10:02:35.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.70.11:22-139.178.68.195:37864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:35.411457 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:35.411519 kernel: audit: type=1130 audit(1707818555.383:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.70.11:22-139.178.68.195:37864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:35.522000 audit[4736]: USER_ACCT pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.523639 sshd[4736]: Accepted publickey for core from 139.178.68.195 port 37864 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:35.525413 sshd[4736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:35.527799 systemd-logind[1462]: New session 25 of user core. Feb 13 10:02:35.528292 systemd[1]: Started session-25.scope. Feb 13 10:02:35.607054 sshd[4736]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:35.608568 systemd[1]: sshd@78-139.178.70.11:22-139.178.68.195:37864.service: Deactivated successfully. Feb 13 10:02:35.609006 systemd[1]: session-25.scope: Deactivated successfully. Feb 13 10:02:35.609395 systemd-logind[1462]: Session 25 logged out. Waiting for processes to exit. Feb 13 10:02:35.609830 systemd-logind[1462]: Removed session 25. Feb 13 10:02:35.524000 audit[4736]: CRED_ACQ pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.705306 kernel: audit: type=1101 audit(1707818555.522:1470): pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.705341 kernel: audit: type=1103 audit(1707818555.524:1471): pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.705358 kernel: audit: type=1006 audit(1707818555.524:1472): pid=4736 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 13 10:02:35.763865 kernel: audit: type=1300 audit(1707818555.524:1472): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde94e9850 a2=3 a3=0 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:35.524000 audit[4736]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde94e9850 a2=3 a3=0 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:35.855789 kernel: audit: type=1327 audit(1707818555.524:1472): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:35.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:35.886260 kernel: audit: type=1105 audit(1707818555.529:1473): pid=4736 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.529000 audit[4736]: USER_START pid=4736 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.980821 kernel: audit: type=1103 audit(1707818555.529:1474): pid=4738 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.529000 audit[4738]: CRED_ACQ pid=4738 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:36.069923 kernel: audit: type=1106 audit(1707818555.606:1475): pid=4736 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.606000 audit[4736]: USER_END pid=4736 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:36.165357 kernel: audit: type=1104 audit(1707818555.607:1476): pid=4736 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.607000 audit[4736]: CRED_DISP pid=4736 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:35.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-139.178.70.11:22-139.178.68.195:37864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:37.885938 env[1474]: time="2024-02-13T10:02:37.885829224Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:02:37.885938 env[1474]: time="2024-02-13T10:02:37.885827910Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:02:37.916239 env[1474]: time="2024-02-13T10:02:37.916205770Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:37.916339 env[1474]: time="2024-02-13T10:02:37.916204279Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:37.916425 kubelet[2572]: E0213 10:02:37.916385 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:02:37.916425 kubelet[2572]: E0213 10:02:37.916414 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:02:37.916630 kubelet[2572]: E0213 10:02:37.916436 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:37.916630 kubelet[2572]: E0213 10:02:37.916385 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:02:37.916630 kubelet[2572]: E0213 10:02:37.916458 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:02:37.916630 kubelet[2572]: E0213 10:02:37.916472 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:02:37.916746 kubelet[2572]: E0213 10:02:37.916492 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:37.916746 kubelet[2572]: E0213 10:02:37.916507 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:02:40.617475 systemd[1]: Started sshd@79-139.178.70.11:22-139.178.68.195:49130.service. Feb 13 10:02:40.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.70.11:22-139.178.68.195:49130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:40.644710 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:02:40.644737 kernel: audit: type=1130 audit(1707818560.617:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.70.11:22-139.178.68.195:49130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:40.736296 systemd[1]: Started sshd@80-139.178.70.11:22-5.135.90.165:38848.service. Feb 13 10:02:40.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.70.11:22-5.135.90.165:38848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:40.756123 sshd[4822]: Accepted publickey for core from 139.178.68.195 port 49130 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:40.757169 sshd[4822]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:40.759581 systemd-logind[1462]: New session 26 of user core. Feb 13 10:02:40.760094 systemd[1]: Started session-26.scope. Feb 13 10:02:40.755000 audit[4822]: USER_ACCT pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.839152 sshd[4822]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:40.840580 systemd[1]: sshd@79-139.178.70.11:22-139.178.68.195:49130.service: Deactivated successfully. Feb 13 10:02:40.841034 systemd[1]: session-26.scope: Deactivated successfully. Feb 13 10:02:40.841421 systemd-logind[1462]: Session 26 logged out. Waiting for processes to exit. Feb 13 10:02:40.841832 systemd-logind[1462]: Removed session 26. Feb 13 10:02:40.884746 env[1474]: time="2024-02-13T10:02:40.884668150Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:02:40.896629 env[1474]: time="2024-02-13T10:02:40.896593256Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:40.896770 kubelet[2572]: E0213 10:02:40.896758 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:02:40.896933 kubelet[2572]: E0213 10:02:40.896789 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:02:40.896933 kubelet[2572]: E0213 10:02:40.896812 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:40.896933 kubelet[2572]: E0213 10:02:40.896830 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:02:40.917246 kernel: audit: type=1130 audit(1707818560.735:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.70.11:22-5.135.90.165:38848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:40.917282 kernel: audit: type=1101 audit(1707818560.755:1480): pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.917296 kernel: audit: type=1103 audit(1707818560.756:1481): pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.756000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:41.007763 sshd[4825]: Unable to negotiate with 5.135.90.165 port 38848: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:41.008158 systemd[1]: sshd@80-139.178.70.11:22-5.135.90.165:38848.service: Deactivated successfully. Feb 13 10:02:41.066096 kernel: audit: type=1006 audit(1707818560.756:1482): pid=4822 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 13 10:02:41.066127 kernel: audit: type=1300 audit(1707818560.756:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff030ac7e0 a2=3 a3=0 items=0 ppid=1 pid=4822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:40.756000 audit[4822]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff030ac7e0 a2=3 a3=0 items=0 ppid=1 pid=4822 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:41.157926 kernel: audit: type=1327 audit(1707818560.756:1482): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:40.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:40.761000 audit[4822]: USER_START pid=4822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:41.283665 kernel: audit: type=1105 audit(1707818560.761:1483): pid=4822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:41.283693 kernel: audit: type=1103 audit(1707818560.762:1484): pid=4827 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.762000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:41.372764 kernel: audit: type=1106 audit(1707818560.839:1485): pid=4822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.839000 audit[4822]: USER_END pid=4822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.839000 audit[4822]: CRED_DISP pid=4822 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:40.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-139.178.70.11:22-139.178.68.195:49130 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:41.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-139.178.70.11:22-5.135.90.165:38848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:41.885606 env[1474]: time="2024-02-13T10:02:41.885484908Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:02:41.936373 env[1474]: time="2024-02-13T10:02:41.936277368Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:41.936628 kubelet[2572]: E0213 10:02:41.936573 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:02:41.936628 kubelet[2572]: E0213 10:02:41.936625 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:02:41.937091 kubelet[2572]: E0213 10:02:41.936681 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:41.937091 kubelet[2572]: E0213 10:02:41.936723 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:02:45.850569 systemd[1]: Started sshd@81-139.178.70.11:22-139.178.68.195:49132.service. Feb 13 10:02:45.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.70.11:22-139.178.68.195:49132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:45.878054 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:45.878096 kernel: audit: type=1130 audit(1707818565.850:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.70.11:22-139.178.68.195:49132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:45.989000 audit[4908]: USER_ACCT pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:45.990093 sshd[4908]: Accepted publickey for core from 139.178.68.195 port 49132 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:45.991382 sshd[4908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:45.993885 systemd-logind[1462]: New session 27 of user core. Feb 13 10:02:45.994397 systemd[1]: Started session-27.scope. Feb 13 10:02:46.073580 sshd[4908]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:46.075089 systemd[1]: sshd@81-139.178.70.11:22-139.178.68.195:49132.service: Deactivated successfully. Feb 13 10:02:46.075515 systemd[1]: session-27.scope: Deactivated successfully. Feb 13 10:02:46.075786 systemd-logind[1462]: Session 27 logged out. Waiting for processes to exit. Feb 13 10:02:46.076235 systemd-logind[1462]: Removed session 27. Feb 13 10:02:45.990000 audit[4908]: CRED_ACQ pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.091001 systemd[1]: Started sshd@82-139.178.70.11:22-5.135.90.165:34620.service. Feb 13 10:02:46.172722 kernel: audit: type=1101 audit(1707818565.989:1490): pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.172785 kernel: audit: type=1103 audit(1707818565.990:1491): pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.172802 kernel: audit: type=1006 audit(1707818565.990:1492): pid=4908 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 13 10:02:45.990000 audit[4908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd532a840 a2=3 a3=0 items=0 ppid=1 pid=4908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:46.244224 sshd[4933]: Unable to negotiate with 5.135.90.165 port 34620: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:46.244719 systemd[1]: sshd@82-139.178.70.11:22-5.135.90.165:34620.service: Deactivated successfully. Feb 13 10:02:46.323974 kernel: audit: type=1300 audit(1707818565.990:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd532a840 a2=3 a3=0 items=0 ppid=1 pid=4908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:46.324011 kernel: audit: type=1327 audit(1707818565.990:1492): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:45.990000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:46.354668 kernel: audit: type=1105 audit(1707818565.995:1493): pid=4908 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:45.995000 audit[4908]: USER_START pid=4908 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:45.996000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.539144 kernel: audit: type=1103 audit(1707818565.996:1494): pid=4910 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.539207 kernel: audit: type=1106 audit(1707818566.073:1495): pid=4908 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.073000 audit[4908]: USER_END pid=4908 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.635069 kernel: audit: type=1104 audit(1707818566.073:1496): pid=4908 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.073000 audit[4908]: CRED_DISP pid=4908 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:46.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-139.178.70.11:22-139.178.68.195:49132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:46.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.70.11:22-5.135.90.165:34620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:46.211000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.211000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e78a00 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:02:46.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:02:46.211000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.211000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a818f0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:02:46.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:02:46.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-139.178.70.11:22-5.135.90.165:34620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c614e10 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:02:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:02:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c005b79600 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:02:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:02:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011863290 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:02:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:02:46.471000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.471000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c614f90 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:02:46.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:02:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c011cfc060 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:02:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:02:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c005dfa150 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:02:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:02:50.037000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:50.037000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e78d40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:02:50.037000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:02:50.038000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:50.038000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00035a460 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:02:50.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:02:50.038000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:50.038000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00035a4c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:02:50.038000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:02:50.039000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:02:50.039000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b09380 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:02:50.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:02:51.082957 systemd[1]: Started sshd@83-139.178.70.11:22-139.178.68.195:60702.service. Feb 13 10:02:51.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.70.11:22-139.178.68.195:60702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:51.110309 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 13 10:02:51.110379 kernel: audit: type=1130 audit(1707818571.082:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.70.11:22-139.178.68.195:60702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:51.221000 audit[4939]: USER_ACCT pid=4939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.222590 sshd[4939]: Accepted publickey for core from 139.178.68.195 port 60702 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:51.224165 sshd[4939]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:51.226439 systemd-logind[1462]: New session 28 of user core. Feb 13 10:02:51.227068 systemd[1]: Started session-28.scope. Feb 13 10:02:51.305300 sshd[4939]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:51.306590 systemd[1]: sshd@83-139.178.70.11:22-139.178.68.195:60702.service: Deactivated successfully. Feb 13 10:02:51.307029 systemd[1]: session-28.scope: Deactivated successfully. Feb 13 10:02:51.307360 systemd-logind[1462]: Session 28 logged out. Waiting for processes to exit. Feb 13 10:02:51.307796 systemd-logind[1462]: Removed session 28. Feb 13 10:02:51.223000 audit[4939]: CRED_ACQ pid=4939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.404549 kernel: audit: type=1101 audit(1707818571.221:1513): pid=4939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.404598 kernel: audit: type=1103 audit(1707818571.223:1514): pid=4939 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.404616 kernel: audit: type=1006 audit(1707818571.223:1515): pid=4939 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 13 10:02:51.463425 kernel: audit: type=1300 audit(1707818571.223:1515): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe19199fc0 a2=3 a3=0 items=0 ppid=1 pid=4939 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:51.223000 audit[4939]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe19199fc0 a2=3 a3=0 items=0 ppid=1 pid=4939 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:51.555865 kernel: audit: type=1327 audit(1707818571.223:1515): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:51.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:51.586545 kernel: audit: type=1105 audit(1707818571.228:1516): pid=4939 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.228000 audit[4939]: USER_START pid=4939 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.229000 audit[4941]: CRED_ACQ pid=4941 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.770706 kernel: audit: type=1103 audit(1707818571.229:1517): pid=4941 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.770736 kernel: audit: type=1106 audit(1707818571.305:1518): pid=4939 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.305000 audit[4939]: USER_END pid=4939 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.866178 kernel: audit: type=1104 audit(1707818571.305:1519): pid=4939 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.305000 audit[4939]: CRED_DISP pid=4939 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:51.884807 env[1474]: time="2024-02-13T10:02:51.884780054Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:02:51.884973 env[1474]: time="2024-02-13T10:02:51.884852165Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:02:51.896936 env[1474]: time="2024-02-13T10:02:51.896855965Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:51.897050 env[1474]: time="2024-02-13T10:02:51.896979224Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:51.897082 kubelet[2572]: E0213 10:02:51.897053 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:02:51.897240 kubelet[2572]: E0213 10:02:51.897080 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:02:51.897240 kubelet[2572]: E0213 10:02:51.897085 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:02:51.897240 kubelet[2572]: E0213 10:02:51.897098 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:02:51.897240 kubelet[2572]: E0213 10:02:51.897109 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:51.897240 kubelet[2572]: E0213 10:02:51.897119 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:51.897369 kubelet[2572]: E0213 10:02:51.897126 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:02:51.897369 kubelet[2572]: E0213 10:02:51.897135 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:02:51.926320 systemd[1]: Started sshd@84-139.178.70.11:22-5.135.90.165:58862.service. Feb 13 10:02:51.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-139.178.70.11:22-139.178.68.195:60702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:51.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.70.11:22-5.135.90.165:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:52.088437 sshd[5018]: Unable to negotiate with 5.135.90.165 port 58862: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:52.090229 systemd[1]: sshd@84-139.178.70.11:22-5.135.90.165:58862.service: Deactivated successfully. Feb 13 10:02:52.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-139.178.70.11:22-5.135.90.165:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:55.886168 env[1474]: time="2024-02-13T10:02:55.886040160Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:02:55.913653 env[1474]: time="2024-02-13T10:02:55.913592637Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:55.913762 kubelet[2572]: E0213 10:02:55.913751 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:02:55.913939 kubelet[2572]: E0213 10:02:55.913782 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:02:55.913939 kubelet[2572]: E0213 10:02:55.913805 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:55.913939 kubelet[2572]: E0213 10:02:55.913823 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:02:56.315412 systemd[1]: Started sshd@85-139.178.70.11:22-139.178.68.195:34994.service. Feb 13 10:02:56.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.70.11:22-139.178.68.195:34994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:56.342455 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:02:56.342528 kernel: audit: type=1130 audit(1707818576.314:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.70.11:22-139.178.68.195:34994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:56.452000 audit[5051]: USER_ACCT pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.453600 sshd[5051]: Accepted publickey for core from 139.178.68.195 port 34994 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:02:56.455147 sshd[5051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:02:56.457558 systemd-logind[1462]: New session 29 of user core. Feb 13 10:02:56.458030 systemd[1]: Started session-29.scope. Feb 13 10:02:56.537494 sshd[5051]: pam_unix(sshd:session): session closed for user core Feb 13 10:02:56.538893 systemd[1]: sshd@85-139.178.70.11:22-139.178.68.195:34994.service: Deactivated successfully. Feb 13 10:02:56.539319 systemd[1]: session-29.scope: Deactivated successfully. Feb 13 10:02:56.539678 systemd-logind[1462]: Session 29 logged out. Waiting for processes to exit. Feb 13 10:02:56.540313 systemd-logind[1462]: Removed session 29. Feb 13 10:02:56.454000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.635704 kernel: audit: type=1101 audit(1707818576.452:1524): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.635741 kernel: audit: type=1103 audit(1707818576.454:1525): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.635760 kernel: audit: type=1006 audit(1707818576.454:1526): pid=5051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 13 10:02:56.694223 kernel: audit: type=1300 audit(1707818576.454:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71005e00 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:56.454000 audit[5051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe71005e00 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:02:56.786237 kernel: audit: type=1327 audit(1707818576.454:1526): proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:56.454000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:02:56.816739 kernel: audit: type=1105 audit(1707818576.459:1527): pid=5051 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.459000 audit[5051]: USER_START pid=5051 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.884686 env[1474]: time="2024-02-13T10:02:56.884634947Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:02:56.901984 env[1474]: time="2024-02-13T10:02:56.901907007Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:02:56.902196 kubelet[2572]: E0213 10:02:56.902115 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:02:56.902196 kubelet[2572]: E0213 10:02:56.902144 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:02:56.902196 kubelet[2572]: E0213 10:02:56.902166 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:02:56.902196 kubelet[2572]: E0213 10:02:56.902184 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:02:56.911170 kernel: audit: type=1103 audit(1707818576.459:1528): pid=5053 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.459000 audit[5053]: CRED_ACQ pid=5053 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:57.000364 kernel: audit: type=1106 audit(1707818576.537:1529): pid=5051 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.537000 audit[5051]: USER_END pid=5051 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:57.095782 kernel: audit: type=1104 audit(1707818576.537:1530): pid=5051 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.537000 audit[5051]: CRED_DISP pid=5051 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:02:56.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-139.178.70.11:22-139.178.68.195:34994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:58.411924 systemd[1]: Started sshd@86-139.178.70.11:22-5.135.90.165:54846.service. Feb 13 10:02:58.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.70.11:22-5.135.90.165:54846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:02:58.568696 sshd[5105]: Unable to negotiate with 5.135.90.165 port 54846: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:02:58.570546 systemd[1]: sshd@86-139.178.70.11:22-5.135.90.165:54846.service: Deactivated successfully. Feb 13 10:02:58.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-139.178.70.11:22-5.135.90.165:54846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:01.549162 systemd[1]: Started sshd@87-139.178.70.11:22-139.178.68.195:35002.service. Feb 13 10:03:01.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.70.11:22-139.178.68.195:35002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:01.576645 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:01.576697 kernel: audit: type=1130 audit(1707818581.548:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.70.11:22-139.178.68.195:35002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:01.687000 audit[5109]: USER_ACCT pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:01.688054 sshd[5109]: Accepted publickey for core from 139.178.68.195 port 35002 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:01.689875 sshd[5109]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:01.692279 systemd-logind[1462]: New session 30 of user core. Feb 13 10:03:01.692993 systemd[1]: Started session-30.scope. Feb 13 10:03:01.688000 audit[5109]: CRED_ACQ pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:01.869658 kernel: audit: type=1101 audit(1707818581.687:1535): pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:01.869702 kernel: audit: type=1103 audit(1707818581.688:1536): pid=5109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:01.869718 kernel: audit: type=1006 audit(1707818581.688:1537): pid=5109 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 13 10:03:01.928176 kernel: audit: type=1300 audit(1707818581.688:1537): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff627768d0 a2=3 a3=0 items=0 ppid=1 pid=5109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:01.688000 audit[5109]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff627768d0 a2=3 a3=0 items=0 ppid=1 pid=5109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:02.020249 kernel: audit: type=1327 audit(1707818581.688:1537): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:01.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:02.020514 sshd[5109]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:02.022030 systemd[1]: sshd@87-139.178.70.11:22-139.178.68.195:35002.service: Deactivated successfully. Feb 13 10:03:02.022726 systemd[1]: session-30.scope: Deactivated successfully. Feb 13 10:03:02.023246 systemd-logind[1462]: Session 30 logged out. Waiting for processes to exit. Feb 13 10:03:02.023708 systemd-logind[1462]: Removed session 30. Feb 13 10:03:01.694000 audit[5109]: USER_START pid=5109 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.145175 kernel: audit: type=1105 audit(1707818581.694:1538): pid=5109 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.145210 kernel: audit: type=1103 audit(1707818581.694:1539): pid=5111 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:01.694000 audit[5111]: CRED_ACQ pid=5111 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.234339 kernel: audit: type=1106 audit(1707818582.020:1540): pid=5109 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.020000 audit[5109]: USER_END pid=5109 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.329801 kernel: audit: type=1104 audit(1707818582.020:1541): pid=5109 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.020000 audit[5109]: CRED_DISP pid=5109 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:02.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-139.178.70.11:22-139.178.68.195:35002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:02.886401 env[1474]: time="2024-02-13T10:03:02.886280542Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:03:02.911833 env[1474]: time="2024-02-13T10:03:02.911795100Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:02.912083 kubelet[2572]: E0213 10:03:02.912043 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:03:02.912083 kubelet[2572]: E0213 10:03:02.912069 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:03:02.912265 kubelet[2572]: E0213 10:03:02.912091 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:02.912265 kubelet[2572]: E0213 10:03:02.912109 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:03:04.794332 systemd[1]: Started sshd@88-139.178.70.11:22-5.135.90.165:51040.service. Feb 13 10:03:04.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.70.11:22-5.135.90.165:51040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:04.960411 sshd[5166]: Unable to negotiate with 5.135.90.165 port 51040: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:04.962309 systemd[1]: sshd@88-139.178.70.11:22-5.135.90.165:51040.service: Deactivated successfully. Feb 13 10:03:04.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-139.178.70.11:22-5.135.90.165:51040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:06.885723 env[1474]: time="2024-02-13T10:03:06.885591505Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:03:06.914978 env[1474]: time="2024-02-13T10:03:06.914911876Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:06.915178 kubelet[2572]: E0213 10:03:06.915137 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:03:06.915178 kubelet[2572]: E0213 10:03:06.915165 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:03:06.915370 kubelet[2572]: E0213 10:03:06.915187 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:06.915370 kubelet[2572]: E0213 10:03:06.915206 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:03:06.967190 systemd[1]: Started sshd@89-139.178.70.11:22-139.178.68.195:51948.service. Feb 13 10:03:06.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.70.11:22-139.178.68.195:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:06.994238 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:06.994295 kernel: audit: type=1130 audit(1707818586.966:1545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.70.11:22-139.178.68.195:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:07.104000 audit[5199]: USER_ACCT pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.105806 sshd[5199]: Accepted publickey for core from 139.178.68.195 port 51948 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:07.107138 sshd[5199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:07.109780 systemd-logind[1462]: New session 31 of user core. Feb 13 10:03:07.110830 systemd[1]: Started session-31.scope. Feb 13 10:03:07.189498 sshd[5199]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:07.191228 systemd[1]: sshd@89-139.178.70.11:22-139.178.68.195:51948.service: Deactivated successfully. Feb 13 10:03:07.191703 systemd[1]: session-31.scope: Deactivated successfully. Feb 13 10:03:07.192055 systemd-logind[1462]: Session 31 logged out. Waiting for processes to exit. Feb 13 10:03:07.192486 systemd-logind[1462]: Removed session 31. Feb 13 10:03:07.106000 audit[5199]: CRED_ACQ pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.287478 kernel: audit: type=1101 audit(1707818587.104:1546): pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.287515 kernel: audit: type=1103 audit(1707818587.106:1547): pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.287534 kernel: audit: type=1006 audit(1707818587.106:1548): pid=5199 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Feb 13 10:03:07.106000 audit[5199]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb8fbe00 a2=3 a3=0 items=0 ppid=1 pid=5199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:07.437949 kernel: audit: type=1300 audit(1707818587.106:1548): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb8fbe00 a2=3 a3=0 items=0 ppid=1 pid=5199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:07.437979 kernel: audit: type=1327 audit(1707818587.106:1548): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:07.106000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:07.468453 kernel: audit: type=1105 audit(1707818587.112:1549): pid=5199 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.112000 audit[5199]: USER_START pid=5199 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.562926 kernel: audit: type=1103 audit(1707818587.112:1550): pid=5201 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.112000 audit[5201]: CRED_ACQ pid=5201 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.652092 kernel: audit: type=1106 audit(1707818587.189:1551): pid=5199 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.189000 audit[5199]: USER_END pid=5199 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.747601 kernel: audit: type=1104 audit(1707818587.189:1552): pid=5199 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.189000 audit[5199]: CRED_DISP pid=5199 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:07.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-139.178.70.11:22-139.178.68.195:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:07.884965 env[1474]: time="2024-02-13T10:03:07.884927651Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:03:07.885100 env[1474]: time="2024-02-13T10:03:07.884927644Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:03:07.901431 env[1474]: time="2024-02-13T10:03:07.901365768Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:07.901648 env[1474]: time="2024-02-13T10:03:07.901542616Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:07.901673 kubelet[2572]: E0213 10:03:07.901585 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:03:07.901673 kubelet[2572]: E0213 10:03:07.901621 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:03:07.901673 kubelet[2572]: E0213 10:03:07.901630 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:03:07.901673 kubelet[2572]: E0213 10:03:07.901643 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:07.901673 kubelet[2572]: E0213 10:03:07.901647 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:03:07.901802 kubelet[2572]: E0213 10:03:07.901663 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:03:07.901802 kubelet[2572]: E0213 10:03:07.901667 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:07.901802 kubelet[2572]: E0213 10:03:07.901681 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:03:10.222682 systemd[1]: Started sshd@90-139.178.70.11:22-5.135.90.165:46892.service. Feb 13 10:03:10.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.70.11:22-5.135.90.165:46892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:10.381203 sshd[5286]: Unable to negotiate with 5.135.90.165 port 46892: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:10.383165 systemd[1]: sshd@90-139.178.70.11:22-5.135.90.165:46892.service: Deactivated successfully. Feb 13 10:03:10.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-139.178.70.11:22-5.135.90.165:46892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:12.194358 systemd[1]: Started sshd@91-139.178.70.11:22-139.178.68.195:51952.service. Feb 13 10:03:12.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.70.11:22-139.178.68.195:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:12.220889 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:12.220959 kernel: audit: type=1130 audit(1707818592.193:1556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.70.11:22-139.178.68.195:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:12.329000 audit[5290]: USER_ACCT pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.330747 sshd[5290]: Accepted publickey for core from 139.178.68.195 port 51952 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:12.332179 sshd[5290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:12.334579 systemd-logind[1462]: New session 32 of user core. Feb 13 10:03:12.335374 systemd[1]: Started session-32.scope. Feb 13 10:03:12.415012 sshd[5290]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:12.416536 systemd[1]: sshd@91-139.178.70.11:22-139.178.68.195:51952.service: Deactivated successfully. Feb 13 10:03:12.417013 systemd[1]: session-32.scope: Deactivated successfully. Feb 13 10:03:12.417358 systemd-logind[1462]: Session 32 logged out. Waiting for processes to exit. Feb 13 10:03:12.417756 systemd-logind[1462]: Removed session 32. Feb 13 10:03:12.331000 audit[5290]: CRED_ACQ pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.513671 kernel: audit: type=1101 audit(1707818592.329:1557): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.513711 kernel: audit: type=1103 audit(1707818592.331:1558): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.513726 kernel: audit: type=1006 audit(1707818592.331:1559): pid=5290 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Feb 13 10:03:12.572195 kernel: audit: type=1300 audit(1707818592.331:1559): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcbf9e4a0 a2=3 a3=0 items=0 ppid=1 pid=5290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:12.331000 audit[5290]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcbf9e4a0 a2=3 a3=0 items=0 ppid=1 pid=5290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:12.664134 kernel: audit: type=1327 audit(1707818592.331:1559): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:12.331000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:12.694622 kernel: audit: type=1105 audit(1707818592.336:1560): pid=5290 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.336000 audit[5290]: USER_START pid=5290 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.789245 kernel: audit: type=1103 audit(1707818592.337:1561): pid=5292 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.337000 audit[5292]: CRED_ACQ pid=5292 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.414000 audit[5290]: USER_END pid=5290 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.973930 kernel: audit: type=1106 audit(1707818592.414:1562): pid=5290 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.973966 kernel: audit: type=1104 audit(1707818592.415:1563): pid=5290 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.415000 audit[5290]: CRED_DISP pid=5290 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:12.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-139.178.70.11:22-139.178.68.195:51952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:16.676563 systemd[1]: Started sshd@92-139.178.70.11:22-5.135.90.165:42966.service. Feb 13 10:03:16.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.70.11:22-5.135.90.165:42966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:16.828270 sshd[5315]: Unable to negotiate with 5.135.90.165 port 42966: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:16.830409 systemd[1]: sshd@92-139.178.70.11:22-5.135.90.165:42966.service: Deactivated successfully. Feb 13 10:03:16.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-139.178.70.11:22-5.135.90.165:42966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:17.427424 systemd[1]: Started sshd@93-139.178.70.11:22-139.178.68.195:38724.service. Feb 13 10:03:17.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.70.11:22-139.178.68.195:38724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:17.462159 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:17.462263 kernel: audit: type=1130 audit(1707818597.426:1567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.70.11:22-139.178.68.195:38724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:17.570000 audit[5319]: USER_ACCT pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.572100 sshd[5319]: Accepted publickey for core from 139.178.68.195 port 38724 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:17.573159 sshd[5319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:17.575548 systemd-logind[1462]: New session 33 of user core. Feb 13 10:03:17.576109 systemd[1]: Started session-33.scope. Feb 13 10:03:17.655955 sshd[5319]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:17.657328 systemd[1]: sshd@93-139.178.70.11:22-139.178.68.195:38724.service: Deactivated successfully. Feb 13 10:03:17.657777 systemd[1]: session-33.scope: Deactivated successfully. Feb 13 10:03:17.658192 systemd-logind[1462]: Session 33 logged out. Waiting for processes to exit. Feb 13 10:03:17.658696 systemd-logind[1462]: Removed session 33. Feb 13 10:03:17.571000 audit[5319]: CRED_ACQ pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.753671 kernel: audit: type=1101 audit(1707818597.570:1568): pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.753708 kernel: audit: type=1103 audit(1707818597.571:1569): pid=5319 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.753727 kernel: audit: type=1006 audit(1707818597.571:1570): pid=5319 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Feb 13 10:03:17.812180 kernel: audit: type=1300 audit(1707818597.571:1570): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe991ab700 a2=3 a3=0 items=0 ppid=1 pid=5319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:17.571000 audit[5319]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe991ab700 a2=3 a3=0 items=0 ppid=1 pid=5319 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:17.884318 env[1474]: time="2024-02-13T10:03:17.884295018Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:03:17.896266 env[1474]: time="2024-02-13T10:03:17.896196259Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:17.896427 kubelet[2572]: E0213 10:03:17.896390 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:03:17.896427 kubelet[2572]: E0213 10:03:17.896421 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:03:17.896618 kubelet[2572]: E0213 10:03:17.896444 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:17.896618 kubelet[2572]: E0213 10:03:17.896463 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:03:17.904104 kernel: audit: type=1327 audit(1707818597.571:1570): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:17.571000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:17.934600 kernel: audit: type=1105 audit(1707818597.576:1571): pid=5319 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.576000 audit[5319]: USER_START pid=5319 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:18.029000 kernel: audit: type=1103 audit(1707818597.577:1572): pid=5321 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.577000 audit[5321]: CRED_ACQ pid=5321 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:18.118153 kernel: audit: type=1106 audit(1707818597.654:1573): pid=5319 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.654000 audit[5319]: USER_END pid=5319 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:18.213719 kernel: audit: type=1104 audit(1707818597.654:1574): pid=5319 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.654000 audit[5319]: CRED_DISP pid=5319 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:17.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-139.178.70.11:22-139.178.68.195:38724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:19.886526 env[1474]: time="2024-02-13T10:03:19.886396267Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:03:19.912298 env[1474]: time="2024-02-13T10:03:19.912262986Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:19.912460 kubelet[2572]: E0213 10:03:19.912424 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:03:19.912460 kubelet[2572]: E0213 10:03:19.912450 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:03:19.912627 kubelet[2572]: E0213 10:03:19.912471 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:19.912627 kubelet[2572]: E0213 10:03:19.912490 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:03:21.886488 env[1474]: time="2024-02-13T10:03:21.886346373Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:03:21.902497 env[1474]: time="2024-02-13T10:03:21.902459767Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:21.902660 kubelet[2572]: E0213 10:03:21.902649 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:03:21.902830 kubelet[2572]: E0213 10:03:21.902678 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:03:21.902830 kubelet[2572]: E0213 10:03:21.902703 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:21.902830 kubelet[2572]: E0213 10:03:21.902722 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:03:22.665416 systemd[1]: Started sshd@94-139.178.70.11:22-139.178.68.195:38728.service. Feb 13 10:03:22.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.70.11:22-139.178.68.195:38728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:22.692779 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:03:22.692819 kernel: audit: type=1130 audit(1707818602.664:1576): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.70.11:22-139.178.68.195:38728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:22.804000 audit[5429]: USER_ACCT pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.804755 sshd[5429]: Accepted publickey for core from 139.178.68.195 port 38728 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:22.806035 sshd[5429]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:22.808516 systemd-logind[1462]: New session 34 of user core. Feb 13 10:03:22.809006 systemd[1]: Started session-34.scope. Feb 13 10:03:22.852676 systemd[1]: Started sshd@95-139.178.70.11:22-5.135.90.165:39018.service. Feb 13 10:03:22.884662 env[1474]: time="2024-02-13T10:03:22.884636556Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:03:22.888488 sshd[5429]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:22.889769 systemd[1]: sshd@94-139.178.70.11:22-139.178.68.195:38728.service: Deactivated successfully. Feb 13 10:03:22.890308 systemd[1]: session-34.scope: Deactivated successfully. Feb 13 10:03:22.890630 systemd-logind[1462]: Session 34 logged out. Waiting for processes to exit. Feb 13 10:03:22.890991 systemd-logind[1462]: Removed session 34. Feb 13 10:03:22.804000 audit[5429]: CRED_ACQ pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.896730 env[1474]: time="2024-02-13T10:03:22.896700314Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:22.896897 kubelet[2572]: E0213 10:03:22.896879 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:03:22.896932 kubelet[2572]: E0213 10:03:22.896906 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:03:22.896932 kubelet[2572]: E0213 10:03:22.896927 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:22.896994 kubelet[2572]: E0213 10:03:22.896945 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:03:22.986541 kernel: audit: type=1101 audit(1707818602.804:1577): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.986579 kernel: audit: type=1103 audit(1707818602.804:1578): pid=5429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.986596 kernel: audit: type=1006 audit(1707818602.805:1579): pid=5429 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=34 res=1 Feb 13 10:03:23.045063 kernel: audit: type=1300 audit(1707818602.805:1579): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4bbbf0a0 a2=3 a3=0 items=0 ppid=1 pid=5429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:22.805000 audit[5429]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4bbbf0a0 a2=3 a3=0 items=0 ppid=1 pid=5429 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=34 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:23.045231 sshd[5433]: Unable to negotiate with 5.135.90.165 port 39018: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:23.045636 systemd[1]: sshd@95-139.178.70.11:22-5.135.90.165:39018.service: Deactivated successfully. Feb 13 10:03:23.137042 kernel: audit: type=1327 audit(1707818602.805:1579): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:22.805000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:23.167553 kernel: audit: type=1105 audit(1707818602.810:1580): pid=5429 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.810000 audit[5429]: USER_START pid=5429 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:23.262056 kernel: audit: type=1103 audit(1707818602.810:1581): pid=5431 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.810000 audit[5431]: CRED_ACQ pid=5431 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:23.351265 kernel: audit: type=1130 audit(1707818602.851:1582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.70.11:22-5.135.90.165:39018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:22.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.70.11:22-5.135.90.165:39018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:23.439785 kernel: audit: type=1106 audit(1707818602.888:1583): pid=5429 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.888000 audit[5429]: USER_END pid=5429 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.888000 audit[5429]: CRED_DISP pid=5429 uid=0 auid=500 ses=34 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:22.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-139.178.70.11:22-139.178.68.195:38728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:23.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-139.178.70.11:22-5.135.90.165:39018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:27.898118 systemd[1]: Started sshd@96-139.178.70.11:22-139.178.68.195:49336.service. Feb 13 10:03:27.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.70.11:22-139.178.68.195:49336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:27.925485 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:27.925556 kernel: audit: type=1130 audit(1707818607.897:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.70.11:22-139.178.68.195:49336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:28.037000 audit[5490]: USER_ACCT pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.037966 sshd[5490]: Accepted publickey for core from 139.178.68.195 port 49336 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:28.039154 sshd[5490]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:28.041485 systemd-logind[1462]: New session 35 of user core. Feb 13 10:03:28.041925 systemd[1]: Started session-35.scope. Feb 13 10:03:28.120429 sshd[5490]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:28.121869 systemd[1]: sshd@96-139.178.70.11:22-139.178.68.195:49336.service: Deactivated successfully. Feb 13 10:03:28.122317 systemd[1]: session-35.scope: Deactivated successfully. Feb 13 10:03:28.122712 systemd-logind[1462]: Session 35 logged out. Waiting for processes to exit. Feb 13 10:03:28.123349 systemd-logind[1462]: Removed session 35. Feb 13 10:03:28.038000 audit[5490]: CRED_ACQ pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.130941 kernel: audit: type=1101 audit(1707818608.037:1588): pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.130975 kernel: audit: type=1103 audit(1707818608.038:1589): pid=5490 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.280480 kernel: audit: type=1006 audit(1707818608.038:1590): pid=5490 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=35 res=1 Feb 13 10:03:28.280517 kernel: audit: type=1300 audit(1707818608.038:1590): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc92c1d790 a2=3 a3=0 items=0 ppid=1 pid=5490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:28.038000 audit[5490]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc92c1d790 a2=3 a3=0 items=0 ppid=1 pid=5490 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=35 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:28.038000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:28.403602 kernel: audit: type=1327 audit(1707818608.038:1590): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:28.403627 kernel: audit: type=1105 audit(1707818608.042:1591): pid=5490 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.042000 audit[5490]: USER_START pid=5490 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.498545 kernel: audit: type=1103 audit(1707818608.043:1592): pid=5492 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.043000 audit[5492]: CRED_ACQ pid=5492 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.120000 audit[5490]: USER_END pid=5490 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.684155 kernel: audit: type=1106 audit(1707818608.120:1593): pid=5490 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.684196 kernel: audit: type=1104 audit(1707818608.120:1594): pid=5490 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.120000 audit[5490]: CRED_DISP pid=5490 uid=0 auid=500 ses=35 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:28.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-139.178.70.11:22-139.178.68.195:49336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:29.314564 systemd[1]: Started sshd@97-139.178.70.11:22-5.135.90.165:35052.service. Feb 13 10:03:29.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.70.11:22-5.135.90.165:35052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:29.476335 sshd[5515]: Unable to negotiate with 5.135.90.165 port 35052: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:29.478267 systemd[1]: sshd@97-139.178.70.11:22-5.135.90.165:35052.service: Deactivated successfully. Feb 13 10:03:29.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-139.178.70.11:22-5.135.90.165:35052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:31.885760 env[1474]: time="2024-02-13T10:03:31.885600286Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:03:31.938028 env[1474]: time="2024-02-13T10:03:31.937950383Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:31.938335 kubelet[2572]: E0213 10:03:31.938279 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:03:31.938335 kubelet[2572]: E0213 10:03:31.938332 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:03:31.938758 kubelet[2572]: E0213 10:03:31.938385 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:31.938758 kubelet[2572]: E0213 10:03:31.938426 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:03:33.131000 systemd[1]: Started sshd@98-139.178.70.11:22-139.178.68.195:49342.service. Feb 13 10:03:33.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.70.11:22-139.178.68.195:49342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:33.158446 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:33.158541 kernel: audit: type=1130 audit(1707818613.130:1598): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.70.11:22-139.178.68.195:49342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:33.267000 audit[5549]: USER_ACCT pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.268773 sshd[5549]: Accepted publickey for core from 139.178.68.195 port 49342 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:33.269546 sshd[5549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:33.271913 systemd-logind[1462]: New session 36 of user core. Feb 13 10:03:33.272521 systemd[1]: Started session-36.scope. Feb 13 10:03:33.352428 sshd[5549]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:33.353766 systemd[1]: sshd@98-139.178.70.11:22-139.178.68.195:49342.service: Deactivated successfully. Feb 13 10:03:33.354230 systemd[1]: session-36.scope: Deactivated successfully. Feb 13 10:03:33.354583 systemd-logind[1462]: Session 36 logged out. Waiting for processes to exit. Feb 13 10:03:33.355102 systemd-logind[1462]: Removed session 36. Feb 13 10:03:33.268000 audit[5549]: CRED_ACQ pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.451340 kernel: audit: type=1101 audit(1707818613.267:1599): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.451375 kernel: audit: type=1103 audit(1707818613.268:1600): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.451394 kernel: audit: type=1006 audit(1707818613.268:1601): pid=5549 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=36 res=1 Feb 13 10:03:33.510190 kernel: audit: type=1300 audit(1707818613.268:1601): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea95a8320 a2=3 a3=0 items=0 ppid=1 pid=5549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:33.268000 audit[5549]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea95a8320 a2=3 a3=0 items=0 ppid=1 pid=5549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=36 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:33.602727 kernel: audit: type=1327 audit(1707818613.268:1601): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:33.268000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:33.274000 audit[5549]: USER_START pid=5549 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.728362 kernel: audit: type=1105 audit(1707818613.274:1602): pid=5549 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.728395 kernel: audit: type=1103 audit(1707818613.274:1603): pid=5551 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.274000 audit[5551]: CRED_ACQ pid=5551 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.817602 kernel: audit: type=1106 audit(1707818613.352:1604): pid=5549 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.352000 audit[5549]: USER_END pid=5549 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.884749 env[1474]: time="2024-02-13T10:03:33.884727390Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:03:33.896683 env[1474]: time="2024-02-13T10:03:33.896621732Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:33.896791 kubelet[2572]: E0213 10:03:33.896773 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:03:33.896966 kubelet[2572]: E0213 10:03:33.896802 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:03:33.896966 kubelet[2572]: E0213 10:03:33.896825 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:33.896966 kubelet[2572]: E0213 10:03:33.896848 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:03:33.913099 kernel: audit: type=1104 audit(1707818613.352:1605): pid=5549 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.352000 audit[5549]: CRED_DISP pid=5549 uid=0 auid=500 ses=36 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:33.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-139.178.70.11:22-139.178.68.195:49342 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:34.884620 systemd[1]: Started sshd@99-139.178.70.11:22-5.135.90.165:59408.service. Feb 13 10:03:34.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.70.11:22-5.135.90.165:59408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:34.884996 env[1474]: time="2024-02-13T10:03:34.884699426Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:03:34.897375 env[1474]: time="2024-02-13T10:03:34.897337391Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:34.897574 kubelet[2572]: E0213 10:03:34.897531 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:03:34.897574 kubelet[2572]: E0213 10:03:34.897559 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:03:34.897764 kubelet[2572]: E0213 10:03:34.897583 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:34.897764 kubelet[2572]: E0213 10:03:34.897603 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:03:35.069794 sshd[5605]: Unable to negotiate with 5.135.90.165 port 59408: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:35.071604 systemd[1]: sshd@99-139.178.70.11:22-5.135.90.165:59408.service: Deactivated successfully. Feb 13 10:03:35.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-139.178.70.11:22-5.135.90.165:59408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:35.886319 env[1474]: time="2024-02-13T10:03:35.886226230Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:03:35.915213 env[1474]: time="2024-02-13T10:03:35.915151305Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:35.915346 kubelet[2572]: E0213 10:03:35.915335 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:03:35.915509 kubelet[2572]: E0213 10:03:35.915366 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:03:35.915509 kubelet[2572]: E0213 10:03:35.915386 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:35.915509 kubelet[2572]: E0213 10:03:35.915407 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:03:38.355629 systemd[1]: Started sshd@100-139.178.70.11:22-139.178.68.195:43296.service. Feb 13 10:03:38.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.70.11:22-139.178.68.195:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:38.382748 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:38.382783 kernel: audit: type=1130 audit(1707818618.354:1609): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.70.11:22-139.178.68.195:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:38.493000 audit[5665]: USER_ACCT pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.494601 sshd[5665]: Accepted publickey for core from 139.178.68.195 port 43296 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:38.496014 sshd[5665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:38.498529 systemd-logind[1462]: New session 37 of user core. Feb 13 10:03:38.499048 systemd[1]: Started session-37.scope. Feb 13 10:03:38.577912 sshd[5665]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:38.579401 systemd[1]: sshd@100-139.178.70.11:22-139.178.68.195:43296.service: Deactivated successfully. Feb 13 10:03:38.579838 systemd[1]: session-37.scope: Deactivated successfully. Feb 13 10:03:38.580266 systemd-logind[1462]: Session 37 logged out. Waiting for processes to exit. Feb 13 10:03:38.580765 systemd-logind[1462]: Removed session 37. Feb 13 10:03:38.494000 audit[5665]: CRED_ACQ pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.676642 kernel: audit: type=1101 audit(1707818618.493:1610): pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.676672 kernel: audit: type=1103 audit(1707818618.494:1611): pid=5665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.676692 kernel: audit: type=1006 audit(1707818618.495:1612): pid=5665 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=37 res=1 Feb 13 10:03:38.735222 kernel: audit: type=1300 audit(1707818618.495:1612): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebdad35b0 a2=3 a3=0 items=0 ppid=1 pid=5665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:38.495000 audit[5665]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffebdad35b0 a2=3 a3=0 items=0 ppid=1 pid=5665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=37 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:38.827279 kernel: audit: type=1327 audit(1707818618.495:1612): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:38.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:38.857806 kernel: audit: type=1105 audit(1707818618.500:1613): pid=5665 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.500000 audit[5665]: USER_START pid=5665 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.952351 kernel: audit: type=1103 audit(1707818618.500:1614): pid=5667 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.500000 audit[5667]: CRED_ACQ pid=5667 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:39.041653 kernel: audit: type=1106 audit(1707818618.577:1615): pid=5665 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.577000 audit[5665]: USER_END pid=5665 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:39.137261 kernel: audit: type=1104 audit(1707818618.577:1616): pid=5665 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.577000 audit[5665]: CRED_DISP pid=5665 uid=0 auid=500 ses=37 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:38.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-139.178.70.11:22-139.178.68.195:43296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:40.716871 systemd[1]: Started sshd@101-139.178.70.11:22-5.135.90.165:55242.service. Feb 13 10:03:40.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.70.11:22-5.135.90.165:55242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:40.869145 sshd[5690]: Unable to negotiate with 5.135.90.165 port 55242: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:40.871087 systemd[1]: sshd@101-139.178.70.11:22-5.135.90.165:55242.service: Deactivated successfully. Feb 13 10:03:40.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-139.178.70.11:22-5.135.90.165:55242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:42.885260 env[1474]: time="2024-02-13T10:03:42.885161089Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:03:42.939495 env[1474]: time="2024-02-13T10:03:42.939338347Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:42.939959 kubelet[2572]: E0213 10:03:42.939878 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:03:42.940741 kubelet[2572]: E0213 10:03:42.939972 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:03:42.940741 kubelet[2572]: E0213 10:03:42.940068 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:42.940741 kubelet[2572]: E0213 10:03:42.940141 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:03:43.587437 systemd[1]: Started sshd@102-139.178.70.11:22-139.178.68.195:43308.service. Feb 13 10:03:43.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.70.11:22-139.178.68.195:43308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:43.614163 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:03:43.614217 kernel: audit: type=1130 audit(1707818623.586:1620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.70.11:22-139.178.68.195:43308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:43.725000 audit[5724]: USER_ACCT pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.726413 sshd[5724]: Accepted publickey for core from 139.178.68.195 port 43308 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:43.727725 sshd[5724]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:43.730213 systemd-logind[1462]: New session 38 of user core. Feb 13 10:03:43.730680 systemd[1]: Started session-38.scope. Feb 13 10:03:43.809390 sshd[5724]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:43.810721 systemd[1]: sshd@102-139.178.70.11:22-139.178.68.195:43308.service: Deactivated successfully. Feb 13 10:03:43.811159 systemd[1]: session-38.scope: Deactivated successfully. Feb 13 10:03:43.811465 systemd-logind[1462]: Session 38 logged out. Waiting for processes to exit. Feb 13 10:03:43.811916 systemd-logind[1462]: Removed session 38. Feb 13 10:03:43.726000 audit[5724]: CRED_ACQ pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.908434 kernel: audit: type=1101 audit(1707818623.725:1621): pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.908487 kernel: audit: type=1103 audit(1707818623.726:1622): pid=5724 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.908504 kernel: audit: type=1006 audit(1707818623.726:1623): pid=5724 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=38 res=1 Feb 13 10:03:43.967103 kernel: audit: type=1300 audit(1707818623.726:1623): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc19ba4d10 a2=3 a3=0 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:43.726000 audit[5724]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc19ba4d10 a2=3 a3=0 items=0 ppid=1 pid=5724 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=38 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:44.059207 kernel: audit: type=1327 audit(1707818623.726:1623): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:43.726000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:43.731000 audit[5724]: USER_START pid=5724 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:44.184346 kernel: audit: type=1105 audit(1707818623.731:1624): pid=5724 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:44.184426 kernel: audit: type=1103 audit(1707818623.732:1625): pid=5726 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.732000 audit[5726]: CRED_ACQ pid=5726 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:44.273698 kernel: audit: type=1106 audit(1707818623.809:1626): pid=5724 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.809000 audit[5724]: USER_END pid=5724 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:44.369347 kernel: audit: type=1104 audit(1707818623.809:1627): pid=5724 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.809000 audit[5724]: CRED_DISP pid=5724 uid=0 auid=500 ses=38 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:43.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-139.178.70.11:22-139.178.68.195:43308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:45.885228 env[1474]: time="2024-02-13T10:03:45.885182795Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:03:45.906833 env[1474]: time="2024-02-13T10:03:45.906770213Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:45.907048 kubelet[2572]: E0213 10:03:45.907027 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:03:45.907389 kubelet[2572]: E0213 10:03:45.907075 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:03:45.907389 kubelet[2572]: E0213 10:03:45.907117 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:45.907389 kubelet[2572]: E0213 10:03:45.907149 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:03:46.212000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.212000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028bc420 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:03:46.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:03:46.212000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.212000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008bf020 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:03:46.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:03:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c01378a000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:03:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:03:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a9c6140 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:03:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:03:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c013128450 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:03:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:03:46.472000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.472000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c012f24000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:03:46.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:03:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00a996000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:03:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:03:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c013000030 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:03:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:03:46.776899 systemd[1]: Started sshd@103-139.178.70.11:22-5.135.90.165:51336.service. Feb 13 10:03:46.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.70.11:22-5.135.90.165:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:46.954315 sshd[5780]: Unable to negotiate with 5.135.90.165 port 51336: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:46.956079 systemd[1]: sshd@103-139.178.70.11:22-5.135.90.165:51336.service: Deactivated successfully. Feb 13 10:03:46.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-139.178.70.11:22-5.135.90.165:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:48.818397 systemd[1]: Started sshd@104-139.178.70.11:22-139.178.68.195:56520.service. Feb 13 10:03:48.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.70.11:22-139.178.68.195:56520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:48.845592 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 10:03:48.845646 kernel: audit: type=1130 audit(1707818628.817:1639): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.70.11:22-139.178.68.195:56520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:48.884590 env[1474]: time="2024-02-13T10:03:48.884532009Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:03:48.898459 env[1474]: time="2024-02-13T10:03:48.898423570Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:48.898562 kubelet[2572]: E0213 10:03:48.898553 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:03:48.898723 kubelet[2572]: E0213 10:03:48.898577 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:03:48.898723 kubelet[2572]: E0213 10:03:48.898598 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:48.898723 kubelet[2572]: E0213 10:03:48.898616 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:03:48.956000 audit[5784]: USER_ACCT pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:48.958027 sshd[5784]: Accepted publickey for core from 139.178.68.195 port 56520 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:48.961054 sshd[5784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:48.966501 systemd-logind[1462]: New session 39 of user core. Feb 13 10:03:48.966978 systemd[1]: Started session-39.scope. Feb 13 10:03:49.046145 sshd[5784]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:49.047570 systemd[1]: sshd@104-139.178.70.11:22-139.178.68.195:56520.service: Deactivated successfully. Feb 13 10:03:49.048010 systemd[1]: session-39.scope: Deactivated successfully. Feb 13 10:03:49.048397 systemd-logind[1462]: Session 39 logged out. Waiting for processes to exit. Feb 13 10:03:49.048814 systemd-logind[1462]: Removed session 39. Feb 13 10:03:48.959000 audit[5784]: CRED_ACQ pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.139638 kernel: audit: type=1101 audit(1707818628.956:1640): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.139673 kernel: audit: type=1103 audit(1707818628.959:1641): pid=5784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.139691 kernel: audit: type=1006 audit(1707818628.959:1642): pid=5784 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=39 res=1 Feb 13 10:03:49.198225 kernel: audit: type=1300 audit(1707818628.959:1642): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbda5e3d0 a2=3 a3=0 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:48.959000 audit[5784]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbda5e3d0 a2=3 a3=0 items=0 ppid=1 pid=5784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=39 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:49.290280 kernel: audit: type=1327 audit(1707818628.959:1642): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:48.959000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:49.320794 kernel: audit: type=1105 audit(1707818628.968:1643): pid=5784 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:48.968000 audit[5784]: USER_START pid=5784 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.415350 kernel: audit: type=1103 audit(1707818628.969:1644): pid=5816 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:48.969000 audit[5816]: CRED_ACQ pid=5816 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.504608 kernel: audit: type=1106 audit(1707818629.045:1645): pid=5784 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.045000 audit[5784]: USER_END pid=5784 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.600084 kernel: audit: type=1104 audit(1707818629.045:1646): pid=5784 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.045000 audit[5784]: CRED_DISP pid=5784 uid=0 auid=500 ses=39 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:49.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-139.178.70.11:22-139.178.68.195:56520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:50.039000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:50.039000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0000a90c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:03:50.039000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:50.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:03:50.039000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0028bc6e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:03:50.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:03:50.039000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:50.039000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000626ba0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:03:50.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:03:50.039000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:03:50.039000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028bc700 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:03:50.039000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:03:50.886319 env[1474]: time="2024-02-13T10:03:50.886220921Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:03:50.915141 env[1474]: time="2024-02-13T10:03:50.915108352Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:50.915294 kubelet[2572]: E0213 10:03:50.915281 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:03:50.915481 kubelet[2572]: E0213 10:03:50.915313 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:03:50.915481 kubelet[2572]: E0213 10:03:50.915345 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:50.915481 kubelet[2572]: E0213 10:03:50.915372 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:03:53.727270 systemd[1]: Started sshd@105-139.178.70.11:22-5.135.90.165:47412.service. Feb 13 10:03:53.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.70.11:22-5.135.90.165:47412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:53.885959 sshd[5870]: Unable to negotiate with 5.135.90.165 port 47412: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:53.887366 env[1474]: time="2024-02-13T10:03:53.886346945Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:03:53.887896 systemd[1]: sshd@105-139.178.70.11:22-5.135.90.165:47412.service: Deactivated successfully. Feb 13 10:03:53.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.70.11:22-5.135.90.165:47412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:53.903181 env[1474]: time="2024-02-13T10:03:53.903117655Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:53.903332 kubelet[2572]: E0213 10:03:53.903289 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:03:53.903332 kubelet[2572]: E0213 10:03:53.903317 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:03:53.903545 kubelet[2572]: E0213 10:03:53.903342 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:53.903545 kubelet[2572]: E0213 10:03:53.903376 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:03:53.914821 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 10:03:53.914864 kernel: audit: type=1131 audit(1707818633.887:1653): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-139.178.70.11:22-5.135.90.165:47412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:54.050008 systemd[1]: Started sshd@106-139.178.70.11:22-139.178.68.195:56532.service. Feb 13 10:03:54.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.70.11:22-139.178.68.195:56532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:54.138894 kernel: audit: type=1130 audit(1707818634.049:1654): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.70.11:22-139.178.68.195:56532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:54.159000 audit[5902]: USER_ACCT pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.160347 sshd[5902]: Accepted publickey for core from 139.178.68.195 port 56532 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:54.161443 sshd[5902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:54.164067 systemd-logind[1462]: New session 40 of user core. Feb 13 10:03:54.164574 systemd[1]: Started session-40.scope. Feb 13 10:03:54.243968 sshd[5902]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:54.245556 systemd[1]: sshd@106-139.178.70.11:22-139.178.68.195:56532.service: Deactivated successfully. Feb 13 10:03:54.246006 systemd[1]: session-40.scope: Deactivated successfully. Feb 13 10:03:54.246403 systemd-logind[1462]: Session 40 logged out. Waiting for processes to exit. Feb 13 10:03:54.246797 systemd-logind[1462]: Removed session 40. Feb 13 10:03:54.160000 audit[5902]: CRED_ACQ pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.342912 kernel: audit: type=1101 audit(1707818634.159:1655): pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.342947 kernel: audit: type=1103 audit(1707818634.160:1656): pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.342960 kernel: audit: type=1006 audit(1707818634.160:1657): pid=5902 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=40 res=1 Feb 13 10:03:54.401435 kernel: audit: type=1300 audit(1707818634.160:1657): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc668776d0 a2=3 a3=0 items=0 ppid=1 pid=5902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:54.160000 audit[5902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc668776d0 a2=3 a3=0 items=0 ppid=1 pid=5902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=40 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:54.493426 kernel: audit: type=1327 audit(1707818634.160:1657): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:54.160000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:54.523928 kernel: audit: type=1105 audit(1707818634.165:1658): pid=5902 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.165000 audit[5902]: USER_START pid=5902 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.619270 kernel: audit: type=1103 audit(1707818634.166:1659): pid=5907 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.166000 audit[5907]: CRED_ACQ pid=5907 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.708511 kernel: audit: type=1106 audit(1707818634.243:1660): pid=5902 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.243000 audit[5902]: USER_END pid=5902 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.243000 audit[5902]: CRED_DISP pid=5902 uid=0 auid=500 ses=40 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:54.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-139.178.70.11:22-139.178.68.195:56532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:56.886046 env[1474]: time="2024-02-13T10:03:56.885926639Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:03:56.913341 env[1474]: time="2024-02-13T10:03:56.913281552Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:03:56.913461 kubelet[2572]: E0213 10:03:56.913449 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:03:56.913615 kubelet[2572]: E0213 10:03:56.913479 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:03:56.913615 kubelet[2572]: E0213 10:03:56.913503 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:03:56.913615 kubelet[2572]: E0213 10:03:56.913521 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:03:59.252935 systemd[1]: Started sshd@107-139.178.70.11:22-139.178.68.195:50572.service. Feb 13 10:03:59.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.11:22-139.178.68.195:50572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:59.280192 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 10:03:59.280262 kernel: audit: type=1130 audit(1707818639.252:1663): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.11:22-139.178.68.195:50572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:59.391000 audit[5957]: USER_ACCT pid=5957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.392722 sshd[5957]: Accepted publickey for core from 139.178.68.195 port 50572 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:03:59.394886 sshd[5957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:03:59.397784 systemd-logind[1462]: New session 41 of user core. Feb 13 10:03:59.398295 systemd[1]: Started session-41.scope. Feb 13 10:03:59.478304 sshd[5957]: pam_unix(sshd:session): session closed for user core Feb 13 10:03:59.479652 systemd[1]: sshd@107-139.178.70.11:22-139.178.68.195:50572.service: Deactivated successfully. Feb 13 10:03:59.480096 systemd[1]: session-41.scope: Deactivated successfully. Feb 13 10:03:59.480509 systemd-logind[1462]: Session 41 logged out. Waiting for processes to exit. Feb 13 10:03:59.481046 systemd-logind[1462]: Removed session 41. Feb 13 10:03:59.393000 audit[5957]: CRED_ACQ pid=5957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.575552 kernel: audit: type=1101 audit(1707818639.391:1664): pid=5957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.575590 kernel: audit: type=1103 audit(1707818639.393:1665): pid=5957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.575606 kernel: audit: type=1006 audit(1707818639.393:1666): pid=5957 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=41 res=1 Feb 13 10:03:59.634509 kernel: audit: type=1300 audit(1707818639.393:1666): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ec195d0 a2=3 a3=0 items=0 ppid=1 pid=5957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:59.393000 audit[5957]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0ec195d0 a2=3 a3=0 items=0 ppid=1 pid=5957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=41 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:03:59.696945 systemd[1]: Started sshd@108-139.178.70.11:22-5.135.90.165:43398.service. Feb 13 10:03:59.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:59.757739 kernel: audit: type=1327 audit(1707818639.393:1666): proctitle=737368643A20636F7265205B707269765D Feb 13 10:03:59.757778 kernel: audit: type=1105 audit(1707818639.399:1667): pid=5957 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.399000 audit[5957]: USER_START pid=5957 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.400000 audit[5959]: CRED_ACQ pid=5959 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.864809 sshd[5982]: Unable to negotiate with 5.135.90.165 port 43398: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:03:59.865149 systemd[1]: sshd@108-139.178.70.11:22-5.135.90.165:43398.service: Deactivated successfully. Feb 13 10:03:59.942736 kernel: audit: type=1103 audit(1707818639.400:1668): pid=5959 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.942778 kernel: audit: type=1106 audit(1707818639.478:1669): pid=5957 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.478000 audit[5957]: USER_END pid=5957 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:00.038802 kernel: audit: type=1104 audit(1707818639.478:1670): pid=5957 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.478000 audit[5957]: CRED_DISP pid=5957 uid=0 auid=500 ses=41 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:03:59.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-139.178.70.11:22-139.178.68.195:50572 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:59.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.70.11:22-5.135.90.165:43398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:03:59.864000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-139.178.70.11:22-5.135.90.165:43398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:02.885782 env[1474]: time="2024-02-13T10:04:02.885643281Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:04:02.903521 env[1474]: time="2024-02-13T10:04:02.903454824Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:02.903631 kubelet[2572]: E0213 10:04:02.903620 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:04:02.903808 kubelet[2572]: E0213 10:04:02.903651 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:04:02.903808 kubelet[2572]: E0213 10:04:02.903675 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:02.903808 kubelet[2572]: E0213 10:04:02.903695 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:04:03.886410 env[1474]: time="2024-02-13T10:04:03.886254469Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:04:03.916767 env[1474]: time="2024-02-13T10:04:03.916734774Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:03.916953 kubelet[2572]: E0213 10:04:03.916911 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:04:03.916953 kubelet[2572]: E0213 10:04:03.916939 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:04:03.917146 kubelet[2572]: E0213 10:04:03.916960 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:03.917146 kubelet[2572]: E0213 10:04:03.916978 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:04:04.489827 systemd[1]: Started sshd@109-139.178.70.11:22-139.178.68.195:50588.service. Feb 13 10:04:04.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.11:22-139.178.68.195:50588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:04.517434 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:04.517505 kernel: audit: type=1130 audit(1707818644.489:1674): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.11:22-139.178.68.195:50588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:04.629000 audit[6044]: USER_ACCT pid=6044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.630105 sshd[6044]: Accepted publickey for core from 139.178.68.195 port 50588 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:04.631243 sshd[6044]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:04.633934 systemd-logind[1462]: New session 42 of user core. Feb 13 10:04:04.634498 systemd[1]: Started session-42.scope. Feb 13 10:04:04.714537 sshd[6044]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:04.715951 systemd[1]: sshd@109-139.178.70.11:22-139.178.68.195:50588.service: Deactivated successfully. Feb 13 10:04:04.716390 systemd[1]: session-42.scope: Deactivated successfully. Feb 13 10:04:04.716737 systemd-logind[1462]: Session 42 logged out. Waiting for processes to exit. Feb 13 10:04:04.717373 systemd-logind[1462]: Removed session 42. Feb 13 10:04:04.630000 audit[6044]: CRED_ACQ pid=6044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.813561 kernel: audit: type=1101 audit(1707818644.629:1675): pid=6044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.813597 kernel: audit: type=1103 audit(1707818644.630:1676): pid=6044 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.813612 kernel: audit: type=1006 audit(1707818644.630:1677): pid=6044 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=42 res=1 Feb 13 10:04:04.630000 audit[6044]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca8bd8c20 a2=3 a3=0 items=0 ppid=1 pid=6044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:04.965145 kernel: audit: type=1300 audit(1707818644.630:1677): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca8bd8c20 a2=3 a3=0 items=0 ppid=1 pid=6044 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=42 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:04.965174 kernel: audit: type=1327 audit(1707818644.630:1677): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:04.630000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:04.995853 kernel: audit: type=1105 audit(1707818644.635:1678): pid=6044 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.635000 audit[6044]: USER_START pid=6044 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:05.090912 kernel: audit: type=1103 audit(1707818644.636:1679): pid=6048 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.636000 audit[6048]: CRED_ACQ pid=6048 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:05.180241 kernel: audit: type=1106 audit(1707818644.714:1680): pid=6044 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.714000 audit[6044]: USER_END pid=6044 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:05.275816 kernel: audit: type=1104 audit(1707818644.714:1681): pid=6044 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.714000 audit[6044]: CRED_DISP pid=6044 uid=0 auid=500 ses=42 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:04.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-139.178.70.11:22-139.178.68.195:50588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:05.411704 systemd[1]: Started sshd@110-139.178.70.11:22-5.135.90.165:39448.service. Feb 13 10:04:05.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.70.11:22-5.135.90.165:39448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:05.567207 sshd[6073]: Unable to negotiate with 5.135.90.165 port 39448: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:05.569000 systemd[1]: sshd@110-139.178.70.11:22-5.135.90.165:39448.service: Deactivated successfully. Feb 13 10:04:05.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-139.178.70.11:22-5.135.90.165:39448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:07.885805 env[1474]: time="2024-02-13T10:04:07.885707916Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:04:07.886595 env[1474]: time="2024-02-13T10:04:07.885837333Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:04:07.902829 env[1474]: time="2024-02-13T10:04:07.902790563Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:07.902930 env[1474]: time="2024-02-13T10:04:07.902878177Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:07.903035 kubelet[2572]: E0213 10:04:07.902992 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:04:07.903035 kubelet[2572]: E0213 10:04:07.903016 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:04:07.903035 kubelet[2572]: E0213 10:04:07.903036 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:04:07.903258 kubelet[2572]: E0213 10:04:07.903061 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:07.903258 kubelet[2572]: E0213 10:04:07.903022 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:04:07.903258 kubelet[2572]: E0213 10:04:07.903082 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:04:07.903258 kubelet[2572]: E0213 10:04:07.903109 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:07.903401 kubelet[2572]: E0213 10:04:07.903129 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:04:09.724579 systemd[1]: Started sshd@111-139.178.70.11:22-139.178.68.195:52022.service. Feb 13 10:04:09.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.11:22-139.178.68.195:52022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:09.752463 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:09.752504 kernel: audit: type=1130 audit(1707818649.724:1685): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.11:22-139.178.68.195:52022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:09.863000 audit[6133]: USER_ACCT pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.864792 sshd[6133]: Accepted publickey for core from 139.178.68.195 port 52022 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:09.868140 sshd[6133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:09.878185 systemd-logind[1462]: New session 43 of user core. Feb 13 10:04:09.880081 systemd[1]: Started session-43.scope. Feb 13 10:04:09.866000 audit[6133]: CRED_ACQ pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.964606 sshd[6133]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:09.966057 systemd[1]: sshd@111-139.178.70.11:22-139.178.68.195:52022.service: Deactivated successfully. Feb 13 10:04:09.966662 systemd[1]: session-43.scope: Deactivated successfully. Feb 13 10:04:09.967081 systemd-logind[1462]: Session 43 logged out. Waiting for processes to exit. Feb 13 10:04:09.967535 systemd-logind[1462]: Removed session 43. Feb 13 10:04:10.046580 kernel: audit: type=1101 audit(1707818649.863:1686): pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:10.046665 kernel: audit: type=1103 audit(1707818649.866:1687): pid=6133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:10.046692 kernel: audit: type=1006 audit(1707818649.866:1688): pid=6133 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=43 res=1 Feb 13 10:04:10.105244 kernel: audit: type=1300 audit(1707818649.866:1688): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd35d31fc0 a2=3 a3=0 items=0 ppid=1 pid=6133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:09.866000 audit[6133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd35d31fc0 a2=3 a3=0 items=0 ppid=1 pid=6133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=43 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:10.197399 kernel: audit: type=1327 audit(1707818649.866:1688): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:09.866000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:10.227926 kernel: audit: type=1105 audit(1707818649.883:1689): pid=6133 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.883000 audit[6133]: USER_START pid=6133 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:10.322590 kernel: audit: type=1103 audit(1707818649.884:1690): pid=6135 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.884000 audit[6135]: CRED_ACQ pid=6135 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:10.411924 kernel: audit: type=1106 audit(1707818649.964:1691): pid=6133 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.964000 audit[6133]: USER_END pid=6133 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:10.507516 kernel: audit: type=1104 audit(1707818649.964:1692): pid=6133 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.964000 audit[6133]: CRED_DISP pid=6133 uid=0 auid=500 ses=43 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:09.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-139.178.70.11:22-139.178.68.195:52022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:11.606140 systemd[1]: Started sshd@112-139.178.70.11:22-5.135.90.165:35460.service. Feb 13 10:04:11.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.70.11:22-5.135.90.165:35460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:11.769907 sshd[6160]: Unable to negotiate with 5.135.90.165 port 35460: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:11.771707 systemd[1]: sshd@112-139.178.70.11:22-5.135.90.165:35460.service: Deactivated successfully. Feb 13 10:04:11.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-139.178.70.11:22-5.135.90.165:35460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:14.886269 env[1474]: time="2024-02-13T10:04:14.886185757Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:04:14.909540 env[1474]: time="2024-02-13T10:04:14.909471760Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:14.909693 kubelet[2572]: E0213 10:04:14.909654 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:04:14.909693 kubelet[2572]: E0213 10:04:14.909684 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:04:14.909899 kubelet[2572]: E0213 10:04:14.909708 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:14.909899 kubelet[2572]: E0213 10:04:14.909726 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:04:14.969727 systemd[1]: Started sshd@113-139.178.70.11:22-139.178.68.195:52030.service. Feb 13 10:04:14.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.11:22-139.178.68.195:52030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:14.996548 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:15.000646 kernel: audit: type=1130 audit(1707818654.968:1696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.11:22-139.178.68.195:52030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:15.105000 audit[6192]: USER_ACCT pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.106640 sshd[6192]: Accepted publickey for core from 139.178.68.195 port 52030 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:15.107766 sshd[6192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:15.110486 systemd-logind[1462]: New session 44 of user core. Feb 13 10:04:15.110966 systemd[1]: Started session-44.scope. Feb 13 10:04:15.193053 sshd[6192]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:15.194858 systemd[1]: sshd@113-139.178.70.11:22-139.178.68.195:52030.service: Deactivated successfully. Feb 13 10:04:15.195280 systemd[1]: session-44.scope: Deactivated successfully. Feb 13 10:04:15.195740 systemd-logind[1462]: Session 44 logged out. Waiting for processes to exit. Feb 13 10:04:15.196386 systemd-logind[1462]: Removed session 44. Feb 13 10:04:15.105000 audit[6192]: CRED_ACQ pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.290654 kernel: audit: type=1101 audit(1707818655.105:1697): pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.290726 kernel: audit: type=1103 audit(1707818655.105:1698): pid=6192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.290744 kernel: audit: type=1006 audit(1707818655.105:1699): pid=6192 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=44 res=1 Feb 13 10:04:15.349341 kernel: audit: type=1300 audit(1707818655.105:1699): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ee56720 a2=3 a3=0 items=0 ppid=1 pid=6192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:15.105000 audit[6192]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ee56720 a2=3 a3=0 items=0 ppid=1 pid=6192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=44 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:15.105000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:15.471984 kernel: audit: type=1327 audit(1707818655.105:1699): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:15.472014 kernel: audit: type=1105 audit(1707818655.112:1700): pid=6192 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.112000 audit[6192]: USER_START pid=6192 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.113000 audit[6195]: CRED_ACQ pid=6195 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.566935 kernel: audit: type=1103 audit(1707818655.113:1701): pid=6195 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.192000 audit[6192]: USER_END pid=6192 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.751630 kernel: audit: type=1106 audit(1707818655.192:1702): pid=6192 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.751677 kernel: audit: type=1104 audit(1707818655.192:1703): pid=6192 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.192000 audit[6192]: CRED_DISP pid=6192 uid=0 auid=500 ses=44 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:15.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-139.178.70.11:22-139.178.68.195:52030 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:17.886231 env[1474]: time="2024-02-13T10:04:17.886151537Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:04:17.918606 systemd[1]: Started sshd@114-139.178.70.11:22-5.135.90.165:60116.service. Feb 13 10:04:17.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.70.11:22-5.135.90.165:60116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:17.937109 env[1474]: time="2024-02-13T10:04:17.937047890Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:17.937396 kubelet[2572]: E0213 10:04:17.937351 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:04:17.937727 kubelet[2572]: E0213 10:04:17.937418 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:04:17.937727 kubelet[2572]: E0213 10:04:17.937497 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:17.937727 kubelet[2572]: E0213 10:04:17.937554 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:04:18.088836 sshd[6240]: Unable to negotiate with 5.135.90.165 port 60116: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:18.090862 systemd[1]: sshd@114-139.178.70.11:22-5.135.90.165:60116.service: Deactivated successfully. Feb 13 10:04:18.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-139.178.70.11:22-5.135.90.165:60116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:18.886541 env[1474]: time="2024-02-13T10:04:18.886423688Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:04:18.911441 env[1474]: time="2024-02-13T10:04:18.911407263Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:18.911616 kubelet[2572]: E0213 10:04:18.911573 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:04:18.911616 kubelet[2572]: E0213 10:04:18.911602 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:04:18.911679 kubelet[2572]: E0213 10:04:18.911626 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:18.911679 kubelet[2572]: E0213 10:04:18.911645 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:04:20.201631 systemd[1]: Started sshd@115-139.178.70.11:22-139.178.68.195:56776.service. Feb 13 10:04:20.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.11:22-139.178.68.195:56776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:20.228763 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:20.228799 kernel: audit: type=1130 audit(1707818660.199:1707): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.11:22-139.178.68.195:56776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:20.339000 audit[6281]: USER_ACCT pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.340858 sshd[6281]: Accepted publickey for core from 139.178.68.195 port 56776 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:20.342155 sshd[6281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:20.344510 systemd-logind[1462]: New session 45 of user core. Feb 13 10:04:20.344983 systemd[1]: Started session-45.scope. Feb 13 10:04:20.424950 sshd[6281]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:20.426699 systemd[1]: sshd@115-139.178.70.11:22-139.178.68.195:56776.service: Deactivated successfully. Feb 13 10:04:20.427054 systemd[1]: session-45.scope: Deactivated successfully. Feb 13 10:04:20.427417 systemd-logind[1462]: Session 45 logged out. Waiting for processes to exit. Feb 13 10:04:20.427985 systemd[1]: Started sshd@116-139.178.70.11:22-139.178.68.195:56792.service. Feb 13 10:04:20.428402 systemd-logind[1462]: Removed session 45. Feb 13 10:04:20.340000 audit[6281]: CRED_ACQ pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.522918 kernel: audit: type=1101 audit(1707818660.339:1708): pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.522960 kernel: audit: type=1103 audit(1707818660.340:1709): pid=6281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.522978 kernel: audit: type=1006 audit(1707818660.340:1710): pid=6281 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=45 res=1 Feb 13 10:04:20.581569 kernel: audit: type=1300 audit(1707818660.340:1710): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff87453e10 a2=3 a3=0 items=0 ppid=1 pid=6281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:20.340000 audit[6281]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff87453e10 a2=3 a3=0 items=0 ppid=1 pid=6281 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=45 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:20.602795 sshd[6307]: Accepted publickey for core from 139.178.68.195 port 56792 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:20.604173 sshd[6307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:20.606501 systemd-logind[1462]: New session 46 of user core. Feb 13 10:04:20.606966 systemd[1]: Started session-46.scope. Feb 13 10:04:20.340000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:20.704210 kernel: audit: type=1327 audit(1707818660.340:1710): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:20.704297 kernel: audit: type=1105 audit(1707818660.345:1711): pid=6281 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.345000 audit[6281]: USER_START pid=6281 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.777889 sshd[6307]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:20.779718 systemd[1]: sshd@116-139.178.70.11:22-139.178.68.195:56792.service: Deactivated successfully. Feb 13 10:04:20.780082 systemd[1]: session-46.scope: Deactivated successfully. Feb 13 10:04:20.780441 systemd-logind[1462]: Session 46 logged out. Waiting for processes to exit. Feb 13 10:04:20.781094 systemd[1]: Started sshd@117-139.178.70.11:22-139.178.68.195:56798.service. Feb 13 10:04:20.781534 systemd-logind[1462]: Removed session 46. Feb 13 10:04:20.346000 audit[6283]: CRED_ACQ pid=6283 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.888122 kernel: audit: type=1103 audit(1707818660.346:1712): pid=6283 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.888169 kernel: audit: type=1106 audit(1707818660.423:1713): pid=6281 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.423000 audit[6281]: USER_END pid=6281 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.909609 sshd[6330]: Accepted publickey for core from 139.178.68.195 port 56798 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:20.911176 sshd[6330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:20.913519 systemd-logind[1462]: New session 47 of user core. Feb 13 10:04:20.914031 systemd[1]: Started session-47.scope. Feb 13 10:04:20.423000 audit[6281]: CRED_DISP pid=6281 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.993662 sshd[6330]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:20.995138 systemd[1]: sshd@117-139.178.70.11:22-139.178.68.195:56798.service: Deactivated successfully. Feb 13 10:04:20.995562 systemd[1]: session-47.scope: Deactivated successfully. Feb 13 10:04:20.995848 systemd-logind[1462]: Session 47 logged out. Waiting for processes to exit. Feb 13 10:04:20.996477 systemd-logind[1462]: Removed session 47. Feb 13 10:04:21.073040 kernel: audit: type=1104 audit(1707818660.423:1714): pid=6281 uid=0 auid=500 ses=45 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-139.178.70.11:22-139.178.68.195:56776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:20.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.70.11:22-139.178.68.195:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:20.600000 audit[6307]: USER_ACCT pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.602000 audit[6307]: CRED_ACQ pid=6307 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.602000 audit[6307]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f61fbc0 a2=3 a3=0 items=0 ppid=1 pid=6307 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=46 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:20.602000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:20.607000 audit[6307]: USER_START pid=6307 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.607000 audit[6309]: CRED_ACQ pid=6309 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.776000 audit[6307]: USER_END pid=6307 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.776000 audit[6307]: CRED_DISP pid=6307 uid=0 auid=500 ses=46 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-139.178.70.11:22-139.178.68.195:56792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:20.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.70.11:22-139.178.68.195:56798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:20.907000 audit[6330]: USER_ACCT pid=6330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.909000 audit[6330]: CRED_ACQ pid=6330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.909000 audit[6330]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a82f8d0 a2=3 a3=0 items=0 ppid=1 pid=6330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=47 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:20.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:20.914000 audit[6330]: USER_START pid=6330 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.914000 audit[6332]: CRED_ACQ pid=6332 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.992000 audit[6330]: USER_END pid=6330 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.992000 audit[6330]: CRED_DISP pid=6330 uid=0 auid=500 ses=47 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:20.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-139.178.70.11:22-139.178.68.195:56798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:22.885762 env[1474]: time="2024-02-13T10:04:22.885625005Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:04:22.911809 env[1474]: time="2024-02-13T10:04:22.911757677Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:22.911969 kubelet[2572]: E0213 10:04:22.911958 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:04:22.912139 kubelet[2572]: E0213 10:04:22.911987 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:04:22.912139 kubelet[2572]: E0213 10:04:22.912011 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:22.912139 kubelet[2572]: E0213 10:04:22.912028 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:04:23.131885 systemd[1]: Started sshd@118-139.178.70.11:22-5.135.90.165:55758.service. Feb 13 10:04:23.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.70.11:22-5.135.90.165:55758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:23.295122 sshd[6384]: Unable to negotiate with 5.135.90.165 port 55758: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:23.296897 systemd[1]: sshd@118-139.178.70.11:22-5.135.90.165:55758.service: Deactivated successfully. Feb 13 10:04:23.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-139.178.70.11:22-5.135.90.165:55758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:26.004356 systemd[1]: Started sshd@119-139.178.70.11:22-139.178.68.195:56806.service. Feb 13 10:04:26.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.11:22-139.178.68.195:56806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:26.031808 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 10:04:26.031906 kernel: audit: type=1130 audit(1707818666.003:1736): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.11:22-139.178.68.195:56806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:26.142000 audit[6388]: USER_ACCT pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.143063 sshd[6388]: Accepted publickey for core from 139.178.68.195 port 56806 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:26.144730 sshd[6388]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:26.147182 systemd-logind[1462]: New session 48 of user core. Feb 13 10:04:26.147610 systemd[1]: Started session-48.scope. Feb 13 10:04:26.143000 audit[6388]: CRED_ACQ pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.325112 kernel: audit: type=1101 audit(1707818666.142:1737): pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.325146 kernel: audit: type=1103 audit(1707818666.143:1738): pid=6388 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.325163 kernel: audit: type=1006 audit(1707818666.143:1739): pid=6388 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=48 res=1 Feb 13 10:04:26.383730 kernel: audit: type=1300 audit(1707818666.143:1739): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb040c800 a2=3 a3=0 items=0 ppid=1 pid=6388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:26.143000 audit[6388]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb040c800 a2=3 a3=0 items=0 ppid=1 pid=6388 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=48 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:26.475801 kernel: audit: type=1327 audit(1707818666.143:1739): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:26.143000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:26.476036 sshd[6388]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:26.477567 systemd[1]: sshd@119-139.178.70.11:22-139.178.68.195:56806.service: Deactivated successfully. Feb 13 10:04:26.477995 systemd[1]: session-48.scope: Deactivated successfully. Feb 13 10:04:26.478441 systemd-logind[1462]: Session 48 logged out. Waiting for processes to exit. Feb 13 10:04:26.478928 systemd-logind[1462]: Removed session 48. Feb 13 10:04:26.506326 kernel: audit: type=1105 audit(1707818666.148:1740): pid=6388 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.148000 audit[6388]: USER_START pid=6388 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.600861 kernel: audit: type=1103 audit(1707818666.149:1741): pid=6390 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.149000 audit[6390]: CRED_ACQ pid=6390 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.690061 kernel: audit: type=1106 audit(1707818666.475:1742): pid=6388 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.475000 audit[6388]: USER_END pid=6388 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.785581 kernel: audit: type=1104 audit(1707818666.476:1743): pid=6388 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.476000 audit[6388]: CRED_DISP pid=6388 uid=0 auid=500 ses=48 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:26.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-139.178.70.11:22-139.178.68.195:56806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:28.493042 systemd[1]: Started sshd@120-139.178.70.11:22-5.135.90.165:51806.service. Feb 13 10:04:28.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.70.11:22-5.135.90.165:51806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:28.645941 sshd[6413]: Unable to negotiate with 5.135.90.165 port 51806: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:28.647703 systemd[1]: sshd@120-139.178.70.11:22-5.135.90.165:51806.service: Deactivated successfully. Feb 13 10:04:28.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-139.178.70.11:22-5.135.90.165:51806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:29.885423 env[1474]: time="2024-02-13T10:04:29.885400178Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:04:29.885423 env[1474]: time="2024-02-13T10:04:29.885400155Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:04:29.898756 env[1474]: time="2024-02-13T10:04:29.898716432Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:29.898925 kubelet[2572]: E0213 10:04:29.898911 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:04:29.899107 kubelet[2572]: E0213 10:04:29.898943 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:04:29.899107 kubelet[2572]: E0213 10:04:29.898969 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:29.899107 kubelet[2572]: E0213 10:04:29.899002 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:04:29.899230 env[1474]: time="2024-02-13T10:04:29.898992791Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:29.899258 kubelet[2572]: E0213 10:04:29.899110 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:04:29.899258 kubelet[2572]: E0213 10:04:29.899123 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:04:29.899258 kubelet[2572]: E0213 10:04:29.899144 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:29.899258 kubelet[2572]: E0213 10:04:29.899159 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:04:31.431061 systemd[1]: Started sshd@121-139.178.70.11:22-139.178.68.195:58148.service. Feb 13 10:04:31.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.11:22-139.178.68.195:58148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:31.458339 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:31.458417 kernel: audit: type=1130 audit(1707818671.430:1747): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.11:22-139.178.68.195:58148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:31.567000 audit[6474]: USER_ACCT pid=6474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.568667 sshd[6474]: Accepted publickey for core from 139.178.68.195 port 58148 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:31.570357 sshd[6474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:31.572829 systemd-logind[1462]: New session 49 of user core. Feb 13 10:04:31.573330 systemd[1]: Started session-49.scope. Feb 13 10:04:31.653540 sshd[6474]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:31.654981 systemd[1]: sshd@121-139.178.70.11:22-139.178.68.195:58148.service: Deactivated successfully. Feb 13 10:04:31.655401 systemd[1]: session-49.scope: Deactivated successfully. Feb 13 10:04:31.655711 systemd-logind[1462]: Session 49 logged out. Waiting for processes to exit. Feb 13 10:04:31.656381 systemd-logind[1462]: Removed session 49. Feb 13 10:04:31.569000 audit[6474]: CRED_ACQ pid=6474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.750596 kernel: audit: type=1101 audit(1707818671.567:1748): pid=6474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.750633 kernel: audit: type=1103 audit(1707818671.569:1749): pid=6474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.750649 kernel: audit: type=1006 audit(1707818671.569:1750): pid=6474 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=49 res=1 Feb 13 10:04:31.809281 kernel: audit: type=1300 audit(1707818671.569:1750): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3bed3910 a2=3 a3=0 items=0 ppid=1 pid=6474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:31.569000 audit[6474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3bed3910 a2=3 a3=0 items=0 ppid=1 pid=6474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=49 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:31.901388 kernel: audit: type=1327 audit(1707818671.569:1750): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:31.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:31.574000 audit[6474]: USER_START pid=6474 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:32.026559 kernel: audit: type=1105 audit(1707818671.574:1751): pid=6474 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:32.026592 kernel: audit: type=1103 audit(1707818671.575:1752): pid=6476 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.575000 audit[6476]: CRED_ACQ pid=6476 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:32.115823 kernel: audit: type=1106 audit(1707818671.653:1753): pid=6474 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.653000 audit[6474]: USER_END pid=6474 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:32.211360 kernel: audit: type=1104 audit(1707818671.653:1754): pid=6474 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.653000 audit[6474]: CRED_DISP pid=6474 uid=0 auid=500 ses=49 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:31.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-139.178.70.11:22-139.178.68.195:58148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:33.885880 env[1474]: time="2024-02-13T10:04:33.885717922Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:04:33.903438 env[1474]: time="2024-02-13T10:04:33.903369434Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:33.903594 kubelet[2572]: E0213 10:04:33.903556 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:04:33.903594 kubelet[2572]: E0213 10:04:33.903587 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:04:33.903792 kubelet[2572]: E0213 10:04:33.903609 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:33.903792 kubelet[2572]: E0213 10:04:33.903628 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:04:34.505437 systemd[1]: Started sshd@122-139.178.70.11:22-5.135.90.165:47794.service. Feb 13 10:04:34.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.70.11:22-5.135.90.165:47794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:34.663752 sshd[6528]: Unable to negotiate with 5.135.90.165 port 47794: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:34.665646 systemd[1]: sshd@122-139.178.70.11:22-5.135.90.165:47794.service: Deactivated successfully. Feb 13 10:04:34.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-139.178.70.11:22-5.135.90.165:47794 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:34.886311 env[1474]: time="2024-02-13T10:04:34.886155867Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:04:34.913301 env[1474]: time="2024-02-13T10:04:34.913234462Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:34.913480 kubelet[2572]: E0213 10:04:34.913438 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:04:34.913480 kubelet[2572]: E0213 10:04:34.913468 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:04:34.913669 kubelet[2572]: E0213 10:04:34.913490 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:34.913669 kubelet[2572]: E0213 10:04:34.913510 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:04:36.663196 systemd[1]: Started sshd@123-139.178.70.11:22-139.178.68.195:57770.service. Feb 13 10:04:36.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.11:22-139.178.68.195:57770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:36.690433 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:36.690503 kernel: audit: type=1130 audit(1707818676.662:1758): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.11:22-139.178.68.195:57770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:36.801000 audit[6563]: USER_ACCT pid=6563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.802973 sshd[6563]: Accepted publickey for core from 139.178.68.195 port 57770 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:36.805884 sshd[6563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:36.813536 systemd-logind[1462]: New session 50 of user core. Feb 13 10:04:36.815343 systemd[1]: Started session-50.scope. Feb 13 10:04:36.804000 audit[6563]: CRED_ACQ pid=6563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.902206 sshd[6563]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:36.903584 systemd[1]: sshd@123-139.178.70.11:22-139.178.68.195:57770.service: Deactivated successfully. Feb 13 10:04:36.904024 systemd[1]: session-50.scope: Deactivated successfully. Feb 13 10:04:36.904478 systemd-logind[1462]: Session 50 logged out. Waiting for processes to exit. Feb 13 10:04:36.905004 systemd-logind[1462]: Removed session 50. Feb 13 10:04:36.984790 kernel: audit: type=1101 audit(1707818676.801:1759): pid=6563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.984840 kernel: audit: type=1103 audit(1707818676.804:1760): pid=6563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.984864 kernel: audit: type=1006 audit(1707818676.804:1761): pid=6563 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=50 res=1 Feb 13 10:04:37.043429 kernel: audit: type=1300 audit(1707818676.804:1761): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef69c9ac0 a2=3 a3=0 items=0 ppid=1 pid=6563 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:36.804000 audit[6563]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef69c9ac0 a2=3 a3=0 items=0 ppid=1 pid=6563 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=50 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:37.135609 kernel: audit: type=1327 audit(1707818676.804:1761): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:36.804000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:37.166147 kernel: audit: type=1105 audit(1707818676.822:1762): pid=6563 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.822000 audit[6563]: USER_START pid=6563 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:37.260841 kernel: audit: type=1103 audit(1707818676.824:1763): pid=6565 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.824000 audit[6565]: CRED_ACQ pid=6565 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:37.350281 kernel: audit: type=1106 audit(1707818676.901:1764): pid=6563 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.901000 audit[6563]: USER_END pid=6563 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:37.445930 kernel: audit: type=1104 audit(1707818676.902:1765): pid=6563 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.902000 audit[6563]: CRED_DISP pid=6563 uid=0 auid=500 ses=50 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:36.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-139.178.70.11:22-139.178.68.195:57770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:40.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.70.11:22-5.135.90.165:43900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:40.032127 systemd[1]: Started sshd@124-139.178.70.11:22-5.135.90.165:43900.service. Feb 13 10:04:40.210622 sshd[6589]: Unable to negotiate with 5.135.90.165 port 43900: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:40.212394 systemd[1]: sshd@124-139.178.70.11:22-5.135.90.165:43900.service: Deactivated successfully. Feb 13 10:04:40.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-139.178.70.11:22-5.135.90.165:43900 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:41.911638 systemd[1]: Started sshd@125-139.178.70.11:22-139.178.68.195:57778.service. Feb 13 10:04:41.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.11:22-139.178.68.195:57778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:41.938488 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:41.938562 kernel: audit: type=1130 audit(1707818681.910:1769): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.11:22-139.178.68.195:57778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:42.048000 audit[6593]: USER_ACCT pid=6593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.049712 sshd[6593]: Accepted publickey for core from 139.178.68.195 port 57778 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:42.051024 sshd[6593]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:42.053536 systemd-logind[1462]: New session 51 of user core. Feb 13 10:04:42.054007 systemd[1]: Started session-51.scope. Feb 13 10:04:42.138238 sshd[6593]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:42.139525 systemd[1]: sshd@125-139.178.70.11:22-139.178.68.195:57778.service: Deactivated successfully. Feb 13 10:04:42.139961 systemd[1]: session-51.scope: Deactivated successfully. Feb 13 10:04:42.140351 systemd-logind[1462]: Session 51 logged out. Waiting for processes to exit. Feb 13 10:04:42.140771 systemd-logind[1462]: Removed session 51. Feb 13 10:04:42.049000 audit[6593]: CRED_ACQ pid=6593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.232154 kernel: audit: type=1101 audit(1707818682.048:1770): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.232229 kernel: audit: type=1103 audit(1707818682.049:1771): pid=6593 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.232246 kernel: audit: type=1006 audit(1707818682.049:1772): pid=6593 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=51 res=1 Feb 13 10:04:42.290772 kernel: audit: type=1300 audit(1707818682.049:1772): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf1ffc580 a2=3 a3=0 items=0 ppid=1 pid=6593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:42.049000 audit[6593]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf1ffc580 a2=3 a3=0 items=0 ppid=1 pid=6593 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=51 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:42.382875 kernel: audit: type=1327 audit(1707818682.049:1772): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:42.049000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:42.413390 kernel: audit: type=1105 audit(1707818682.055:1773): pid=6593 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.055000 audit[6593]: USER_START pid=6593 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.508023 kernel: audit: type=1103 audit(1707818682.055:1774): pid=6595 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.055000 audit[6595]: CRED_ACQ pid=6595 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.137000 audit[6593]: USER_END pid=6593 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.692733 kernel: audit: type=1106 audit(1707818682.137:1775): pid=6593 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.692766 kernel: audit: type=1104 audit(1707818682.137:1776): pid=6593 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.137000 audit[6593]: CRED_DISP pid=6593 uid=0 auid=500 ses=51 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:42.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-139.178.70.11:22-139.178.68.195:57778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:42.885946 env[1474]: time="2024-02-13T10:04:42.885717781Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:04:42.937927 env[1474]: time="2024-02-13T10:04:42.937816673Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:42.938038 kubelet[2572]: E0213 10:04:42.938026 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:04:42.938234 kubelet[2572]: E0213 10:04:42.938057 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:04:42.938234 kubelet[2572]: E0213 10:04:42.938091 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:42.938234 kubelet[2572]: E0213 10:04:42.938119 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:04:44.886046 env[1474]: time="2024-02-13T10:04:44.885829840Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:04:44.937673 env[1474]: time="2024-02-13T10:04:44.937578249Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:44.937955 kubelet[2572]: E0213 10:04:44.937894 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:04:44.937955 kubelet[2572]: E0213 10:04:44.937949 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:04:44.938390 kubelet[2572]: E0213 10:04:44.938002 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:44.938390 kubelet[2572]: E0213 10:04:44.938043 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:04:46.213000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.213000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025c5170 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:04:46.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:04:46.213000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.213000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00131c100 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:04:46.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:04:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c007497560 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:04:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:04:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00ddc49c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:04:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:04:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c010a050c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:04:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:04:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0074975c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:04:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:04:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c0071508d0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:04:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:04:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c010a050e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:04:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:04:46.930305 systemd[1]: Started sshd@126-139.178.70.11:22-5.135.90.165:39974.service. Feb 13 10:04:46.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:46.972919 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 13 10:04:46.973052 kernel: audit: type=1130 audit(1707818686.929:1786): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:47.107656 sshd[6678]: Unable to negotiate with 5.135.90.165 port 39974: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:47.109429 systemd[1]: sshd@126-139.178.70.11:22-5.135.90.165:39974.service: Deactivated successfully. Feb 13 10:04:47.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:47.143721 systemd[1]: Started sshd@127-139.178.70.11:22-139.178.68.195:58380.service. Feb 13 10:04:47.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.11:22-139.178.68.195:58380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:47.289101 kernel: audit: type=1131 audit(1707818687.109:1787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-139.178.70.11:22-5.135.90.165:39974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:47.289195 kernel: audit: type=1130 audit(1707818687.143:1788): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.11:22-139.178.68.195:58380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:47.310000 audit[6682]: USER_ACCT pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.311116 sshd[6682]: Accepted publickey for core from 139.178.68.195 port 58380 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:47.312792 sshd[6682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:47.315275 systemd-logind[1462]: New session 52 of user core. Feb 13 10:04:47.315785 systemd[1]: Started session-52.scope. Feb 13 10:04:47.395717 sshd[6682]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:47.397284 systemd[1]: sshd@127-139.178.70.11:22-139.178.68.195:58380.service: Deactivated successfully. Feb 13 10:04:47.397722 systemd[1]: session-52.scope: Deactivated successfully. Feb 13 10:04:47.398173 systemd-logind[1462]: Session 52 logged out. Waiting for processes to exit. Feb 13 10:04:47.398669 systemd-logind[1462]: Removed session 52. Feb 13 10:04:47.311000 audit[6682]: CRED_ACQ pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.493666 kernel: audit: type=1101 audit(1707818687.310:1789): pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.493698 kernel: audit: type=1103 audit(1707818687.311:1790): pid=6682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.493713 kernel: audit: type=1006 audit(1707818687.311:1791): pid=6682 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=52 res=1 Feb 13 10:04:47.552244 kernel: audit: type=1300 audit(1707818687.311:1791): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe124350 a2=3 a3=0 items=0 ppid=1 pid=6682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:47.311000 audit[6682]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe124350 a2=3 a3=0 items=0 ppid=1 pid=6682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=52 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:47.311000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:47.675708 kernel: audit: type=1327 audit(1707818687.311:1791): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:47.675772 kernel: audit: type=1105 audit(1707818687.317:1792): pid=6682 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.317000 audit[6682]: USER_START pid=6682 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.771197 kernel: audit: type=1103 audit(1707818687.317:1793): pid=6684 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.317000 audit[6684]: CRED_ACQ pid=6684 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.395000 audit[6682]: USER_END pid=6682 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.395000 audit[6682]: CRED_DISP pid=6682 uid=0 auid=500 ses=52 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:47.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-139.178.70.11:22-139.178.68.195:58380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:47.884427 env[1474]: time="2024-02-13T10:04:47.884406236Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:04:47.897029 env[1474]: time="2024-02-13T10:04:47.896957753Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:47.897181 kubelet[2572]: E0213 10:04:47.897142 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:04:47.897181 kubelet[2572]: E0213 10:04:47.897170 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:04:47.897377 kubelet[2572]: E0213 10:04:47.897192 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:47.897377 kubelet[2572]: E0213 10:04:47.897211 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:04:48.886025 env[1474]: time="2024-02-13T10:04:48.885928397Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:04:48.911795 env[1474]: time="2024-02-13T10:04:48.911758674Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:48.912007 kubelet[2572]: E0213 10:04:48.911978 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:04:48.912007 kubelet[2572]: E0213 10:04:48.912003 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:04:48.912187 kubelet[2572]: E0213 10:04:48.912026 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:48.912187 kubelet[2572]: E0213 10:04:48.912042 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:04:50.040000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:50.040000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:50.040000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001695220 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:04:50.040000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00131c360 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:04:50.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:04:50.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:04:50.040000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:50.040000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000534f80 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:04:50.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:04:50.040000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:04:50.040000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012bd6a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:04:50.040000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:04:52.175329 systemd[1]: Started sshd@128-139.178.70.11:22-5.135.90.165:35882.service. Feb 13 10:04:52.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.11:22-5.135.90.165:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:52.202560 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 13 10:04:52.202649 kernel: audit: type=1130 audit(1707818692.174:1801): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.11:22-5.135.90.165:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:52.336382 sshd[6765]: Unable to negotiate with 5.135.90.165 port 35882: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:52.336946 systemd[1]: sshd@128-139.178.70.11:22-5.135.90.165:35882.service: Deactivated successfully. Feb 13 10:04:52.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.11:22-5.135.90.165:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:52.398331 systemd[1]: Started sshd@129-139.178.70.11:22-139.178.68.195:58390.service. Feb 13 10:04:52.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.11:22-139.178.68.195:58390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:52.513821 kernel: audit: type=1131 audit(1707818692.336:1802): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-139.178.70.11:22-5.135.90.165:35882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:52.513863 kernel: audit: type=1130 audit(1707818692.397:1803): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.11:22-139.178.68.195:58390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:52.534000 audit[6769]: USER_ACCT pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.535963 sshd[6769]: Accepted publickey for core from 139.178.68.195 port 58390 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:52.537619 sshd[6769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:52.540265 systemd-logind[1462]: New session 53 of user core. Feb 13 10:04:52.540776 systemd[1]: Started session-53.scope. Feb 13 10:04:52.620297 sshd[6769]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:52.621750 systemd[1]: sshd@129-139.178.70.11:22-139.178.68.195:58390.service: Deactivated successfully. Feb 13 10:04:52.622178 systemd[1]: session-53.scope: Deactivated successfully. Feb 13 10:04:52.622572 systemd-logind[1462]: Session 53 logged out. Waiting for processes to exit. Feb 13 10:04:52.623450 systemd-logind[1462]: Removed session 53. Feb 13 10:04:52.536000 audit[6769]: CRED_ACQ pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.718536 kernel: audit: type=1101 audit(1707818692.534:1804): pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.718569 kernel: audit: type=1103 audit(1707818692.536:1805): pid=6769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.718583 kernel: audit: type=1006 audit(1707818692.536:1806): pid=6769 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=53 res=1 Feb 13 10:04:52.777278 kernel: audit: type=1300 audit(1707818692.536:1806): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8c5b140 a2=3 a3=0 items=0 ppid=1 pid=6769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:52.536000 audit[6769]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf8c5b140 a2=3 a3=0 items=0 ppid=1 pid=6769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=53 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:52.869904 kernel: audit: type=1327 audit(1707818692.536:1806): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:52.536000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:52.900714 kernel: audit: type=1105 audit(1707818692.542:1807): pid=6769 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.542000 audit[6769]: USER_START pid=6769 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.996193 kernel: audit: type=1103 audit(1707818692.542:1808): pid=6771 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.542000 audit[6771]: CRED_ACQ pid=6771 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.620000 audit[6769]: USER_END pid=6769 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.620000 audit[6769]: CRED_DISP pid=6769 uid=0 auid=500 ses=53 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:52.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-139.178.70.11:22-139.178.68.195:58390 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:55.885984 env[1474]: time="2024-02-13T10:04:55.885827078Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:04:55.912820 env[1474]: time="2024-02-13T10:04:55.912780013Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:55.913074 kubelet[2572]: E0213 10:04:55.913035 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:04:55.913074 kubelet[2572]: E0213 10:04:55.913061 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:04:55.913244 kubelet[2572]: E0213 10:04:55.913082 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:55.913244 kubelet[2572]: E0213 10:04:55.913099 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:04:57.629160 systemd[1]: Started sshd@130-139.178.70.11:22-139.178.68.195:47152.service. Feb 13 10:04:57.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.11:22-139.178.68.195:47152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:57.656404 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:04:57.656504 kernel: audit: type=1130 audit(1707818697.628:1812): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.11:22-139.178.68.195:47152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:57.767000 audit[6824]: USER_ACCT pid=6824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.768351 sshd[6824]: Accepted publickey for core from 139.178.68.195 port 47152 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:04:57.770071 sshd[6824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:04:57.772671 systemd-logind[1462]: New session 54 of user core. Feb 13 10:04:57.773265 systemd[1]: Started session-54.scope. Feb 13 10:04:57.852158 sshd[6824]: pam_unix(sshd:session): session closed for user core Feb 13 10:04:57.853577 systemd[1]: sshd@130-139.178.70.11:22-139.178.68.195:47152.service: Deactivated successfully. Feb 13 10:04:57.854051 systemd[1]: session-54.scope: Deactivated successfully. Feb 13 10:04:57.854403 systemd-logind[1462]: Session 54 logged out. Waiting for processes to exit. Feb 13 10:04:57.854790 systemd-logind[1462]: Removed session 54. Feb 13 10:04:57.768000 audit[6824]: CRED_ACQ pid=6824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.949362 kernel: audit: type=1101 audit(1707818697.767:1813): pid=6824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.949413 kernel: audit: type=1103 audit(1707818697.768:1814): pid=6824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.949432 kernel: audit: type=1006 audit(1707818697.769:1815): pid=6824 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=54 res=1 Feb 13 10:04:58.007569 kernel: audit: type=1300 audit(1707818697.769:1815): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb8152db0 a2=3 a3=0 items=0 ppid=1 pid=6824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:57.769000 audit[6824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb8152db0 a2=3 a3=0 items=0 ppid=1 pid=6824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=54 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:04:58.099497 kernel: audit: type=1327 audit(1707818697.769:1815): proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:57.769000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:04:58.130036 kernel: audit: type=1105 audit(1707818697.774:1816): pid=6824 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.774000 audit[6824]: USER_START pid=6824 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:58.224827 kernel: audit: type=1103 audit(1707818697.775:1817): pid=6826 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.775000 audit[6826]: CRED_ACQ pid=6826 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:58.314130 kernel: audit: type=1106 audit(1707818697.851:1818): pid=6824 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.851000 audit[6824]: USER_END pid=6824 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:58.375476 systemd[1]: Started sshd@131-139.178.70.11:22-5.135.90.165:60136.service. Feb 13 10:04:58.409768 kernel: audit: type=1104 audit(1707818697.852:1819): pid=6824 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.852000 audit[6824]: CRED_DISP pid=6824 uid=0 auid=500 ses=54 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:04:57.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-139.178.70.11:22-139.178.68.195:47152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:58.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.70.11:22-5.135.90.165:60136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:58.527627 sshd[6849]: Unable to negotiate with 5.135.90.165 port 60136: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:04:58.528102 systemd[1]: sshd@131-139.178.70.11:22-5.135.90.165:60136.service: Deactivated successfully. Feb 13 10:04:58.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-139.178.70.11:22-5.135.90.165:60136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:04:58.885363 env[1474]: time="2024-02-13T10:04:58.885278057Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:04:58.935419 env[1474]: time="2024-02-13T10:04:58.935319579Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:04:58.935649 kubelet[2572]: E0213 10:04:58.935596 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:04:58.936084 kubelet[2572]: E0213 10:04:58.935652 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:04:58.936084 kubelet[2572]: E0213 10:04:58.935708 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:04:58.936084 kubelet[2572]: E0213 10:04:58.935748 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:05:00.885757 env[1474]: time="2024-02-13T10:05:00.885622538Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:05:00.885757 env[1474]: time="2024-02-13T10:05:00.885630305Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:05:00.933788 env[1474]: time="2024-02-13T10:05:00.933709112Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:00.934007 env[1474]: time="2024-02-13T10:05:00.933935331Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:00.934098 kubelet[2572]: E0213 10:05:00.933986 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:05:00.934098 kubelet[2572]: E0213 10:05:00.934034 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:05:00.934098 kubelet[2572]: E0213 10:05:00.934079 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:00.934510 kubelet[2572]: E0213 10:05:00.934115 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:05:00.934510 kubelet[2572]: E0213 10:05:00.934145 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:05:00.934510 kubelet[2572]: E0213 10:05:00.934177 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:05:00.934510 kubelet[2572]: E0213 10:05:00.934217 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:00.934741 kubelet[2572]: E0213 10:05:00.934248 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:05:02.861998 systemd[1]: Started sshd@132-139.178.70.11:22-139.178.68.195:47162.service. Feb 13 10:05:02.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.11:22-139.178.68.195:47162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:02.889060 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:02.889145 kernel: audit: type=1130 audit(1707818702.861:1823): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.11:22-139.178.68.195:47162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:03.000000 audit[6942]: USER_ACCT pid=6942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.001674 sshd[6942]: Accepted publickey for core from 139.178.68.195 port 47162 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:03.003466 sshd[6942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:03.005939 systemd-logind[1462]: New session 55 of user core. Feb 13 10:05:03.006439 systemd[1]: Started session-55.scope. Feb 13 10:05:03.002000 audit[6942]: CRED_ACQ pid=6942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.182798 kernel: audit: type=1101 audit(1707818703.000:1824): pid=6942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.182838 kernel: audit: type=1103 audit(1707818703.002:1825): pid=6942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.182861 kernel: audit: type=1006 audit(1707818703.002:1826): pid=6942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=55 res=1 Feb 13 10:05:03.240969 kernel: audit: type=1300 audit(1707818703.002:1826): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0830070 a2=3 a3=0 items=0 ppid=1 pid=6942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:03.002000 audit[6942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd0830070 a2=3 a3=0 items=0 ppid=1 pid=6942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=55 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:03.002000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:03.333141 sshd[6942]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:03.334576 systemd[1]: sshd@132-139.178.70.11:22-139.178.68.195:47162.service: Deactivated successfully. Feb 13 10:05:03.335009 systemd[1]: session-55.scope: Deactivated successfully. Feb 13 10:05:03.335422 systemd-logind[1462]: Session 55 logged out. Waiting for processes to exit. Feb 13 10:05:03.336178 systemd-logind[1462]: Removed session 55. Feb 13 10:05:03.363499 kernel: audit: type=1327 audit(1707818703.002:1826): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:03.363537 kernel: audit: type=1105 audit(1707818703.007:1827): pid=6942 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.007000 audit[6942]: USER_START pid=6942 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.458104 kernel: audit: type=1103 audit(1707818703.008:1828): pid=6944 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.008000 audit[6944]: CRED_ACQ pid=6944 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.547428 kernel: audit: type=1106 audit(1707818703.332:1829): pid=6942 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.332000 audit[6942]: USER_END pid=6942 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.643018 kernel: audit: type=1104 audit(1707818703.333:1830): pid=6942 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.333000 audit[6942]: CRED_DISP pid=6942 uid=0 auid=500 ses=55 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:03.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-139.178.70.11:22-139.178.68.195:47162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:04.674603 systemd[1]: Started sshd@133-139.178.70.11:22-5.135.90.165:56126.service. Feb 13 10:05:04.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.70.11:22-5.135.90.165:56126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:04.827113 sshd[6969]: Unable to negotiate with 5.135.90.165 port 56126: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:04.828888 systemd[1]: sshd@133-139.178.70.11:22-5.135.90.165:56126.service: Deactivated successfully. Feb 13 10:05:04.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-139.178.70.11:22-5.135.90.165:56126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:06.886052 env[1474]: time="2024-02-13T10:05:06.885911008Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:05:06.913612 env[1474]: time="2024-02-13T10:05:06.913554463Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:06.913782 kubelet[2572]: E0213 10:05:06.913771 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:05:06.913993 kubelet[2572]: E0213 10:05:06.913798 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:05:06.913993 kubelet[2572]: E0213 10:05:06.913821 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:06.913993 kubelet[2572]: E0213 10:05:06.913841 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:05:08.285279 systemd[1]: Started sshd@134-139.178.70.11:22-139.178.68.195:40450.service. Feb 13 10:05:08.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.70.11:22-139.178.68.195:40450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:08.312437 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:08.312509 kernel: audit: type=1130 audit(1707818708.284:1834): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.70.11:22-139.178.68.195:40450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:08.423000 audit[7002]: USER_ACCT pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.424650 sshd[7002]: Accepted publickey for core from 139.178.68.195 port 40450 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:08.426870 sshd[7002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:08.431849 systemd-logind[1462]: New session 56 of user core. Feb 13 10:05:08.432327 systemd[1]: Started session-56.scope. Feb 13 10:05:08.511286 sshd[7002]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:08.512568 systemd[1]: sshd@134-139.178.70.11:22-139.178.68.195:40450.service: Deactivated successfully. Feb 13 10:05:08.513005 systemd[1]: session-56.scope: Deactivated successfully. Feb 13 10:05:08.513373 systemd-logind[1462]: Session 56 logged out. Waiting for processes to exit. Feb 13 10:05:08.513776 systemd-logind[1462]: Removed session 56. Feb 13 10:05:08.425000 audit[7002]: CRED_ACQ pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.606434 kernel: audit: type=1101 audit(1707818708.423:1835): pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.606470 kernel: audit: type=1103 audit(1707818708.425:1836): pid=7002 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.606486 kernel: audit: type=1006 audit(1707818708.425:1837): pid=7002 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=56 res=1 Feb 13 10:05:08.665037 kernel: audit: type=1300 audit(1707818708.425:1837): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb8e545f0 a2=3 a3=0 items=0 ppid=1 pid=7002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:08.425000 audit[7002]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb8e545f0 a2=3 a3=0 items=0 ppid=1 pid=7002 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=56 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:08.757124 kernel: audit: type=1327 audit(1707818708.425:1837): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:08.425000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:08.787671 kernel: audit: type=1105 audit(1707818708.433:1838): pid=7002 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.433000 audit[7002]: USER_START pid=7002 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.882232 kernel: audit: type=1103 audit(1707818708.434:1839): pid=7004 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.434000 audit[7004]: CRED_ACQ pid=7004 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.971679 kernel: audit: type=1106 audit(1707818708.510:1840): pid=7002 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.510000 audit[7002]: USER_END pid=7002 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:09.067261 kernel: audit: type=1104 audit(1707818708.511:1841): pid=7002 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.511000 audit[7002]: CRED_DISP pid=7002 uid=0 auid=500 ses=56 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:08.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-139.178.70.11:22-139.178.68.195:40450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:10.490053 systemd[1]: Started sshd@135-139.178.70.11:22-5.135.90.165:52208.service. Feb 13 10:05:10.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.70.11:22-5.135.90.165:52208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:10.670882 sshd[7027]: Unable to negotiate with 5.135.90.165 port 52208: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:10.672622 systemd[1]: sshd@135-139.178.70.11:22-5.135.90.165:52208.service: Deactivated successfully. Feb 13 10:05:10.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-139.178.70.11:22-5.135.90.165:52208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:12.885827 env[1474]: time="2024-02-13T10:05:12.885694418Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:05:12.912319 env[1474]: time="2024-02-13T10:05:12.912284358Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:12.912531 kubelet[2572]: E0213 10:05:12.912488 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:05:12.912531 kubelet[2572]: E0213 10:05:12.912517 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:05:12.912726 kubelet[2572]: E0213 10:05:12.912538 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:12.912726 kubelet[2572]: E0213 10:05:12.912557 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:05:13.521020 systemd[1]: Started sshd@136-139.178.70.11:22-139.178.68.195:40466.service. Feb 13 10:05:13.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.70.11:22-139.178.68.195:40466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:13.548571 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:13.548683 kernel: audit: type=1130 audit(1707818713.520:1845): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.70.11:22-139.178.68.195:40466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:13.570612 sshd[7060]: Accepted publickey for core from 139.178.68.195 port 40466 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:13.571402 sshd[7060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:13.574027 systemd-logind[1462]: New session 57 of user core. Feb 13 10:05:13.574676 systemd[1]: Started session-57.scope. Feb 13 10:05:13.569000 audit[7060]: USER_ACCT pid=7060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.653835 sshd[7060]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:13.655351 systemd[1]: sshd@136-139.178.70.11:22-139.178.68.195:40466.service: Deactivated successfully. Feb 13 10:05:13.655781 systemd[1]: session-57.scope: Deactivated successfully. Feb 13 10:05:13.656211 systemd-logind[1462]: Session 57 logged out. Waiting for processes to exit. Feb 13 10:05:13.656729 systemd-logind[1462]: Removed session 57. Feb 13 10:05:13.729699 kernel: audit: type=1101 audit(1707818713.569:1846): pid=7060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.729742 kernel: audit: type=1103 audit(1707818713.570:1847): pid=7060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.570000 audit[7060]: CRED_ACQ pid=7060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.878918 kernel: audit: type=1006 audit(1707818713.570:1848): pid=7060 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=57 res=1 Feb 13 10:05:13.878954 kernel: audit: type=1300 audit(1707818713.570:1848): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca2efdd10 a2=3 a3=0 items=0 ppid=1 pid=7060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:13.570000 audit[7060]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca2efdd10 a2=3 a3=0 items=0 ppid=1 pid=7060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=57 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:13.884535 env[1474]: time="2024-02-13T10:05:13.884514020Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:05:13.896658 env[1474]: time="2024-02-13T10:05:13.896623876Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:13.896889 kubelet[2572]: E0213 10:05:13.896807 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:05:13.896889 kubelet[2572]: E0213 10:05:13.896837 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:05:13.896889 kubelet[2572]: E0213 10:05:13.896866 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:13.896889 kubelet[2572]: E0213 10:05:13.896885 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:05:13.971127 kernel: audit: type=1327 audit(1707818713.570:1848): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:13.570000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:14.001684 kernel: audit: type=1105 audit(1707818713.576:1849): pid=7060 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.576000 audit[7060]: USER_START pid=7060 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.577000 audit[7062]: CRED_ACQ pid=7062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:14.185516 kernel: audit: type=1103 audit(1707818713.577:1850): pid=7062 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:14.185608 kernel: audit: type=1106 audit(1707818713.653:1851): pid=7060 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.653000 audit[7060]: USER_END pid=7060 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.653000 audit[7060]: CRED_DISP pid=7060 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:14.370338 kernel: audit: type=1104 audit(1707818713.653:1852): pid=7060 uid=0 auid=500 ses=57 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:13.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-139.178.70.11:22-139.178.68.195:40466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:14.884524 env[1474]: time="2024-02-13T10:05:14.884451875Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:05:14.906484 env[1474]: time="2024-02-13T10:05:14.906431530Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:14.906900 kubelet[2572]: E0213 10:05:14.906675 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:05:14.906900 kubelet[2572]: E0213 10:05:14.906726 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:05:14.906900 kubelet[2572]: E0213 10:05:14.906790 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:14.906900 kubelet[2572]: E0213 10:05:14.906835 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:05:16.286996 systemd[1]: Started sshd@137-139.178.70.11:22-5.135.90.165:48260.service. Feb 13 10:05:16.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.70.11:22-5.135.90.165:48260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:16.462205 sshd[7144]: Unable to negotiate with 5.135.90.165 port 48260: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:16.464119 systemd[1]: sshd@137-139.178.70.11:22-5.135.90.165:48260.service: Deactivated successfully. Feb 13 10:05:16.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-139.178.70.11:22-5.135.90.165:48260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:17.886202 env[1474]: time="2024-02-13T10:05:17.886096933Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:05:17.940977 env[1474]: time="2024-02-13T10:05:17.940879485Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:17.941263 kubelet[2572]: E0213 10:05:17.941208 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:05:17.941263 kubelet[2572]: E0213 10:05:17.941267 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:05:17.941702 kubelet[2572]: E0213 10:05:17.941321 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:17.941702 kubelet[2572]: E0213 10:05:17.941366 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:05:18.664184 systemd[1]: Started sshd@138-139.178.70.11:22-139.178.68.195:59818.service. Feb 13 10:05:18.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.11:22-139.178.68.195:59818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:18.698291 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:18.698348 kernel: audit: type=1130 audit(1707818718.663:1856): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.11:22-139.178.68.195:59818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:18.808000 audit[7181]: USER_ACCT pid=7181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.809388 sshd[7181]: Accepted publickey for core from 139.178.68.195 port 59818 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:18.810136 sshd[7181]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:18.812854 systemd-logind[1462]: New session 58 of user core. Feb 13 10:05:18.813983 systemd[1]: Started session-58.scope. Feb 13 10:05:18.895648 sshd[7181]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:18.897477 systemd[1]: sshd@138-139.178.70.11:22-139.178.68.195:59818.service: Deactivated successfully. Feb 13 10:05:18.898232 systemd[1]: session-58.scope: Deactivated successfully. Feb 13 10:05:18.898771 systemd-logind[1462]: Session 58 logged out. Waiting for processes to exit. Feb 13 10:05:18.899234 systemd-logind[1462]: Removed session 58. Feb 13 10:05:18.809000 audit[7181]: CRED_ACQ pid=7181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.993033 kernel: audit: type=1101 audit(1707818718.808:1857): pid=7181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.993071 kernel: audit: type=1103 audit(1707818718.809:1858): pid=7181 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.993085 kernel: audit: type=1006 audit(1707818718.809:1859): pid=7181 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=58 res=1 Feb 13 10:05:19.051734 kernel: audit: type=1300 audit(1707818718.809:1859): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd8cf4e20 a2=3 a3=0 items=0 ppid=1 pid=7181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:18.809000 audit[7181]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd8cf4e20 a2=3 a3=0 items=0 ppid=1 pid=7181 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=58 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:19.143764 kernel: audit: type=1327 audit(1707818718.809:1859): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:18.809000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:19.174260 kernel: audit: type=1105 audit(1707818718.815:1860): pid=7181 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.815000 audit[7181]: USER_START pid=7181 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:19.268800 kernel: audit: type=1103 audit(1707818718.816:1861): pid=7183 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.816000 audit[7183]: CRED_ACQ pid=7183 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:19.358072 kernel: audit: type=1106 audit(1707818718.895:1862): pid=7181 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.895000 audit[7181]: USER_END pid=7181 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:19.453566 kernel: audit: type=1104 audit(1707818718.895:1863): pid=7181 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.895000 audit[7181]: CRED_DISP pid=7181 uid=0 auid=500 ses=58 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:18.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-139.178.70.11:22-139.178.68.195:59818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:23.082952 systemd[1]: Started sshd@139-139.178.70.11:22-5.135.90.165:44272.service. Feb 13 10:05:23.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.70.11:22-5.135.90.165:44272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:23.254326 sshd[7205]: Unable to negotiate with 5.135.90.165 port 44272: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:23.256239 systemd[1]: sshd@139-139.178.70.11:22-5.135.90.165:44272.service: Deactivated successfully. Feb 13 10:05:23.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-139.178.70.11:22-5.135.90.165:44272 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:23.904951 systemd[1]: Started sshd@140-139.178.70.11:22-139.178.68.195:59830.service. Feb 13 10:05:23.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.70.11:22-139.178.68.195:59830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:23.932065 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:23.932149 kernel: audit: type=1130 audit(1707818723.904:1867): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.70.11:22-139.178.68.195:59830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:24.041000 audit[7209]: USER_ACCT pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.043134 sshd[7209]: Accepted publickey for core from 139.178.68.195 port 59830 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:24.044267 sshd[7209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:24.046730 systemd-logind[1462]: New session 59 of user core. Feb 13 10:05:24.047287 systemd[1]: Started session-59.scope. Feb 13 10:05:24.126838 sshd[7209]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:24.128356 systemd[1]: sshd@140-139.178.70.11:22-139.178.68.195:59830.service: Deactivated successfully. Feb 13 10:05:24.128813 systemd[1]: session-59.scope: Deactivated successfully. Feb 13 10:05:24.129256 systemd-logind[1462]: Session 59 logged out. Waiting for processes to exit. Feb 13 10:05:24.129753 systemd-logind[1462]: Removed session 59. Feb 13 10:05:24.043000 audit[7209]: CRED_ACQ pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.225117 kernel: audit: type=1101 audit(1707818724.041:1868): pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.225155 kernel: audit: type=1103 audit(1707818724.043:1869): pid=7209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.225171 kernel: audit: type=1006 audit(1707818724.043:1870): pid=7209 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=59 res=1 Feb 13 10:05:24.283729 kernel: audit: type=1300 audit(1707818724.043:1870): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2f821b10 a2=3 a3=0 items=0 ppid=1 pid=7209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:24.043000 audit[7209]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2f821b10 a2=3 a3=0 items=0 ppid=1 pid=7209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=59 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:24.375744 kernel: audit: type=1327 audit(1707818724.043:1870): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:24.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:24.406239 kernel: audit: type=1105 audit(1707818724.047:1871): pid=7209 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.047000 audit[7209]: USER_START pid=7209 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.500731 kernel: audit: type=1103 audit(1707818724.049:1872): pid=7211 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.049000 audit[7211]: CRED_ACQ pid=7211 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.589923 kernel: audit: type=1106 audit(1707818724.125:1873): pid=7209 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.125000 audit[7209]: USER_END pid=7209 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.125000 audit[7209]: CRED_DISP pid=7209 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.774646 kernel: audit: type=1104 audit(1707818724.125:1874): pid=7209 uid=0 auid=500 ses=59 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:24.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-139.178.70.11:22-139.178.68.195:59830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:27.885557 env[1474]: time="2024-02-13T10:05:27.885410862Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:05:27.885557 env[1474]: time="2024-02-13T10:05:27.885399060Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:05:27.936463 env[1474]: time="2024-02-13T10:05:27.936402601Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:27.936634 env[1474]: time="2024-02-13T10:05:27.936538305Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:27.936719 kubelet[2572]: E0213 10:05:27.936691 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:05:27.937047 kubelet[2572]: E0213 10:05:27.936740 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:05:27.937047 kubelet[2572]: E0213 10:05:27.936742 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:05:27.937047 kubelet[2572]: E0213 10:05:27.936774 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:05:27.937047 kubelet[2572]: E0213 10:05:27.936798 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:27.937047 kubelet[2572]: E0213 10:05:27.936816 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:27.937330 kubelet[2572]: E0213 10:05:27.936831 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:05:27.937330 kubelet[2572]: E0213 10:05:27.936856 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:05:29.135408 systemd[1]: Started sshd@141-139.178.70.11:22-139.178.68.195:51770.service. Feb 13 10:05:29.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.70.11:22-139.178.68.195:51770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:29.162549 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:05:29.162620 kernel: audit: type=1130 audit(1707818729.133:1876): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.70.11:22-139.178.68.195:51770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:29.271000 audit[7295]: USER_ACCT pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.274009 sshd[7295]: Accepted publickey for core from 139.178.68.195 port 51770 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:29.275182 sshd[7295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:29.277949 systemd-logind[1462]: New session 60 of user core. Feb 13 10:05:29.279189 systemd[1]: Started session-60.scope. Feb 13 10:05:29.273000 audit[7295]: CRED_ACQ pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.457834 kernel: audit: type=1101 audit(1707818729.271:1877): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.457873 kernel: audit: type=1103 audit(1707818729.273:1878): pid=7295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.457893 kernel: audit: type=1006 audit(1707818729.273:1879): pid=7295 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=60 res=1 Feb 13 10:05:29.516395 kernel: audit: type=1300 audit(1707818729.273:1879): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6ec7b140 a2=3 a3=0 items=0 ppid=1 pid=7295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:29.273000 audit[7295]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6ec7b140 a2=3 a3=0 items=0 ppid=1 pid=7295 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=60 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:29.608447 kernel: audit: type=1327 audit(1707818729.273:1879): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:29.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:29.608709 sshd[7295]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:29.610310 systemd[1]: sshd@141-139.178.70.11:22-139.178.68.195:51770.service: Deactivated successfully. Feb 13 10:05:29.610732 systemd[1]: session-60.scope: Deactivated successfully. Feb 13 10:05:29.611094 systemd-logind[1462]: Session 60 logged out. Waiting for processes to exit. Feb 13 10:05:29.611578 systemd-logind[1462]: Removed session 60. Feb 13 10:05:29.638981 kernel: audit: type=1105 audit(1707818729.280:1880): pid=7295 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.280000 audit[7295]: USER_START pid=7295 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.733483 kernel: audit: type=1103 audit(1707818729.280:1881): pid=7297 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.280000 audit[7297]: CRED_ACQ pid=7297 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.822726 kernel: audit: type=1106 audit(1707818729.607:1882): pid=7295 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.607000 audit[7295]: USER_END pid=7295 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.885218 env[1474]: time="2024-02-13T10:05:29.885155757Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:05:29.897537 env[1474]: time="2024-02-13T10:05:29.897467011Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:29.897701 kubelet[2572]: E0213 10:05:29.897659 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:05:29.897701 kubelet[2572]: E0213 10:05:29.897688 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:05:29.897910 kubelet[2572]: E0213 10:05:29.897711 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:29.897910 kubelet[2572]: E0213 10:05:29.897728 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:05:29.918215 kernel: audit: type=1104 audit(1707818729.607:1883): pid=7295 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.607000 audit[7295]: CRED_DISP pid=7295 uid=0 auid=500 ses=60 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:29.997903 systemd[1]: Started sshd@142-139.178.70.11:22-5.135.90.165:40238.service. Feb 13 10:05:29.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-139.178.70.11:22-139.178.68.195:51770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:29.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.70.11:22-5.135.90.165:40238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:30.151410 sshd[7348]: Unable to negotiate with 5.135.90.165 port 40238: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:30.153290 systemd[1]: sshd@142-139.178.70.11:22-5.135.90.165:40238.service: Deactivated successfully. Feb 13 10:05:30.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-139.178.70.11:22-5.135.90.165:40238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:31.885954 env[1474]: time="2024-02-13T10:05:31.885873712Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:05:31.936734 env[1474]: time="2024-02-13T10:05:31.936636194Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:31.937009 kubelet[2572]: E0213 10:05:31.936953 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:05:31.937009 kubelet[2572]: E0213 10:05:31.937007 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:05:31.937442 kubelet[2572]: E0213 10:05:31.937064 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:31.937442 kubelet[2572]: E0213 10:05:31.937112 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:05:34.561343 systemd[1]: Started sshd@143-139.178.70.11:22-139.178.68.195:51778.service. Feb 13 10:05:34.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.70.11:22-139.178.68.195:51778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:34.588345 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:34.588441 kernel: audit: type=1130 audit(1707818734.559:1887): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.70.11:22-139.178.68.195:51778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:34.699000 audit[7382]: USER_ACCT pid=7382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.701474 sshd[7382]: Accepted publickey for core from 139.178.68.195 port 51778 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:34.703594 sshd[7382]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:34.708679 systemd-logind[1462]: New session 61 of user core. Feb 13 10:05:34.709734 systemd[1]: Started session-61.scope. Feb 13 10:05:34.788879 sshd[7382]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:34.790669 systemd[1]: sshd@143-139.178.70.11:22-139.178.68.195:51778.service: Deactivated successfully. Feb 13 10:05:34.791098 systemd[1]: session-61.scope: Deactivated successfully. Feb 13 10:05:34.791498 systemd-logind[1462]: Session 61 logged out. Waiting for processes to exit. Feb 13 10:05:34.791991 systemd-logind[1462]: Removed session 61. Feb 13 10:05:34.701000 audit[7382]: CRED_ACQ pid=7382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.883176 kernel: audit: type=1101 audit(1707818734.699:1888): pid=7382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.883225 kernel: audit: type=1103 audit(1707818734.701:1889): pid=7382 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.883246 kernel: audit: type=1006 audit(1707818734.701:1890): pid=7382 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=61 res=1 Feb 13 10:05:34.941810 kernel: audit: type=1300 audit(1707818734.701:1890): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09c9b740 a2=3 a3=0 items=0 ppid=1 pid=7382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:34.701000 audit[7382]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe09c9b740 a2=3 a3=0 items=0 ppid=1 pid=7382 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=61 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:35.033930 kernel: audit: type=1327 audit(1707818734.701:1890): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:34.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:35.064468 kernel: audit: type=1105 audit(1707818734.710:1891): pid=7382 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.710000 audit[7382]: USER_START pid=7382 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:35.159082 kernel: audit: type=1103 audit(1707818734.710:1892): pid=7386 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.710000 audit[7386]: CRED_ACQ pid=7386 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:35.248332 kernel: audit: type=1106 audit(1707818734.787:1893): pid=7382 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.787000 audit[7382]: USER_END pid=7382 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:35.343866 kernel: audit: type=1104 audit(1707818734.787:1894): pid=7382 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.787000 audit[7382]: CRED_DISP pid=7382 uid=0 auid=500 ses=61 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:34.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-139.178.70.11:22-139.178.68.195:51778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:36.795904 systemd[1]: Started sshd@144-139.178.70.11:22-5.135.90.165:36368.service. Feb 13 10:05:36.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.70.11:22-5.135.90.165:36368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:36.967430 sshd[7409]: Unable to negotiate with 5.135.90.165 port 36368: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:36.969231 systemd[1]: sshd@144-139.178.70.11:22-5.135.90.165:36368.service: Deactivated successfully. Feb 13 10:05:36.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-139.178.70.11:22-5.135.90.165:36368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:38.885648 env[1474]: time="2024-02-13T10:05:38.885542418Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:05:38.927669 env[1474]: time="2024-02-13T10:05:38.927611630Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:38.927816 kubelet[2572]: E0213 10:05:38.927803 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:05:38.927995 kubelet[2572]: E0213 10:05:38.927836 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:05:38.927995 kubelet[2572]: E0213 10:05:38.927864 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:38.927995 kubelet[2572]: E0213 10:05:38.927883 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:05:39.797761 systemd[1]: Started sshd@145-139.178.70.11:22-139.178.68.195:38924.service. Feb 13 10:05:39.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.70.11:22-139.178.68.195:38924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:39.824905 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:39.824979 kernel: audit: type=1130 audit(1707818739.796:1898): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.70.11:22-139.178.68.195:38924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:39.935000 audit[7442]: USER_ACCT pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:39.936723 sshd[7442]: Accepted publickey for core from 139.178.68.195 port 38924 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:39.939155 sshd[7442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:39.941549 systemd-logind[1462]: New session 62 of user core. Feb 13 10:05:39.942020 systemd[1]: Started session-62.scope. Feb 13 10:05:40.021344 sshd[7442]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:40.022723 systemd[1]: sshd@145-139.178.70.11:22-139.178.68.195:38924.service: Deactivated successfully. Feb 13 10:05:40.023153 systemd[1]: session-62.scope: Deactivated successfully. Feb 13 10:05:40.023468 systemd-logind[1462]: Session 62 logged out. Waiting for processes to exit. Feb 13 10:05:40.023872 systemd-logind[1462]: Removed session 62. Feb 13 10:05:39.938000 audit[7442]: CRED_ACQ pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.118538 kernel: audit: type=1101 audit(1707818739.935:1899): pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.118587 kernel: audit: type=1103 audit(1707818739.938:1900): pid=7442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.118605 kernel: audit: type=1006 audit(1707818739.938:1901): pid=7442 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=62 res=1 Feb 13 10:05:40.177121 kernel: audit: type=1300 audit(1707818739.938:1901): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd05b787c0 a2=3 a3=0 items=0 ppid=1 pid=7442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:39.938000 audit[7442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd05b787c0 a2=3 a3=0 items=0 ppid=1 pid=7442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=62 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:40.269758 kernel: audit: type=1327 audit(1707818739.938:1901): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:39.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:39.943000 audit[7442]: USER_START pid=7442 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.394937 kernel: audit: type=1105 audit(1707818739.943:1902): pid=7442 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.395012 kernel: audit: type=1103 audit(1707818739.943:1903): pid=7444 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:39.943000 audit[7444]: CRED_ACQ pid=7444 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.484354 kernel: audit: type=1106 audit(1707818740.021:1904): pid=7442 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.021000 audit[7442]: USER_END pid=7442 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.579860 kernel: audit: type=1104 audit(1707818740.021:1905): pid=7442 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.021000 audit[7442]: CRED_DISP pid=7442 uid=0 auid=500 ses=62 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:40.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@145-139.178.70.11:22-139.178.68.195:38924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:41.886404 env[1474]: time="2024-02-13T10:05:41.886261562Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:05:41.912583 env[1474]: time="2024-02-13T10:05:41.912546662Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:41.912769 kubelet[2572]: E0213 10:05:41.912758 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:05:41.912976 kubelet[2572]: E0213 10:05:41.912787 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:05:41.912976 kubelet[2572]: E0213 10:05:41.912809 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:41.912976 kubelet[2572]: E0213 10:05:41.912828 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:05:41.948360 systemd[1]: Started sshd@146-139.178.70.11:22-5.135.90.165:60560.service. Feb 13 10:05:41.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.70.11:22-5.135.90.165:60560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:42.127777 sshd[7494]: Unable to negotiate with 5.135.90.165 port 60560: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:42.129474 systemd[1]: sshd@146-139.178.70.11:22-5.135.90.165:60560.service: Deactivated successfully. Feb 13 10:05:42.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@146-139.178.70.11:22-5.135.90.165:60560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:42.885280 env[1474]: time="2024-02-13T10:05:42.885156950Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:05:42.937208 env[1474]: time="2024-02-13T10:05:42.937112269Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:42.937647 kubelet[2572]: E0213 10:05:42.937425 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:05:42.937647 kubelet[2572]: E0213 10:05:42.937476 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:05:42.937647 kubelet[2572]: E0213 10:05:42.937531 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:42.937647 kubelet[2572]: E0213 10:05:42.937572 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:05:44.884889 env[1474]: time="2024-02-13T10:05:44.884831214Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:05:44.903342 env[1474]: time="2024-02-13T10:05:44.903305380Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:44.903544 kubelet[2572]: E0213 10:05:44.903500 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:05:44.903544 kubelet[2572]: E0213 10:05:44.903529 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:05:44.903753 kubelet[2572]: E0213 10:05:44.903552 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:44.903753 kubelet[2572]: E0213 10:05:44.903570 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:05:45.036558 systemd[1]: Started sshd@147-139.178.70.11:22-139.178.68.195:38928.service. Feb 13 10:05:45.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.70.11:22-139.178.68.195:38928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:45.077317 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:05:45.077408 kernel: audit: type=1130 audit(1707818745.036:1909): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.70.11:22-139.178.68.195:38928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:45.188000 audit[7555]: USER_ACCT pid=7555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.189097 sshd[7555]: Accepted publickey for core from 139.178.68.195 port 38928 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:45.190514 sshd[7555]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:45.192910 systemd-logind[1462]: New session 63 of user core. Feb 13 10:05:45.193376 systemd[1]: Started session-63.scope. Feb 13 10:05:45.271861 sshd[7555]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:45.273144 systemd[1]: sshd@147-139.178.70.11:22-139.178.68.195:38928.service: Deactivated successfully. Feb 13 10:05:45.273563 systemd[1]: session-63.scope: Deactivated successfully. Feb 13 10:05:45.273852 systemd-logind[1462]: Session 63 logged out. Waiting for processes to exit. Feb 13 10:05:45.274328 systemd-logind[1462]: Removed session 63. Feb 13 10:05:45.189000 audit[7555]: CRED_ACQ pid=7555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.370939 kernel: audit: type=1101 audit(1707818745.188:1910): pid=7555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.371031 kernel: audit: type=1103 audit(1707818745.189:1911): pid=7555 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.371049 kernel: audit: type=1006 audit(1707818745.189:1912): pid=7555 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=63 res=1 Feb 13 10:05:45.429702 kernel: audit: type=1300 audit(1707818745.189:1912): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde4e22f0 a2=3 a3=0 items=0 ppid=1 pid=7555 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:45.189000 audit[7555]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcde4e22f0 a2=3 a3=0 items=0 ppid=1 pid=7555 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=63 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:45.521768 kernel: audit: type=1327 audit(1707818745.189:1912): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:45.189000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:45.552341 kernel: audit: type=1105 audit(1707818745.194:1913): pid=7555 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.194000 audit[7555]: USER_START pid=7555 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.646928 kernel: audit: type=1103 audit(1707818745.194:1914): pid=7557 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.194000 audit[7557]: CRED_ACQ pid=7557 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.736168 kernel: audit: type=1106 audit(1707818745.271:1915): pid=7555 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.271000 audit[7555]: USER_END pid=7555 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.831749 kernel: audit: type=1104 audit(1707818745.271:1916): pid=7555 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.271000 audit[7555]: CRED_DISP pid=7555 uid=0 auid=500 ses=63 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:45.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@147-139.178.70.11:22-139.178.68.195:38928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:46.213000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.213000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00217b290 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:46.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:46.213000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.213000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012bc120 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:46.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c012b3c540 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:05:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c01368d890 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:05:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:05:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:05:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.473000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00844c1e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:05:46.473000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006070560 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:05:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:05:46.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:05:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00844c210 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:05:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:05:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c006070580 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:05:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:05:47.556183 systemd[1]: Started sshd@148-139.178.70.11:22-5.135.90.165:56588.service. Feb 13 10:05:47.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.70.11:22-5.135.90.165:56588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:47.712189 sshd[7579]: Unable to negotiate with 5.135.90.165 port 56588: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:47.713941 systemd[1]: sshd@148-139.178.70.11:22-5.135.90.165:56588.service: Deactivated successfully. Feb 13 10:05:47.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@148-139.178.70.11:22-5.135.90.165:56588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:50.041000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.069265 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 10:05:50.069350 kernel: audit: type=1400 audit(1707818750.041:1928): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.041000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011d5500 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.279174 kernel: audit: type=1300 audit(1707818750.041:1928): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011d5500 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.279206 kernel: audit: type=1327 audit(1707818750.041:1928): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.371741 kernel: audit: type=1400 audit(1707818750.041:1929): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.041000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.374064 systemd[1]: Started sshd@149-139.178.70.11:22-139.178.68.195:54536.service. Feb 13 10:05:50.041000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012bd560 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.582662 kernel: audit: type=1300 audit(1707818750.041:1929): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012bd560 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.582696 kernel: audit: type=1327 audit(1707818750.041:1929): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.603925 sshd[7585]: Accepted publickey for core from 139.178.68.195 port 54536 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:50.604906 sshd[7585]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:50.607263 systemd-logind[1462]: New session 64 of user core. Feb 13 10:05:50.607673 systemd[1]: Started session-64.scope. Feb 13 10:05:50.041000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.686775 sshd[7585]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:50.688307 systemd[1]: sshd@149-139.178.70.11:22-139.178.68.195:54536.service: Deactivated successfully. Feb 13 10:05:50.688740 systemd[1]: session-64.scope: Deactivated successfully. Feb 13 10:05:50.689170 systemd-logind[1462]: Session 64 logged out. Waiting for processes to exit. Feb 13 10:05:50.689779 systemd-logind[1462]: Removed session 64. Feb 13 10:05:50.765804 kernel: audit: type=1400 audit(1707818750.041:1930): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.765841 kernel: audit: type=1300 audit(1707818750.041:1930): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000535700 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.041000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000535700 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.886126 kernel: audit: type=1327 audit(1707818750.041:1930): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.979147 kernel: audit: type=1400 audit(1707818750.041:1931): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.041000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:05:50.041000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000e78000 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:05:50.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:05:50.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.70.11:22-139.178.68.195:54536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:50.603000 audit[7585]: USER_ACCT pid=7585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:50.603000 audit[7585]: CRED_ACQ pid=7585 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:50.603000 audit[7585]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce30523e0 a2=3 a3=0 items=0 ppid=1 pid=7585 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=64 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:50.603000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:50.607000 audit[7585]: USER_START pid=7585 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:50.607000 audit[7587]: CRED_ACQ pid=7587 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:50.686000 audit[7585]: USER_END pid=7585 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:50.686000 audit[7585]: CRED_DISP pid=7585 uid=0 auid=500 ses=64 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:50.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@149-139.178.70.11:22-139.178.68.195:54536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:52.885679 env[1474]: time="2024-02-13T10:05:52.885545234Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:05:52.936468 env[1474]: time="2024-02-13T10:05:52.936379545Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:52.936683 kubelet[2572]: E0213 10:05:52.936660 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:05:52.937042 kubelet[2572]: E0213 10:05:52.936711 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:05:52.937042 kubelet[2572]: E0213 10:05:52.936758 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:52.937042 kubelet[2572]: E0213 10:05:52.936796 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:05:53.885959 env[1474]: time="2024-02-13T10:05:53.885812120Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:05:53.937762 env[1474]: time="2024-02-13T10:05:53.937670137Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:53.938031 kubelet[2572]: E0213 10:05:53.937972 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:05:53.938031 kubelet[2572]: E0213 10:05:53.938026 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:05:53.938460 kubelet[2572]: E0213 10:05:53.938079 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:53.938460 kubelet[2572]: E0213 10:05:53.938120 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:05:54.006662 systemd[1]: Started sshd@150-139.178.70.11:22-5.135.90.165:52592.service. Feb 13 10:05:54.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.70.11:22-5.135.90.165:52592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:54.161238 sshd[7674]: Unable to negotiate with 5.135.90.165 port 52592: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:54.163122 systemd[1]: sshd@150-139.178.70.11:22-5.135.90.165:52592.service: Deactivated successfully. Feb 13 10:05:54.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@150-139.178.70.11:22-5.135.90.165:52592 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:54.886252 env[1474]: time="2024-02-13T10:05:54.886108374Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:05:54.912257 env[1474]: time="2024-02-13T10:05:54.912221275Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:54.912422 kubelet[2572]: E0213 10:05:54.912384 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:05:54.912422 kubelet[2572]: E0213 10:05:54.912411 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:05:54.912491 kubelet[2572]: E0213 10:05:54.912433 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:54.912491 kubelet[2572]: E0213 10:05:54.912450 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:05:55.696789 systemd[1]: Started sshd@151-139.178.70.11:22-139.178.68.195:54546.service. Feb 13 10:05:55.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.70.11:22-139.178.68.195:54546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:55.724252 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 13 10:05:55.724332 kernel: audit: type=1130 audit(1707818755.696:1943): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.70.11:22-139.178.68.195:54546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:55.835000 audit[7706]: USER_ACCT pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:55.836372 sshd[7706]: Accepted publickey for core from 139.178.68.195 port 54546 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:05:55.838011 sshd[7706]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:05:55.840455 systemd-logind[1462]: New session 65 of user core. Feb 13 10:05:55.840910 systemd[1]: Started session-65.scope. Feb 13 10:05:55.921009 sshd[7706]: pam_unix(sshd:session): session closed for user core Feb 13 10:05:55.922513 systemd[1]: sshd@151-139.178.70.11:22-139.178.68.195:54546.service: Deactivated successfully. Feb 13 10:05:55.922969 systemd[1]: session-65.scope: Deactivated successfully. Feb 13 10:05:55.923397 systemd-logind[1462]: Session 65 logged out. Waiting for processes to exit. Feb 13 10:05:55.923799 systemd-logind[1462]: Removed session 65. Feb 13 10:05:55.836000 audit[7706]: CRED_ACQ pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.020289 kernel: audit: type=1101 audit(1707818755.835:1944): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.020330 kernel: audit: type=1103 audit(1707818755.836:1945): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.020349 kernel: audit: type=1006 audit(1707818755.837:1946): pid=7706 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=65 res=1 Feb 13 10:05:55.837000 audit[7706]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc6222090 a2=3 a3=0 items=0 ppid=1 pid=7706 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:56.171855 kernel: audit: type=1300 audit(1707818755.837:1946): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc6222090 a2=3 a3=0 items=0 ppid=1 pid=7706 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=65 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:05:56.171893 kernel: audit: type=1327 audit(1707818755.837:1946): proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:55.837000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:05:55.842000 audit[7706]: USER_START pid=7706 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.298388 kernel: audit: type=1105 audit(1707818755.842:1947): pid=7706 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.298423 kernel: audit: type=1103 audit(1707818755.843:1948): pid=7708 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:55.843000 audit[7708]: CRED_ACQ pid=7708 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:55.920000 audit[7706]: USER_END pid=7706 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.483710 kernel: audit: type=1106 audit(1707818755.920:1949): pid=7706 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:56.483738 kernel: audit: type=1104 audit(1707818755.920:1950): pid=7706 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:55.920000 audit[7706]: CRED_DISP pid=7706 uid=0 auid=500 ses=65 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:05:55.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@151-139.178.70.11:22-139.178.68.195:54546 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:58.886032 env[1474]: time="2024-02-13T10:05:58.885942427Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:05:58.912505 env[1474]: time="2024-02-13T10:05:58.912431400Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:05:58.912604 kubelet[2572]: E0213 10:05:58.912585 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:05:58.912760 kubelet[2572]: E0213 10:05:58.912613 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:05:58.912760 kubelet[2572]: E0213 10:05:58.912638 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:05:58.912760 kubelet[2572]: E0213 10:05:58.912656 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:05:59.384164 systemd[1]: Started sshd@152-139.178.70.11:22-5.135.90.165:48672.service. Feb 13 10:05:59.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.70.11:22-5.135.90.165:48672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:05:59.582626 sshd[7763]: Unable to negotiate with 5.135.90.165 port 48672: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:05:59.584449 systemd[1]: sshd@152-139.178.70.11:22-5.135.90.165:48672.service: Deactivated successfully. Feb 13 10:05:59.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@152-139.178.70.11:22-5.135.90.165:48672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:00.929957 systemd[1]: Started sshd@153-139.178.70.11:22-139.178.68.195:40926.service. Feb 13 10:06:00.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.70.11:22-139.178.68.195:40926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:00.956680 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:00.956722 kernel: audit: type=1130 audit(1707818760.929:1954): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.70.11:22-139.178.68.195:40926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:01.067000 audit[7767]: USER_ACCT pid=7767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.068449 sshd[7767]: Accepted publickey for core from 139.178.68.195 port 40926 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:01.069958 sshd[7767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:01.072244 systemd-logind[1462]: New session 66 of user core. Feb 13 10:06:01.072743 systemd[1]: Started session-66.scope. Feb 13 10:06:01.152200 sshd[7767]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:01.153565 systemd[1]: sshd@153-139.178.70.11:22-139.178.68.195:40926.service: Deactivated successfully. Feb 13 10:06:01.154018 systemd[1]: session-66.scope: Deactivated successfully. Feb 13 10:06:01.154460 systemd-logind[1462]: Session 66 logged out. Waiting for processes to exit. Feb 13 10:06:01.154850 systemd-logind[1462]: Removed session 66. Feb 13 10:06:01.068000 audit[7767]: CRED_ACQ pid=7767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.250599 kernel: audit: type=1101 audit(1707818761.067:1955): pid=7767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.250635 kernel: audit: type=1103 audit(1707818761.068:1956): pid=7767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.250653 kernel: audit: type=1006 audit(1707818761.068:1957): pid=7767 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=66 res=1 Feb 13 10:06:01.309020 kernel: audit: type=1300 audit(1707818761.068:1957): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd124d2dc0 a2=3 a3=0 items=0 ppid=1 pid=7767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:01.068000 audit[7767]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd124d2dc0 a2=3 a3=0 items=0 ppid=1 pid=7767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=66 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:01.068000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:01.431341 kernel: audit: type=1327 audit(1707818761.068:1957): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:01.431371 kernel: audit: type=1105 audit(1707818761.074:1958): pid=7767 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.074000 audit[7767]: USER_START pid=7767 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.525917 kernel: audit: type=1103 audit(1707818761.074:1959): pid=7769 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.074000 audit[7769]: CRED_ACQ pid=7769 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.615049 kernel: audit: type=1106 audit(1707818761.151:1960): pid=7767 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.151000 audit[7767]: USER_END pid=7767 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.710472 kernel: audit: type=1104 audit(1707818761.152:1961): pid=7767 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.152000 audit[7767]: CRED_DISP pid=7767 uid=0 auid=500 ses=66 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:01.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@153-139.178.70.11:22-139.178.68.195:40926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:05.070847 systemd[1]: Started sshd@154-139.178.70.11:22-5.135.90.165:44708.service. Feb 13 10:06:05.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.70.11:22-5.135.90.165:44708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:05.223139 sshd[7794]: Unable to negotiate with 5.135.90.165 port 44708: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:05.225069 systemd[1]: sshd@154-139.178.70.11:22-5.135.90.165:44708.service: Deactivated successfully. Feb 13 10:06:05.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@154-139.178.70.11:22-5.135.90.165:44708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:06.162140 systemd[1]: Started sshd@155-139.178.70.11:22-139.178.68.195:51818.service. Feb 13 10:06:06.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.70.11:22-139.178.68.195:51818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:06.189196 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:06.189276 kernel: audit: type=1130 audit(1707818766.161:1965): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.70.11:22-139.178.68.195:51818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:06.300000 audit[7798]: USER_ACCT pid=7798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.301436 sshd[7798]: Accepted publickey for core from 139.178.68.195 port 51818 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:06.302166 sshd[7798]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:06.304564 systemd-logind[1462]: New session 67 of user core. Feb 13 10:06:06.305065 systemd[1]: Started session-67.scope. Feb 13 10:06:06.384710 sshd[7798]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:06.386221 systemd[1]: sshd@155-139.178.70.11:22-139.178.68.195:51818.service: Deactivated successfully. Feb 13 10:06:06.386674 systemd[1]: session-67.scope: Deactivated successfully. Feb 13 10:06:06.387087 systemd-logind[1462]: Session 67 logged out. Waiting for processes to exit. Feb 13 10:06:06.387634 systemd-logind[1462]: Removed session 67. Feb 13 10:06:06.301000 audit[7798]: CRED_ACQ pid=7798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.392851 kernel: audit: type=1101 audit(1707818766.300:1966): pid=7798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.392883 kernel: audit: type=1103 audit(1707818766.301:1967): pid=7798 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.541865 kernel: audit: type=1006 audit(1707818766.301:1968): pid=7798 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=67 res=1 Feb 13 10:06:06.541901 kernel: audit: type=1300 audit(1707818766.301:1968): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd487f5a40 a2=3 a3=0 items=0 ppid=1 pid=7798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:06.301000 audit[7798]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd487f5a40 a2=3 a3=0 items=0 ppid=1 pid=7798 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=67 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:06.633920 kernel: audit: type=1327 audit(1707818766.301:1968): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:06.301000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:06.664403 kernel: audit: type=1105 audit(1707818766.306:1969): pid=7798 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.306000 audit[7798]: USER_START pid=7798 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.758923 kernel: audit: type=1103 audit(1707818766.306:1970): pid=7800 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.306000 audit[7800]: CRED_ACQ pid=7800 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.384000 audit[7798]: USER_END pid=7798 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.885044 env[1474]: time="2024-02-13T10:06:06.885023952Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:06:06.897247 env[1474]: time="2024-02-13T10:06:06.897183611Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:06.897412 kubelet[2572]: E0213 10:06:06.897367 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:06:06.897412 kubelet[2572]: E0213 10:06:06.897404 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:06:06.897605 kubelet[2572]: E0213 10:06:06.897442 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:06.897605 kubelet[2572]: E0213 10:06:06.897479 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:06:06.943700 kernel: audit: type=1106 audit(1707818766.384:1971): pid=7798 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.943737 kernel: audit: type=1104 audit(1707818766.384:1972): pid=7798 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.384000 audit[7798]: CRED_DISP pid=7798 uid=0 auid=500 ses=67 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:06.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@155-139.178.70.11:22-139.178.68.195:51818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:07.885954 env[1474]: time="2024-02-13T10:06:07.885809131Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:06:07.911967 env[1474]: time="2024-02-13T10:06:07.911906606Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:07.912134 kubelet[2572]: E0213 10:06:07.912091 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:06:07.912134 kubelet[2572]: E0213 10:06:07.912118 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:06:07.912311 kubelet[2572]: E0213 10:06:07.912141 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:07.912311 kubelet[2572]: E0213 10:06:07.912159 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:06:09.885037 env[1474]: time="2024-02-13T10:06:09.884981452Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:06:09.897806 env[1474]: time="2024-02-13T10:06:09.897739015Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:09.897948 kubelet[2572]: E0213 10:06:09.897935 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:06:09.898136 kubelet[2572]: E0213 10:06:09.897966 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:06:09.898136 kubelet[2572]: E0213 10:06:09.897995 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:09.898136 kubelet[2572]: E0213 10:06:09.898018 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:06:10.373161 systemd[1]: Started sshd@156-139.178.70.11:22-5.135.90.165:40594.service. Feb 13 10:06:10.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.70.11:22-5.135.90.165:40594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:10.530620 sshd[7908]: Unable to negotiate with 5.135.90.165 port 40594: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:10.532540 systemd[1]: sshd@156-139.178.70.11:22-5.135.90.165:40594.service: Deactivated successfully. Feb 13 10:06:10.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@156-139.178.70.11:22-5.135.90.165:40594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:10.885380 env[1474]: time="2024-02-13T10:06:10.885281673Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:06:10.935738 env[1474]: time="2024-02-13T10:06:10.935668506Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:10.936036 kubelet[2572]: E0213 10:06:10.935980 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:06:10.936036 kubelet[2572]: E0213 10:06:10.936031 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:06:10.936708 kubelet[2572]: E0213 10:06:10.936084 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:10.936708 kubelet[2572]: E0213 10:06:10.936125 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:06:11.394212 systemd[1]: Started sshd@157-139.178.70.11:22-139.178.68.195:51834.service. Feb 13 10:06:11.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.70.11:22-139.178.68.195:51834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:11.421251 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:11.421343 kernel: audit: type=1130 audit(1707818771.393:1976): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.70.11:22-139.178.68.195:51834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:11.531000 audit[7942]: USER_ACCT pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.533021 sshd[7942]: Accepted publickey for core from 139.178.68.195 port 51834 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:11.534547 sshd[7942]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:11.536996 systemd-logind[1462]: New session 68 of user core. Feb 13 10:06:11.537484 systemd[1]: Started session-68.scope. Feb 13 10:06:11.619338 sshd[7942]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:11.620620 systemd[1]: sshd@157-139.178.70.11:22-139.178.68.195:51834.service: Deactivated successfully. Feb 13 10:06:11.621057 systemd[1]: session-68.scope: Deactivated successfully. Feb 13 10:06:11.621403 systemd-logind[1462]: Session 68 logged out. Waiting for processes to exit. Feb 13 10:06:11.622124 systemd-logind[1462]: Removed session 68. Feb 13 10:06:11.533000 audit[7942]: CRED_ACQ pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.715784 kernel: audit: type=1101 audit(1707818771.531:1977): pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.715830 kernel: audit: type=1103 audit(1707818771.533:1978): pid=7942 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.715854 kernel: audit: type=1006 audit(1707818771.533:1979): pid=7942 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=68 res=1 Feb 13 10:06:11.774385 kernel: audit: type=1300 audit(1707818771.533:1979): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb4048b40 a2=3 a3=0 items=0 ppid=1 pid=7942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:11.533000 audit[7942]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb4048b40 a2=3 a3=0 items=0 ppid=1 pid=7942 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=68 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:11.866436 kernel: audit: type=1327 audit(1707818771.533:1979): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:11.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:11.896923 kernel: audit: type=1105 audit(1707818771.539:1980): pid=7942 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.539000 audit[7942]: USER_START pid=7942 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.991459 kernel: audit: type=1103 audit(1707818771.539:1981): pid=7944 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.539000 audit[7944]: CRED_ACQ pid=7944 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:12.080801 kernel: audit: type=1106 audit(1707818771.619:1982): pid=7942 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.619000 audit[7942]: USER_END pid=7942 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:12.176276 kernel: audit: type=1104 audit(1707818771.619:1983): pid=7942 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.619000 audit[7942]: CRED_DISP pid=7942 uid=0 auid=500 ses=68 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:11.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@157-139.178.70.11:22-139.178.68.195:51834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:16.109927 systemd[1]: Started sshd@158-139.178.70.11:22-5.135.90.165:36724.service. Feb 13 10:06:16.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.70.11:22-5.135.90.165:36724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:16.265604 sshd[7967]: Unable to negotiate with 5.135.90.165 port 36724: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:16.267558 systemd[1]: sshd@158-139.178.70.11:22-5.135.90.165:36724.service: Deactivated successfully. Feb 13 10:06:16.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@158-139.178.70.11:22-5.135.90.165:36724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:16.630232 systemd[1]: Started sshd@159-139.178.70.11:22-139.178.68.195:41830.service. Feb 13 10:06:16.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.70.11:22-139.178.68.195:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:16.673600 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:16.673672 kernel: audit: type=1130 audit(1707818776.629:1987): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.70.11:22-139.178.68.195:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:16.783000 audit[7971]: USER_ACCT pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.785010 sshd[7971]: Accepted publickey for core from 139.178.68.195 port 41830 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:16.786617 sshd[7971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:16.789345 systemd-logind[1462]: New session 69 of user core. Feb 13 10:06:16.789825 systemd[1]: Started session-69.scope. Feb 13 10:06:16.870533 sshd[7971]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:16.871959 systemd[1]: sshd@159-139.178.70.11:22-139.178.68.195:41830.service: Deactivated successfully. Feb 13 10:06:16.872406 systemd[1]: session-69.scope: Deactivated successfully. Feb 13 10:06:16.872745 systemd-logind[1462]: Session 69 logged out. Waiting for processes to exit. Feb 13 10:06:16.873368 systemd-logind[1462]: Removed session 69. Feb 13 10:06:16.785000 audit[7971]: CRED_ACQ pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.966813 kernel: audit: type=1101 audit(1707818776.783:1988): pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.966856 kernel: audit: type=1103 audit(1707818776.785:1989): pid=7971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.966876 kernel: audit: type=1006 audit(1707818776.785:1990): pid=7971 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=69 res=1 Feb 13 10:06:16.785000 audit[7971]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62f3b660 a2=3 a3=0 items=0 ppid=1 pid=7971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:17.117793 kernel: audit: type=1300 audit(1707818776.785:1990): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff62f3b660 a2=3 a3=0 items=0 ppid=1 pid=7971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=69 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:17.117865 kernel: audit: type=1327 audit(1707818776.785:1990): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:16.785000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:17.148391 kernel: audit: type=1105 audit(1707818776.791:1991): pid=7971 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.791000 audit[7971]: USER_START pid=7971 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.792000 audit[7973]: CRED_ACQ pid=7973 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:17.332227 kernel: audit: type=1103 audit(1707818776.792:1992): pid=7973 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:17.332290 kernel: audit: type=1106 audit(1707818776.870:1993): pid=7971 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.870000 audit[7971]: USER_END pid=7971 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.870000 audit[7971]: CRED_DISP pid=7971 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:17.516985 kernel: audit: type=1104 audit(1707818776.870:1994): pid=7971 uid=0 auid=500 ses=69 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:16.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@159-139.178.70.11:22-139.178.68.195:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:20.884437 env[1474]: time="2024-02-13T10:06:20.884400943Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:06:20.900129 env[1474]: time="2024-02-13T10:06:20.900062144Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:20.900286 kubelet[2572]: E0213 10:06:20.900244 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:06:20.900286 kubelet[2572]: E0213 10:06:20.900275 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:06:20.900492 kubelet[2572]: E0213 10:06:20.900299 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:20.900492 kubelet[2572]: E0213 10:06:20.900319 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:06:21.514990 systemd[1]: Started sshd@160-139.178.70.11:22-5.135.90.165:32820.service. Feb 13 10:06:21.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.70.11:22-5.135.90.165:32820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:21.669048 sshd[8022]: Unable to negotiate with 5.135.90.165 port 32820: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:21.671044 systemd[1]: sshd@160-139.178.70.11:22-5.135.90.165:32820.service: Deactivated successfully. Feb 13 10:06:21.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.70.11:22-5.135.90.165:32820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:21.699162 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 10:06:21.699242 kernel: audit: type=1131 audit(1707818781.670:1997): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@160-139.178.70.11:22-5.135.90.165:32820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:21.876732 systemd[1]: Started sshd@161-139.178.70.11:22-139.178.68.195:41838.service. Feb 13 10:06:21.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.70.11:22-139.178.68.195:41838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:21.885161 env[1474]: time="2024-02-13T10:06:21.885098810Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:06:21.898041 env[1474]: time="2024-02-13T10:06:21.898002517Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:21.898256 kubelet[2572]: E0213 10:06:21.898211 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:06:21.898256 kubelet[2572]: E0213 10:06:21.898250 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:06:21.898341 kubelet[2572]: E0213 10:06:21.898286 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:21.898341 kubelet[2572]: E0213 10:06:21.898316 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:06:21.965927 kernel: audit: type=1130 audit(1707818781.876:1998): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.70.11:22-139.178.68.195:41838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:21.986000 audit[8026]: USER_ACCT pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:21.987358 sshd[8026]: Accepted publickey for core from 139.178.68.195 port 41838 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:21.988136 sshd[8026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:21.990445 systemd-logind[1462]: New session 70 of user core. Feb 13 10:06:21.990937 systemd[1]: Started session-70.scope. Feb 13 10:06:21.987000 audit[8026]: CRED_ACQ pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.170044 kernel: audit: type=1101 audit(1707818781.986:1999): pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.170081 kernel: audit: type=1103 audit(1707818781.987:2000): pid=8026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.170103 kernel: audit: type=1006 audit(1707818781.987:2001): pid=8026 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=70 res=1 Feb 13 10:06:22.228650 kernel: audit: type=1300 audit(1707818781.987:2001): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd61922fd0 a2=3 a3=0 items=0 ppid=1 pid=8026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:21.987000 audit[8026]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd61922fd0 a2=3 a3=0 items=0 ppid=1 pid=8026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=70 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:21.987000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:22.323255 sshd[8026]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:22.324666 systemd[1]: sshd@161-139.178.70.11:22-139.178.68.195:41838.service: Deactivated successfully. Feb 13 10:06:22.325094 systemd[1]: session-70.scope: Deactivated successfully. Feb 13 10:06:22.325455 systemd-logind[1462]: Session 70 logged out. Waiting for processes to exit. Feb 13 10:06:22.325855 systemd-logind[1462]: Removed session 70. Feb 13 10:06:22.351209 kernel: audit: type=1327 audit(1707818781.987:2001): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:22.351245 kernel: audit: type=1105 audit(1707818781.991:2002): pid=8026 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:21.991000 audit[8026]: USER_START pid=8026 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.446610 kernel: audit: type=1103 audit(1707818781.992:2003): pid=8055 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:21.992000 audit[8055]: CRED_ACQ pid=8055 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.535878 kernel: audit: type=1106 audit(1707818782.323:2004): pid=8026 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.323000 audit[8026]: USER_END pid=8026 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.323000 audit[8026]: CRED_DISP pid=8026 uid=0 auid=500 ses=70 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:22.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@161-139.178.70.11:22-139.178.68.195:41838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:24.885832 env[1474]: time="2024-02-13T10:06:24.885726482Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:06:24.915303 env[1474]: time="2024-02-13T10:06:24.915270315Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:24.915489 kubelet[2572]: E0213 10:06:24.915458 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:06:24.915489 kubelet[2572]: E0213 10:06:24.915485 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:06:24.915672 kubelet[2572]: E0213 10:06:24.915508 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:24.915672 kubelet[2572]: E0213 10:06:24.915526 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:06:25.885723 env[1474]: time="2024-02-13T10:06:25.885587407Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:06:25.902389 env[1474]: time="2024-02-13T10:06:25.902355607Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:25.902611 kubelet[2572]: E0213 10:06:25.902547 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:06:25.902611 kubelet[2572]: E0213 10:06:25.902576 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:06:25.902611 kubelet[2572]: E0213 10:06:25.902599 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:25.902716 kubelet[2572]: E0213 10:06:25.902618 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:06:27.263398 systemd[1]: Started sshd@162-139.178.70.11:22-5.135.90.165:57016.service. Feb 13 10:06:27.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.70.11:22-5.135.90.165:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:27.290648 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 10:06:27.290716 kernel: audit: type=1130 audit(1707818787.262:2007): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.70.11:22-5.135.90.165:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:27.325217 systemd[1]: Started sshd@163-139.178.70.11:22-139.178.68.195:44822.service. Feb 13 10:06:27.380874 kernel: audit: type=1130 audit(1707818787.324:2008): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.70.11:22-139.178.68.195:44822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:27.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.70.11:22-139.178.68.195:44822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:27.412068 sshd[8135]: Unable to negotiate with 5.135.90.165 port 57016: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:27.412404 systemd[1]: sshd@162-139.178.70.11:22-5.135.90.165:57016.service: Deactivated successfully. Feb 13 10:06:27.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.70.11:22-5.135.90.165:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:27.490743 sshd[8138]: Accepted publickey for core from 139.178.68.195 port 44822 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:27.492386 sshd[8138]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:27.494606 systemd-logind[1462]: New session 71 of user core. Feb 13 10:06:27.495100 systemd[1]: Started session-71.scope. Feb 13 10:06:27.558477 kernel: audit: type=1131 audit(1707818787.411:2009): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@162-139.178.70.11:22-5.135.90.165:57016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:27.558563 kernel: audit: type=1101 audit(1707818787.489:2010): pid=8138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.489000 audit[8138]: USER_ACCT pid=8138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.573870 sshd[8138]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:27.575372 systemd[1]: sshd@163-139.178.70.11:22-139.178.68.195:44822.service: Deactivated successfully. Feb 13 10:06:27.575803 systemd[1]: session-71.scope: Deactivated successfully. Feb 13 10:06:27.576214 systemd-logind[1462]: Session 71 logged out. Waiting for processes to exit. Feb 13 10:06:27.576709 systemd-logind[1462]: Removed session 71. Feb 13 10:06:27.651082 kernel: audit: type=1103 audit(1707818787.491:2011): pid=8138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.491000 audit[8138]: CRED_ACQ pid=8138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.742200 kernel: audit: type=1006 audit(1707818787.491:2012): pid=8138 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=71 res=1 Feb 13 10:06:27.801141 kernel: audit: type=1300 audit(1707818787.491:2012): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8e60a110 a2=3 a3=0 items=0 ppid=1 pid=8138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:27.491000 audit[8138]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8e60a110 a2=3 a3=0 items=0 ppid=1 pid=8138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=71 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:27.894276 kernel: audit: type=1327 audit(1707818787.491:2012): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:27.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:27.925309 kernel: audit: type=1105 audit(1707818787.496:2013): pid=8138 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.496000 audit[8138]: USER_START pid=8138 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:28.021257 kernel: audit: type=1103 audit(1707818787.496:2014): pid=8141 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.496000 audit[8141]: CRED_ACQ pid=8141 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.573000 audit[8138]: USER_END pid=8138 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.573000 audit[8138]: CRED_DISP pid=8138 uid=0 auid=500 ses=71 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:27.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@163-139.178.70.11:22-139.178.68.195:44822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:32.583551 systemd[1]: Started sshd@164-139.178.70.11:22-139.178.68.195:44828.service. Feb 13 10:06:32.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.70.11:22-139.178.68.195:44828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:32.610624 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:32.610681 kernel: audit: type=1130 audit(1707818792.582:2018): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.70.11:22-139.178.68.195:44828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:32.722000 audit[8164]: USER_ACCT pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.723137 sshd[8164]: Accepted publickey for core from 139.178.68.195 port 44828 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:32.725168 sshd[8164]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:32.727580 systemd-logind[1462]: New session 72 of user core. Feb 13 10:06:32.728068 systemd[1]: Started session-72.scope. Feb 13 10:06:32.807231 sshd[8164]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:32.808645 systemd[1]: sshd@164-139.178.70.11:22-139.178.68.195:44828.service: Deactivated successfully. Feb 13 10:06:32.809083 systemd[1]: session-72.scope: Deactivated successfully. Feb 13 10:06:32.809507 systemd-logind[1462]: Session 72 logged out. Waiting for processes to exit. Feb 13 10:06:32.810036 systemd-logind[1462]: Removed session 72. Feb 13 10:06:32.724000 audit[8164]: CRED_ACQ pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.906655 kernel: audit: type=1101 audit(1707818792.722:2019): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.906694 kernel: audit: type=1103 audit(1707818792.724:2020): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.906716 kernel: audit: type=1006 audit(1707818792.724:2021): pid=8164 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=72 res=1 Feb 13 10:06:32.965684 kernel: audit: type=1300 audit(1707818792.724:2021): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd74e49a50 a2=3 a3=0 items=0 ppid=1 pid=8164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:32.724000 audit[8164]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd74e49a50 a2=3 a3=0 items=0 ppid=1 pid=8164 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=72 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:33.058177 kernel: audit: type=1327 audit(1707818792.724:2021): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:32.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:33.088903 kernel: audit: type=1105 audit(1707818792.729:2022): pid=8164 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.729000 audit[8164]: USER_START pid=8164 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:33.184080 kernel: audit: type=1103 audit(1707818792.730:2023): pid=8166 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.730000 audit[8166]: CRED_ACQ pid=8166 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:33.273347 kernel: audit: type=1106 audit(1707818792.807:2024): pid=8164 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.807000 audit[8164]: USER_END pid=8164 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:33.368926 kernel: audit: type=1104 audit(1707818792.807:2025): pid=8164 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.807000 audit[8164]: CRED_DISP pid=8164 uid=0 auid=500 ses=72 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:32.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@164-139.178.70.11:22-139.178.68.195:44828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:33.728647 systemd[1]: Started sshd@165-139.178.70.11:22-5.135.90.165:53022.service. Feb 13 10:06:33.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.70.11:22-5.135.90.165:53022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:33.886138 env[1474]: time="2024-02-13T10:06:33.886026811Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:06:33.886138 env[1474]: time="2024-02-13T10:06:33.886081883Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:06:33.904880 sshd[8193]: Unable to negotiate with 5.135.90.165 port 53022: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:33.905574 systemd[1]: sshd@165-139.178.70.11:22-5.135.90.165:53022.service: Deactivated successfully. Feb 13 10:06:33.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@165-139.178.70.11:22-5.135.90.165:53022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:33.913304 env[1474]: time="2024-02-13T10:06:33.913235092Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:33.913456 kubelet[2572]: E0213 10:06:33.913415 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:06:33.913456 kubelet[2572]: E0213 10:06:33.913443 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:06:33.913653 env[1474]: time="2024-02-13T10:06:33.913432563Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:33.913676 kubelet[2572]: E0213 10:06:33.913464 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:33.913676 kubelet[2572]: E0213 10:06:33.913484 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:06:33.913676 kubelet[2572]: E0213 10:06:33.913505 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:06:33.913676 kubelet[2572]: E0213 10:06:33.913524 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:06:33.913792 kubelet[2572]: E0213 10:06:33.913545 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:33.913792 kubelet[2572]: E0213 10:06:33.913559 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:06:37.818692 systemd[1]: Started sshd@166-139.178.70.11:22-139.178.68.195:56690.service. Feb 13 10:06:37.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.70.11:22-139.178.68.195:56690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:37.846140 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:37.846208 kernel: audit: type=1130 audit(1707818797.818:2029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.70.11:22-139.178.68.195:56690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:37.885458 env[1474]: time="2024-02-13T10:06:37.885386090Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:06:37.885458 env[1474]: time="2024-02-13T10:06:37.885397253Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:06:37.898659 env[1474]: time="2024-02-13T10:06:37.898605490Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:37.898813 kubelet[2572]: E0213 10:06:37.898800 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:06:37.899036 kubelet[2572]: E0213 10:06:37.898829 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:06:37.899036 kubelet[2572]: E0213 10:06:37.898858 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:37.899036 kubelet[2572]: E0213 10:06:37.898891 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:06:37.899300 env[1474]: time="2024-02-13T10:06:37.899221000Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:37.899435 kubelet[2572]: E0213 10:06:37.899403 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:06:37.899491 kubelet[2572]: E0213 10:06:37.899439 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:06:37.899491 kubelet[2572]: E0213 10:06:37.899479 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:37.899548 kubelet[2572]: E0213 10:06:37.899494 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:06:37.957000 audit[8262]: USER_ACCT pid=8262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:37.958067 sshd[8262]: Accepted publickey for core from 139.178.68.195 port 56690 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:37.959167 sshd[8262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:37.961643 systemd-logind[1462]: New session 73 of user core. Feb 13 10:06:37.962123 systemd[1]: Started session-73.scope. Feb 13 10:06:38.041349 sshd[8262]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:38.042731 systemd[1]: sshd@166-139.178.70.11:22-139.178.68.195:56690.service: Deactivated successfully. Feb 13 10:06:38.043174 systemd[1]: session-73.scope: Deactivated successfully. Feb 13 10:06:38.043545 systemd-logind[1462]: Session 73 logged out. Waiting for processes to exit. Feb 13 10:06:38.044014 systemd-logind[1462]: Removed session 73. Feb 13 10:06:37.958000 audit[8262]: CRED_ACQ pid=8262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.139255 kernel: audit: type=1101 audit(1707818797.957:2030): pid=8262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.139304 kernel: audit: type=1103 audit(1707818797.958:2031): pid=8262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.139324 kernel: audit: type=1006 audit(1707818797.958:2032): pid=8262 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=73 res=1 Feb 13 10:06:38.197648 kernel: audit: type=1300 audit(1707818797.958:2032): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaebcea60 a2=3 a3=0 items=0 ppid=1 pid=8262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:37.958000 audit[8262]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaebcea60 a2=3 a3=0 items=0 ppid=1 pid=8262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=73 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:38.289521 kernel: audit: type=1327 audit(1707818797.958:2032): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:37.958000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:38.320017 kernel: audit: type=1105 audit(1707818797.963:2033): pid=8262 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:37.963000 audit[8262]: USER_START pid=8262 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.414558 kernel: audit: type=1103 audit(1707818797.963:2034): pid=8321 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:37.963000 audit[8321]: CRED_ACQ pid=8321 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.503816 kernel: audit: type=1106 audit(1707818798.041:2035): pid=8262 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.041000 audit[8262]: USER_END pid=8262 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.599410 kernel: audit: type=1104 audit(1707818798.041:2036): pid=8262 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.041000 audit[8262]: CRED_DISP pid=8262 uid=0 auid=500 ses=73 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:38.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@166-139.178.70.11:22-139.178.68.195:56690 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:39.709499 systemd[1]: Started sshd@167-139.178.70.11:22-5.135.90.165:49034.service. Feb 13 10:06:39.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.70.11:22-5.135.90.165:49034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:39.866256 sshd[8345]: Unable to negotiate with 5.135.90.165 port 49034: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:39.868028 systemd[1]: sshd@167-139.178.70.11:22-5.135.90.165:49034.service: Deactivated successfully. Feb 13 10:06:39.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@167-139.178.70.11:22-5.135.90.165:49034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:43.052014 systemd[1]: Started sshd@168-139.178.70.11:22-139.178.68.195:56698.service. Feb 13 10:06:43.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.70.11:22-139.178.68.195:56698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:43.094556 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:43.094671 kernel: audit: type=1130 audit(1707818803.051:2040): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.70.11:22-139.178.68.195:56698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:43.203000 audit[8349]: USER_ACCT pid=8349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.204396 sshd[8349]: Accepted publickey for core from 139.178.68.195 port 56698 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:43.206177 sshd[8349]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:43.208546 systemd-logind[1462]: New session 74 of user core. Feb 13 10:06:43.209106 systemd[1]: Started session-74.scope. Feb 13 10:06:43.287421 sshd[8349]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:43.288812 systemd[1]: sshd@168-139.178.70.11:22-139.178.68.195:56698.service: Deactivated successfully. Feb 13 10:06:43.289260 systemd[1]: session-74.scope: Deactivated successfully. Feb 13 10:06:43.289596 systemd-logind[1462]: Session 74 logged out. Waiting for processes to exit. Feb 13 10:06:43.289984 systemd-logind[1462]: Removed session 74. Feb 13 10:06:43.205000 audit[8349]: CRED_ACQ pid=8349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.386338 kernel: audit: type=1101 audit(1707818803.203:2041): pid=8349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.386379 kernel: audit: type=1103 audit(1707818803.205:2042): pid=8349 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.386397 kernel: audit: type=1006 audit(1707818803.205:2043): pid=8349 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=74 res=1 Feb 13 10:06:43.444929 kernel: audit: type=1300 audit(1707818803.205:2043): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd984cb50 a2=3 a3=0 items=0 ppid=1 pid=8349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:43.205000 audit[8349]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd984cb50 a2=3 a3=0 items=0 ppid=1 pid=8349 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=74 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:43.537032 kernel: audit: type=1327 audit(1707818803.205:2043): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:43.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:43.567604 kernel: audit: type=1105 audit(1707818803.210:2044): pid=8349 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.210000 audit[8349]: USER_START pid=8349 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.662224 kernel: audit: type=1103 audit(1707818803.210:2045): pid=8351 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.210000 audit[8351]: CRED_ACQ pid=8351 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.751527 kernel: audit: type=1106 audit(1707818803.287:2046): pid=8349 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.287000 audit[8349]: USER_END pid=8349 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.847070 kernel: audit: type=1104 audit(1707818803.287:2047): pid=8349 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.287000 audit[8349]: CRED_DISP pid=8349 uid=0 auid=500 ses=74 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:43.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@168-139.178.70.11:22-139.178.68.195:56698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:44.886307 env[1474]: time="2024-02-13T10:06:44.886216329Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:06:44.913085 env[1474]: time="2024-02-13T10:06:44.913044829Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:44.913222 kubelet[2572]: E0213 10:06:44.913210 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:06:44.913431 kubelet[2572]: E0213 10:06:44.913241 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:06:44.913431 kubelet[2572]: E0213 10:06:44.913264 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:44.913431 kubelet[2572]: E0213 10:06:44.913284 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:06:45.415214 systemd[1]: Started sshd@169-139.178.70.11:22-5.135.90.165:45114.service. Feb 13 10:06:45.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.70.11:22-5.135.90.165:45114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:45.581793 sshd[8405]: Unable to negotiate with 5.135.90.165 port 45114: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:45.583673 systemd[1]: sshd@169-139.178.70.11:22-5.135.90.165:45114.service: Deactivated successfully. Feb 13 10:06:45.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@169-139.178.70.11:22-5.135.90.165:45114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:46.213000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.213000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011ce6f0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:06:46.213000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:06:46.214000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.214000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00015f380 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:06:46.214000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:06:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009168360 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:06:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:06:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00a963000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:06:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:06:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013f2f1a0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:06:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:06:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c009168390 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:06:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:06:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c004c4e020 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:06:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:06:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0091683c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:06:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:06:47.885822 env[1474]: time="2024-02-13T10:06:47.885739324Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:06:47.938748 env[1474]: time="2024-02-13T10:06:47.938661011Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:47.939019 kubelet[2572]: E0213 10:06:47.938989 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:06:47.939461 kubelet[2572]: E0213 10:06:47.939054 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:06:47.939461 kubelet[2572]: E0213 10:06:47.939139 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:47.939461 kubelet[2572]: E0213 10:06:47.939209 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:06:48.296832 systemd[1]: Started sshd@170-139.178.70.11:22-139.178.68.195:37366.service. Feb 13 10:06:48.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.70.11:22-139.178.68.195:37366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:48.334639 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 10:06:48.334686 kernel: audit: type=1130 audit(1707818808.296:2059): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.70.11:22-139.178.68.195:37366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:48.444000 audit[8439]: USER_ACCT pid=8439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.445810 sshd[8439]: Accepted publickey for core from 139.178.68.195 port 37366 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:48.447173 sshd[8439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:48.449740 systemd-logind[1462]: New session 75 of user core. Feb 13 10:06:48.450296 systemd[1]: Started session-75.scope. Feb 13 10:06:48.530247 sshd[8439]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:48.531637 systemd[1]: sshd@170-139.178.70.11:22-139.178.68.195:37366.service: Deactivated successfully. Feb 13 10:06:48.532061 systemd[1]: session-75.scope: Deactivated successfully. Feb 13 10:06:48.532482 systemd-logind[1462]: Session 75 logged out. Waiting for processes to exit. Feb 13 10:06:48.532935 systemd-logind[1462]: Removed session 75. Feb 13 10:06:48.446000 audit[8439]: CRED_ACQ pid=8439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.628335 kernel: audit: type=1101 audit(1707818808.444:2060): pid=8439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.628372 kernel: audit: type=1103 audit(1707818808.446:2061): pid=8439 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.628388 kernel: audit: type=1006 audit(1707818808.446:2062): pid=8439 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=75 res=1 Feb 13 10:06:48.446000 audit[8439]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd58d59500 a2=3 a3=0 items=0 ppid=1 pid=8439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:48.779024 kernel: audit: type=1300 audit(1707818808.446:2062): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd58d59500 a2=3 a3=0 items=0 ppid=1 pid=8439 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=75 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:48.779116 kernel: audit: type=1327 audit(1707818808.446:2062): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:48.446000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:48.809607 kernel: audit: type=1105 audit(1707818808.450:2063): pid=8439 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.450000 audit[8439]: USER_START pid=8439 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.885048 env[1474]: time="2024-02-13T10:06:48.884971312Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:06:48.897326 env[1474]: time="2024-02-13T10:06:48.897264759Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:48.897541 kubelet[2572]: E0213 10:06:48.897428 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:06:48.897541 kubelet[2572]: E0213 10:06:48.897461 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:06:48.897541 kubelet[2572]: E0213 10:06:48.897499 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:48.897541 kubelet[2572]: E0213 10:06:48.897526 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:06:48.904189 kernel: audit: type=1103 audit(1707818808.451:2064): pid=8441 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.451000 audit[8441]: CRED_ACQ pid=8441 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.993502 kernel: audit: type=1106 audit(1707818808.529:2065): pid=8439 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.529000 audit[8439]: USER_END pid=8439 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:49.089037 kernel: audit: type=1104 audit(1707818808.529:2066): pid=8439 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.529000 audit[8439]: CRED_DISP pid=8439 uid=0 auid=500 ses=75 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:48.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@170-139.178.70.11:22-139.178.68.195:37366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:49.885015 env[1474]: time="2024-02-13T10:06:49.884956956Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:06:49.897727 env[1474]: time="2024-02-13T10:06:49.897681151Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:49.898028 kubelet[2572]: E0213 10:06:49.897858 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:06:49.898028 kubelet[2572]: E0213 10:06:49.897900 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:06:49.898028 kubelet[2572]: E0213 10:06:49.897938 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:49.898028 kubelet[2572]: E0213 10:06:49.897968 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:06:50.042000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:50.042000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00261afe0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:06:50.042000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:06:50.042000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:50.042000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000e78980 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:06:50.042000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:06:50.042000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:50.042000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00086de60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:06:50.042000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:06:50.042000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:06:50.042000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000535720 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:06:50.042000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:06:51.069755 systemd[1]: Started sshd@171-139.178.70.11:22-5.135.90.165:41114.service. Feb 13 10:06:51.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.70.11:22-5.135.90.165:41114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:51.230616 sshd[8517]: Unable to negotiate with 5.135.90.165 port 41114: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:51.232462 systemd[1]: sshd@171-139.178.70.11:22-5.135.90.165:41114.service: Deactivated successfully. Feb 13 10:06:51.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@171-139.178.70.11:22-5.135.90.165:41114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:53.540070 systemd[1]: Started sshd@172-139.178.70.11:22-139.178.68.195:37376.service. Feb 13 10:06:53.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.70.11:22-139.178.68.195:37376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:53.567425 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 13 10:06:53.567512 kernel: audit: type=1130 audit(1707818813.538:2074): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.70.11:22-139.178.68.195:37376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:53.676000 audit[8521]: USER_ACCT pid=8521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.678969 sshd[8521]: Accepted publickey for core from 139.178.68.195 port 37376 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:53.680168 sshd[8521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:53.682735 systemd-logind[1462]: New session 76 of user core. Feb 13 10:06:53.683453 systemd[1]: Started session-76.scope. Feb 13 10:06:53.764135 sshd[8521]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:53.765539 systemd[1]: sshd@172-139.178.70.11:22-139.178.68.195:37376.service: Deactivated successfully. Feb 13 10:06:53.765981 systemd[1]: session-76.scope: Deactivated successfully. Feb 13 10:06:53.766375 systemd-logind[1462]: Session 76 logged out. Waiting for processes to exit. Feb 13 10:06:53.766827 systemd-logind[1462]: Removed session 76. Feb 13 10:06:53.678000 audit[8521]: CRED_ACQ pid=8521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.860924 kernel: audit: type=1101 audit(1707818813.676:2075): pid=8521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.860962 kernel: audit: type=1103 audit(1707818813.678:2076): pid=8521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.860980 kernel: audit: type=1006 audit(1707818813.678:2077): pid=8521 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=76 res=1 Feb 13 10:06:53.919546 kernel: audit: type=1300 audit(1707818813.678:2077): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff414da190 a2=3 a3=0 items=0 ppid=1 pid=8521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:53.678000 audit[8521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff414da190 a2=3 a3=0 items=0 ppid=1 pid=8521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=76 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:54.011639 kernel: audit: type=1327 audit(1707818813.678:2077): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:53.678000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:54.042193 kernel: audit: type=1105 audit(1707818813.683:2078): pid=8521 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.683000 audit[8521]: USER_START pid=8521 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:54.136926 kernel: audit: type=1103 audit(1707818813.684:2079): pid=8523 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.684000 audit[8523]: CRED_ACQ pid=8523 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:54.226233 kernel: audit: type=1106 audit(1707818813.762:2080): pid=8521 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.762000 audit[8521]: USER_END pid=8521 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:54.321804 kernel: audit: type=1104 audit(1707818813.763:2081): pid=8521 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.763000 audit[8521]: CRED_DISP pid=8521 uid=0 auid=500 ses=76 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:53.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@172-139.178.70.11:22-139.178.68.195:37376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:56.886208 env[1474]: time="2024-02-13T10:06:56.886064003Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:06:56.913001 env[1474]: time="2024-02-13T10:06:56.912925265Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:06:56.913165 kubelet[2572]: E0213 10:06:56.913124 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:06:56.913165 kubelet[2572]: E0213 10:06:56.913153 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:06:56.913359 kubelet[2572]: E0213 10:06:56.913176 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:06:56.913359 kubelet[2572]: E0213 10:06:56.913194 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:06:57.320231 systemd[1]: Started sshd@173-139.178.70.11:22-5.135.90.165:37128.service. Feb 13 10:06:57.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.70.11:22-5.135.90.165:37128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:57.472774 sshd[8574]: Unable to negotiate with 5.135.90.165 port 37128: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:06:57.474687 systemd[1]: sshd@173-139.178.70.11:22-5.135.90.165:37128.service: Deactivated successfully. Feb 13 10:06:57.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@173-139.178.70.11:22-5.135.90.165:37128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:58.775474 systemd[1]: Started sshd@174-139.178.70.11:22-139.178.68.195:58558.service. Feb 13 10:06:58.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.70.11:22-139.178.68.195:58558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:58.803011 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:06:58.803076 kernel: audit: type=1130 audit(1707818818.774:2085): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.70.11:22-139.178.68.195:58558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:06:58.913000 audit[8578]: USER_ACCT pid=8578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:58.915056 sshd[8578]: Accepted publickey for core from 139.178.68.195 port 58558 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:06:58.916517 sshd[8578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:06:58.919079 systemd-logind[1462]: New session 77 of user core. Feb 13 10:06:58.919602 systemd[1]: Started session-77.scope. Feb 13 10:06:58.998726 sshd[8578]: pam_unix(sshd:session): session closed for user core Feb 13 10:06:59.000265 systemd[1]: sshd@174-139.178.70.11:22-139.178.68.195:58558.service: Deactivated successfully. Feb 13 10:06:59.000712 systemd[1]: session-77.scope: Deactivated successfully. Feb 13 10:06:59.001154 systemd-logind[1462]: Session 77 logged out. Waiting for processes to exit. Feb 13 10:06:59.001630 systemd-logind[1462]: Removed session 77. Feb 13 10:06:58.914000 audit[8578]: CRED_ACQ pid=8578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:59.006946 kernel: audit: type=1101 audit(1707818818.913:2086): pid=8578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:59.006981 kernel: audit: type=1103 audit(1707818818.914:2087): pid=8578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:59.155794 kernel: audit: type=1006 audit(1707818818.914:2088): pid=8578 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=77 res=1 Feb 13 10:06:59.155826 kernel: audit: type=1300 audit(1707818818.914:2088): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e6d6460 a2=3 a3=0 items=0 ppid=1 pid=8578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:58.914000 audit[8578]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7e6d6460 a2=3 a3=0 items=0 ppid=1 pid=8578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=77 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:06:58.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:59.278780 kernel: audit: type=1327 audit(1707818818.914:2088): proctitle=737368643A20636F7265205B707269765D Feb 13 10:06:59.278809 kernel: audit: type=1105 audit(1707818818.919:2089): pid=8578 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:58.919000 audit[8578]: USER_START pid=8578 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:59.373407 kernel: audit: type=1103 audit(1707818818.920:2090): pid=8580 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:58.920000 audit[8580]: CRED_ACQ pid=8580 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:59.462743 kernel: audit: type=1106 audit(1707818818.997:2091): pid=8578 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:58.997000 audit[8578]: USER_END pid=8578 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:59.558330 kernel: audit: type=1104 audit(1707818818.997:2092): pid=8578 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:58.997000 audit[8578]: CRED_DISP pid=8578 uid=0 auid=500 ses=77 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:06:58.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@174-139.178.70.11:22-139.178.68.195:58558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:00.885873 env[1474]: time="2024-02-13T10:07:00.885762565Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:07:00.913617 env[1474]: time="2024-02-13T10:07:00.913541350Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:00.913772 kubelet[2572]: E0213 10:07:00.913689 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:07:00.913772 kubelet[2572]: E0213 10:07:00.913744 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:07:00.913772 kubelet[2572]: E0213 10:07:00.913766 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:00.914023 kubelet[2572]: E0213 10:07:00.913783 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:07:02.607073 systemd[1]: Started sshd@175-139.178.70.11:22-5.135.90.165:33178.service. Feb 13 10:07:02.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-139.178.70.11:22-5.135.90.165:33178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:02.775993 sshd[8635]: Unable to negotiate with 5.135.90.165 port 33178: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:02.777895 systemd[1]: sshd@175-139.178.70.11:22-5.135.90.165:33178.service: Deactivated successfully. Feb 13 10:07:02.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@175-139.178.70.11:22-5.135.90.165:33178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:02.885781 env[1474]: time="2024-02-13T10:07:02.885527699Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:07:02.912824 env[1474]: time="2024-02-13T10:07:02.912771087Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:02.913051 kubelet[2572]: E0213 10:07:02.913015 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:07:02.913051 kubelet[2572]: E0213 10:07:02.913043 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:07:02.913243 kubelet[2572]: E0213 10:07:02.913067 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:02.913243 kubelet[2572]: E0213 10:07:02.913085 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:07:04.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.70.11:22-139.178.68.195:58574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:04.010557 systemd[1]: Started sshd@176-139.178.70.11:22-139.178.68.195:58574.service. Feb 13 10:07:04.038963 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:07:04.039098 kernel: audit: type=1130 audit(1707818824.010:2096): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.70.11:22-139.178.68.195:58574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:04.150318 sshd[8669]: Accepted publickey for core from 139.178.68.195 port 58574 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:04.149000 audit[8669]: USER_ACCT pid=8669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.151832 sshd[8669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:04.154205 systemd-logind[1462]: New session 78 of user core. Feb 13 10:07:04.154767 systemd[1]: Started session-78.scope. Feb 13 10:07:04.234179 sshd[8669]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:04.235539 systemd[1]: sshd@176-139.178.70.11:22-139.178.68.195:58574.service: Deactivated successfully. Feb 13 10:07:04.235958 systemd[1]: session-78.scope: Deactivated successfully. Feb 13 10:07:04.236356 systemd-logind[1462]: Session 78 logged out. Waiting for processes to exit. Feb 13 10:07:04.236787 systemd-logind[1462]: Removed session 78. Feb 13 10:07:04.150000 audit[8669]: CRED_ACQ pid=8669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.332938 kernel: audit: type=1101 audit(1707818824.149:2097): pid=8669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.332975 kernel: audit: type=1103 audit(1707818824.150:2098): pid=8669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.332992 kernel: audit: type=1006 audit(1707818824.150:2099): pid=8669 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=78 res=1 Feb 13 10:07:04.391613 kernel: audit: type=1300 audit(1707818824.150:2099): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe070efc10 a2=3 a3=0 items=0 ppid=1 pid=8669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:04.150000 audit[8669]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe070efc10 a2=3 a3=0 items=0 ppid=1 pid=8669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=78 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:04.483690 kernel: audit: type=1327 audit(1707818824.150:2099): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:04.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:04.514215 kernel: audit: type=1105 audit(1707818824.156:2100): pid=8669 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.156000 audit[8669]: USER_START pid=8669 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.608780 kernel: audit: type=1103 audit(1707818824.156:2101): pid=8671 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.156000 audit[8671]: CRED_ACQ pid=8671 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.698081 kernel: audit: type=1106 audit(1707818824.233:2102): pid=8669 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.233000 audit[8669]: USER_END pid=8669 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.793679 kernel: audit: type=1104 audit(1707818824.234:2103): pid=8669 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.234000 audit[8669]: CRED_DISP pid=8669 uid=0 auid=500 ses=78 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:04.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@176-139.178.70.11:22-139.178.68.195:58574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:04.884655 env[1474]: time="2024-02-13T10:07:04.884617859Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:07:04.896707 env[1474]: time="2024-02-13T10:07:04.896626653Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:04.896809 kubelet[2572]: E0213 10:07:04.896783 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:07:04.896980 kubelet[2572]: E0213 10:07:04.896814 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:07:04.896980 kubelet[2572]: E0213 10:07:04.896837 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:04.896980 kubelet[2572]: E0213 10:07:04.896879 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:07:08.673235 systemd[1]: Started sshd@177-139.178.70.11:22-5.135.90.165:57436.service. Feb 13 10:07:08.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-139.178.70.11:22-5.135.90.165:57436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:08.828505 sshd[8722]: Unable to negotiate with 5.135.90.165 port 57436: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:08.830419 systemd[1]: sshd@177-139.178.70.11:22-5.135.90.165:57436.service: Deactivated successfully. Feb 13 10:07:08.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@177-139.178.70.11:22-5.135.90.165:57436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:09.243815 systemd[1]: Started sshd@178-139.178.70.11:22-139.178.68.195:56258.service. Feb 13 10:07:09.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.70.11:22-139.178.68.195:56258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:09.271042 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:07:09.271104 kernel: audit: type=1130 audit(1707818829.243:2107): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.70.11:22-139.178.68.195:56258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:09.381000 audit[8726]: USER_ACCT pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.382673 sshd[8726]: Accepted publickey for core from 139.178.68.195 port 56258 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:09.384780 sshd[8726]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:09.387098 systemd-logind[1462]: New session 79 of user core. Feb 13 10:07:09.387620 systemd[1]: Started session-79.scope. Feb 13 10:07:09.383000 audit[8726]: CRED_ACQ pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.480992 sshd[8726]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:09.482410 systemd[1]: sshd@178-139.178.70.11:22-139.178.68.195:56258.service: Deactivated successfully. Feb 13 10:07:09.482925 systemd[1]: session-79.scope: Deactivated successfully. Feb 13 10:07:09.483329 systemd-logind[1462]: Session 79 logged out. Waiting for processes to exit. Feb 13 10:07:09.483716 systemd-logind[1462]: Removed session 79. Feb 13 10:07:09.566875 kernel: audit: type=1101 audit(1707818829.381:2108): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.566928 kernel: audit: type=1103 audit(1707818829.383:2109): pid=8726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.566946 kernel: audit: type=1006 audit(1707818829.383:2110): pid=8726 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=79 res=1 Feb 13 10:07:09.625501 kernel: audit: type=1300 audit(1707818829.383:2110): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3737d4c0 a2=3 a3=0 items=0 ppid=1 pid=8726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:09.383000 audit[8726]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3737d4c0 a2=3 a3=0 items=0 ppid=1 pid=8726 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=79 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:09.717573 kernel: audit: type=1327 audit(1707818829.383:2110): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:09.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:09.748130 kernel: audit: type=1105 audit(1707818829.388:2111): pid=8726 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.388000 audit[8726]: USER_START pid=8726 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.842671 kernel: audit: type=1103 audit(1707818829.389:2112): pid=8728 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.389000 audit[8728]: CRED_ACQ pid=8728 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.885137 env[1474]: time="2024-02-13T10:07:09.885117500Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:07:09.897267 env[1474]: time="2024-02-13T10:07:09.897232651Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:09.897410 kubelet[2572]: E0213 10:07:09.897397 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:07:09.897612 kubelet[2572]: E0213 10:07:09.897428 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:07:09.897612 kubelet[2572]: E0213 10:07:09.897460 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:09.897612 kubelet[2572]: E0213 10:07:09.897486 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:07:09.931938 kernel: audit: type=1106 audit(1707818829.480:2113): pid=8726 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.480000 audit[8726]: USER_END pid=8726 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:10.027424 kernel: audit: type=1104 audit(1707818829.480:2114): pid=8726 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.480000 audit[8726]: CRED_DISP pid=8726 uid=0 auid=500 ses=79 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:09.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@178-139.178.70.11:22-139.178.68.195:56258 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:11.886401 env[1474]: time="2024-02-13T10:07:11.886304508Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:07:11.936059 env[1474]: time="2024-02-13T10:07:11.935954916Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:11.936306 kubelet[2572]: E0213 10:07:11.936246 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:07:11.936306 kubelet[2572]: E0213 10:07:11.936302 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:07:11.936741 kubelet[2572]: E0213 10:07:11.936355 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:11.936741 kubelet[2572]: E0213 10:07:11.936396 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:07:14.492162 systemd[1]: Started sshd@179-139.178.70.11:22-139.178.68.195:56260.service. Feb 13 10:07:14.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.70.11:22-139.178.68.195:56260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:14.519974 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:07:14.520076 kernel: audit: type=1130 audit(1707818834.491:2116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.70.11:22-139.178.68.195:56260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:14.631000 audit[8811]: USER_ACCT pid=8811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.632778 sshd[8811]: Accepted publickey for core from 139.178.68.195 port 56260 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:14.634156 sshd[8811]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:14.636756 systemd-logind[1462]: New session 80 of user core. Feb 13 10:07:14.637232 systemd[1]: Started session-80.scope. Feb 13 10:07:14.719876 sshd[8811]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:14.721234 systemd[1]: sshd@179-139.178.70.11:22-139.178.68.195:56260.service: Deactivated successfully. Feb 13 10:07:14.721676 systemd[1]: session-80.scope: Deactivated successfully. Feb 13 10:07:14.721966 systemd-logind[1462]: Session 80 logged out. Waiting for processes to exit. Feb 13 10:07:14.722336 systemd-logind[1462]: Removed session 80. Feb 13 10:07:14.633000 audit[8811]: CRED_ACQ pid=8811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.815974 kernel: audit: type=1101 audit(1707818834.631:2117): pid=8811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.816013 kernel: audit: type=1103 audit(1707818834.633:2118): pid=8811 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.816033 kernel: audit: type=1006 audit(1707818834.633:2119): pid=8811 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=80 res=1 Feb 13 10:07:14.874587 kernel: audit: type=1300 audit(1707818834.633:2119): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8603c180 a2=3 a3=0 items=0 ppid=1 pid=8811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:14.633000 audit[8811]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8603c180 a2=3 a3=0 items=0 ppid=1 pid=8811 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=80 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:14.885113 env[1474]: time="2024-02-13T10:07:14.885061097Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:07:14.897008 env[1474]: time="2024-02-13T10:07:14.896945365Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:14.897186 kubelet[2572]: E0213 10:07:14.897143 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:07:14.897186 kubelet[2572]: E0213 10:07:14.897172 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:07:14.897382 kubelet[2572]: E0213 10:07:14.897194 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:14.897382 kubelet[2572]: E0213 10:07:14.897214 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:07:14.966640 kernel: audit: type=1327 audit(1707818834.633:2119): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:14.633000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:14.997181 kernel: audit: type=1105 audit(1707818834.638:2120): pid=8811 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.638000 audit[8811]: USER_START pid=8811 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:15.091720 kernel: audit: type=1103 audit(1707818834.639:2121): pid=8813 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.639000 audit[8813]: CRED_ACQ pid=8813 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:15.180931 kernel: audit: type=1106 audit(1707818834.719:2122): pid=8811 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.719000 audit[8811]: USER_END pid=8811 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:15.276344 kernel: audit: type=1104 audit(1707818834.719:2123): pid=8811 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.719000 audit[8811]: CRED_DISP pid=8811 uid=0 auid=500 ses=80 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:14.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@179-139.178.70.11:22-139.178.68.195:56260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:15.545087 systemd[1]: Started sshd@180-139.178.70.11:22-5.135.90.165:53526.service. Feb 13 10:07:15.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-139.178.70.11:22-5.135.90.165:53526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:15.712694 sshd[8862]: Unable to negotiate with 5.135.90.165 port 53526: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:15.713323 systemd[1]: sshd@180-139.178.70.11:22-5.135.90.165:53526.service: Deactivated successfully. Feb 13 10:07:15.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@180-139.178.70.11:22-5.135.90.165:53526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:18.885474 env[1474]: time="2024-02-13T10:07:18.885372798Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:07:18.934705 env[1474]: time="2024-02-13T10:07:18.934625585Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:18.935043 kubelet[2572]: E0213 10:07:18.934987 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:07:18.935043 kubelet[2572]: E0213 10:07:18.935044 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:07:18.935486 kubelet[2572]: E0213 10:07:18.935096 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:18.935486 kubelet[2572]: E0213 10:07:18.935134 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:07:19.723987 systemd[1]: Started sshd@181-139.178.70.11:22-139.178.68.195:50044.service. Feb 13 10:07:19.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.70.11:22-139.178.68.195:50044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:19.750895 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:07:19.751082 kernel: audit: type=1130 audit(1707818839.723:2127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.70.11:22-139.178.68.195:50044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:19.861964 sshd[8900]: Accepted publickey for core from 139.178.68.195 port 50044 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:19.861000 audit[8900]: USER_ACCT pid=8900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:19.863167 sshd[8900]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:19.865605 systemd-logind[1462]: New session 81 of user core. Feb 13 10:07:19.866162 systemd[1]: Started session-81.scope. Feb 13 10:07:19.945227 sshd[8900]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:19.946620 systemd[1]: sshd@181-139.178.70.11:22-139.178.68.195:50044.service: Deactivated successfully. Feb 13 10:07:19.947068 systemd[1]: session-81.scope: Deactivated successfully. Feb 13 10:07:19.947498 systemd-logind[1462]: Session 81 logged out. Waiting for processes to exit. Feb 13 10:07:19.948039 systemd-logind[1462]: Removed session 81. Feb 13 10:07:19.862000 audit[8900]: CRED_ACQ pid=8900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.043883 kernel: audit: type=1101 audit(1707818839.861:2128): pid=8900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.043952 kernel: audit: type=1103 audit(1707818839.862:2129): pid=8900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.043995 kernel: audit: type=1006 audit(1707818839.862:2130): pid=8900 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=81 res=1 Feb 13 10:07:19.862000 audit[8900]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85193c60 a2=3 a3=0 items=0 ppid=1 pid=8900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:20.194603 kernel: audit: type=1300 audit(1707818839.862:2130): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff85193c60 a2=3 a3=0 items=0 ppid=1 pid=8900 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=81 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:20.194673 kernel: audit: type=1327 audit(1707818839.862:2130): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:19.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:19.867000 audit[8900]: USER_START pid=8900 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.319666 kernel: audit: type=1105 audit(1707818839.867:2131): pid=8900 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.319724 kernel: audit: type=1103 audit(1707818839.868:2132): pid=8902 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:19.868000 audit[8902]: CRED_ACQ pid=8902 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:19.945000 audit[8900]: USER_END pid=8900 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.504295 kernel: audit: type=1106 audit(1707818839.945:2133): pid=8900 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:20.504355 kernel: audit: type=1104 audit(1707818839.945:2134): pid=8900 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:19.945000 audit[8900]: CRED_DISP pid=8900 uid=0 auid=500 ses=81 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:19.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@181-139.178.70.11:22-139.178.68.195:50044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:21.606620 systemd[1]: Started sshd@182-139.178.70.11:22-5.135.90.165:49490.service. Feb 13 10:07:21.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-139.178.70.11:22-5.135.90.165:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:21.770694 sshd[8924]: Unable to negotiate with 5.135.90.165 port 49490: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:21.772451 systemd[1]: sshd@182-139.178.70.11:22-5.135.90.165:49490.service: Deactivated successfully. Feb 13 10:07:21.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@182-139.178.70.11:22-5.135.90.165:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:21.886254 env[1474]: time="2024-02-13T10:07:21.886027692Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:07:21.935589 env[1474]: time="2024-02-13T10:07:21.935492904Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:21.935838 kubelet[2572]: E0213 10:07:21.935812 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:07:21.936245 kubelet[2572]: E0213 10:07:21.935884 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:07:21.936245 kubelet[2572]: E0213 10:07:21.935939 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:21.936245 kubelet[2572]: E0213 10:07:21.935982 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:07:24.954283 systemd[1]: Started sshd@183-139.178.70.11:22-139.178.68.195:50054.service. Feb 13 10:07:24.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.70.11:22-139.178.68.195:50054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:24.981423 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:07:24.981482 kernel: audit: type=1130 audit(1707818844.953:2138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.70.11:22-139.178.68.195:50054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:25.092000 audit[8958]: USER_ACCT pid=8958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.093350 sshd[8958]: Accepted publickey for core from 139.178.68.195 port 50054 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:25.094625 sshd[8958]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:25.097156 systemd-logind[1462]: New session 82 of user core. Feb 13 10:07:25.097644 systemd[1]: Started session-82.scope. Feb 13 10:07:25.179399 sshd[8958]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:25.181751 systemd[1]: sshd@183-139.178.70.11:22-139.178.68.195:50054.service: Deactivated successfully. Feb 13 10:07:25.182234 systemd[1]: session-82.scope: Deactivated successfully. Feb 13 10:07:25.182626 systemd-logind[1462]: Session 82 logged out. Waiting for processes to exit. Feb 13 10:07:25.183330 systemd[1]: Started sshd@184-139.178.70.11:22-139.178.68.195:50070.service. Feb 13 10:07:25.183934 systemd-logind[1462]: Removed session 82. Feb 13 10:07:25.093000 audit[8958]: CRED_ACQ pid=8958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.277404 kernel: audit: type=1101 audit(1707818845.092:2139): pid=8958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.277446 kernel: audit: type=1103 audit(1707818845.093:2140): pid=8958 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.277465 kernel: audit: type=1006 audit(1707818845.093:2141): pid=8958 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=82 res=1 Feb 13 10:07:25.336001 kernel: audit: type=1300 audit(1707818845.093:2141): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeca497200 a2=3 a3=0 items=0 ppid=1 pid=8958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:25.093000 audit[8958]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeca497200 a2=3 a3=0 items=0 ppid=1 pid=8958 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=82 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:25.357471 sshd[8982]: Accepted publickey for core from 139.178.68.195 port 50070 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:25.358683 sshd[8982]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:25.361012 systemd-logind[1462]: New session 83 of user core. Feb 13 10:07:25.361725 systemd[1]: Started session-83.scope. Feb 13 10:07:25.093000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:25.458574 kernel: audit: type=1327 audit(1707818845.093:2141): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:25.458618 kernel: audit: type=1105 audit(1707818845.099:2142): pid=8958 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.099000 audit[8958]: USER_START pid=8958 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.553110 kernel: audit: type=1103 audit(1707818845.099:2143): pid=8960 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.099000 audit[8960]: CRED_ACQ pid=8960 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.642453 kernel: audit: type=1106 audit(1707818845.179:2144): pid=8958 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.179000 audit[8958]: USER_END pid=8958 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.737929 kernel: audit: type=1104 audit(1707818845.179:2145): pid=8958 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.179000 audit[8958]: CRED_DISP pid=8958 uid=0 auid=500 ses=82 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@183-139.178.70.11:22-139.178.68.195:50054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:25.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-139.178.70.11:22-139.178.68.195:50070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:25.356000 audit[8982]: USER_ACCT pid=8982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.357000 audit[8982]: CRED_ACQ pid=8982 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.357000 audit[8982]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7ecbb0e0 a2=3 a3=0 items=0 ppid=1 pid=8982 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=83 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:25.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:25.362000 audit[8982]: USER_START pid=8982 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.363000 audit[8984]: CRED_ACQ pid=8984 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:25.885216 env[1474]: time="2024-02-13T10:07:25.885184125Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:07:25.903030 env[1474]: time="2024-02-13T10:07:25.902912875Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:25.903185 kubelet[2572]: E0213 10:07:25.903135 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:07:25.903185 kubelet[2572]: E0213 10:07:25.903174 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:07:25.903459 kubelet[2572]: E0213 10:07:25.903207 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:25.903459 kubelet[2572]: E0213 10:07:25.903236 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:07:26.274580 sshd[8982]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:26.276000 audit[8982]: USER_END pid=8982 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:26.276000 audit[8982]: CRED_DISP pid=8982 uid=0 auid=500 ses=83 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:26.282574 systemd[1]: sshd@184-139.178.70.11:22-139.178.68.195:50070.service: Deactivated successfully. Feb 13 10:07:26.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@184-139.178.70.11:22-139.178.68.195:50070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:26.284596 systemd[1]: session-83.scope: Deactivated successfully. Feb 13 10:07:26.286467 systemd-logind[1462]: Session 83 logged out. Waiting for processes to exit. Feb 13 10:07:26.289568 systemd[1]: Started sshd@185-139.178.70.11:22-139.178.68.195:60658.service. Feb 13 10:07:26.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-139.178.70.11:22-139.178.68.195:60658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:26.292199 systemd-logind[1462]: Removed session 83. Feb 13 10:07:26.319000 audit[9033]: USER_ACCT pid=9033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:26.320326 sshd[9033]: Accepted publickey for core from 139.178.68.195 port 60658 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:26.319000 audit[9033]: CRED_ACQ pid=9033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:26.320000 audit[9033]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd233dbd0 a2=3 a3=0 items=0 ppid=1 pid=9033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=84 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:26.320000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:26.321031 sshd[9033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:26.323594 systemd-logind[1462]: New session 84 of user core. Feb 13 10:07:26.324461 systemd[1]: Started session-84.scope. Feb 13 10:07:26.326000 audit[9033]: USER_START pid=9033 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:26.327000 audit[9035]: CRED_ACQ pid=9035 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.256000 audit[9058]: NETFILTER_CFG table=filter:97 family=2 entries=26 op=nft_register_rule pid=9058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:07:27.256000 audit[9058]: SYSCALL arch=c000003e syscall=46 success=yes exit=13404 a0=3 a1=7ffc74730400 a2=0 a3=7ffc747303ec items=0 ppid=2846 pid=9058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:27.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:07:27.266000 audit[9058]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=9058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:07:27.266000 audit[9058]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffc74730400 a2=0 a3=31030 items=0 ppid=2846 pid=9058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:27.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:07:27.287751 sshd[9033]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:27.289000 audit[9033]: USER_END pid=9033 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.289000 audit[9033]: CRED_DISP pid=9033 uid=0 auid=500 ses=84 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.296583 systemd[1]: sshd@185-139.178.70.11:22-139.178.68.195:60658.service: Deactivated successfully. Feb 13 10:07:27.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@185-139.178.70.11:22-139.178.68.195:60658 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:27.298999 systemd[1]: session-84.scope: Deactivated successfully. Feb 13 10:07:27.301060 systemd-logind[1462]: Session 84 logged out. Waiting for processes to exit. Feb 13 10:07:27.304272 systemd[1]: Started sshd@186-139.178.70.11:22-139.178.68.195:60662.service. Feb 13 10:07:27.303000 audit[9062]: NETFILTER_CFG table=filter:99 family=2 entries=38 op=nft_register_rule pid=9062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:07:27.303000 audit[9062]: SYSCALL arch=c000003e syscall=46 success=yes exit=13404 a0=3 a1=7fffa9cb7490 a2=0 a3=7fffa9cb747c items=0 ppid=2846 pid=9062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:27.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:07:27.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-139.178.70.11:22-139.178.68.195:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:27.306956 systemd-logind[1462]: Removed session 84. Feb 13 10:07:27.305000 audit[9062]: NETFILTER_CFG table=nat:100 family=2 entries=14 op=nft_register_rule pid=9062 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:07:27.305000 audit[9062]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fffa9cb7490 a2=0 a3=31030 items=0 ppid=2846 pid=9062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:27.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:07:27.347000 audit[9063]: USER_ACCT pid=9063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.348835 sshd[9063]: Accepted publickey for core from 139.178.68.195 port 60662 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:27.348000 audit[9063]: CRED_ACQ pid=9063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.348000 audit[9063]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2a7851a0 a2=3 a3=0 items=0 ppid=1 pid=9063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=85 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:27.348000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:27.350080 sshd[9063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:27.354329 systemd-logind[1462]: New session 85 of user core. Feb 13 10:07:27.355860 systemd[1]: Started session-85.scope. Feb 13 10:07:27.360000 audit[9063]: USER_START pid=9063 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.361000 audit[9066]: CRED_ACQ pid=9066 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.578181 sshd[9063]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:27.578000 audit[9063]: USER_END pid=9063 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.578000 audit[9063]: CRED_DISP pid=9063 uid=0 auid=500 ses=85 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.580437 systemd[1]: sshd@186-139.178.70.11:22-139.178.68.195:60662.service: Deactivated successfully. Feb 13 10:07:27.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@186-139.178.70.11:22-139.178.68.195:60662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:27.580927 systemd[1]: session-85.scope: Deactivated successfully. Feb 13 10:07:27.581290 systemd-logind[1462]: Session 85 logged out. Waiting for processes to exit. Feb 13 10:07:27.582062 systemd[1]: Started sshd@187-139.178.70.11:22-139.178.68.195:60670.service. Feb 13 10:07:27.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-139.178.70.11:22-139.178.68.195:60670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:27.582671 systemd-logind[1462]: Removed session 85. Feb 13 10:07:27.608000 audit[9088]: USER_ACCT pid=9088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.610148 sshd[9088]: Accepted publickey for core from 139.178.68.195 port 60670 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:27.611000 audit[9088]: CRED_ACQ pid=9088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.611000 audit[9088]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd86605be0 a2=3 a3=0 items=0 ppid=1 pid=9088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=86 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:27.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:27.612995 sshd[9088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:27.622666 systemd-logind[1462]: New session 86 of user core. Feb 13 10:07:27.633979 systemd[1]: Started session-86.scope. Feb 13 10:07:27.637705 systemd[1]: Started sshd@188-139.178.70.11:22-5.135.90.165:45544.service. Feb 13 10:07:27.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-139.178.70.11:22-5.135.90.165:45544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:27.652000 audit[9088]: USER_START pid=9088 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.655000 audit[9092]: CRED_ACQ pid=9092 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.778874 sshd[9088]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:27.778000 audit[9088]: USER_END pid=9088 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.778000 audit[9088]: CRED_DISP pid=9088 uid=0 auid=500 ses=86 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:27.780297 systemd[1]: sshd@187-139.178.70.11:22-139.178.68.195:60670.service: Deactivated successfully. Feb 13 10:07:27.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@187-139.178.70.11:22-139.178.68.195:60670 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:27.780750 systemd[1]: session-86.scope: Deactivated successfully. Feb 13 10:07:27.781200 systemd-logind[1462]: Session 86 logged out. Waiting for processes to exit. Feb 13 10:07:27.781712 systemd-logind[1462]: Removed session 86. Feb 13 10:07:27.809185 sshd[9091]: Unable to negotiate with 5.135.90.165 port 45544: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:27.809538 systemd[1]: sshd@188-139.178.70.11:22-5.135.90.165:45544.service: Deactivated successfully. Feb 13 10:07:27.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@188-139.178.70.11:22-5.135.90.165:45544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:28.885559 env[1474]: time="2024-02-13T10:07:28.885417193Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:07:28.912155 env[1474]: time="2024-02-13T10:07:28.912080814Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:28.912323 kubelet[2572]: E0213 10:07:28.912272 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:07:28.912323 kubelet[2572]: E0213 10:07:28.912301 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:07:28.912323 kubelet[2572]: E0213 10:07:28.912322 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:28.912551 kubelet[2572]: E0213 10:07:28.912340 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:07:29.287669 systemd[1]: Started sshd@189-139.178.70.11:22-185.196.8.151:32940.service. Feb 13 10:07:29.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-139.178.70.11:22-185.196.8.151:32940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:29.444669 sshd[9146]: kex_exchange_identification: Connection closed by remote host Feb 13 10:07:29.444669 sshd[9146]: Connection closed by 185.196.8.151 port 32940 Feb 13 10:07:29.446158 systemd[1]: sshd@189-139.178.70.11:22-185.196.8.151:32940.service: Deactivated successfully. Feb 13 10:07:29.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@189-139.178.70.11:22-185.196.8.151:32940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:32.787758 systemd[1]: Started sshd@190-139.178.70.11:22-139.178.68.195:60682.service. Feb 13 10:07:32.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.70.11:22-139.178.68.195:60682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:32.814165 kernel: kauditd_printk_skb: 61 callbacks suppressed Feb 13 10:07:32.814206 kernel: audit: type=1130 audit(1707818852.786:2191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.70.11:22-139.178.68.195:60682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:32.885255 env[1474]: time="2024-02-13T10:07:32.885191459Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:07:32.898742 env[1474]: time="2024-02-13T10:07:32.898666360Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:32.898895 kubelet[2572]: E0213 10:07:32.898853 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:07:32.898895 kubelet[2572]: E0213 10:07:32.898877 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:07:32.899103 kubelet[2572]: E0213 10:07:32.898900 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:32.899103 kubelet[2572]: E0213 10:07:32.898919 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:07:32.925000 audit[9149]: USER_ACCT pid=9149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:32.926029 sshd[9149]: Accepted publickey for core from 139.178.68.195 port 60682 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:32.927199 sshd[9149]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:32.929558 systemd-logind[1462]: New session 87 of user core. Feb 13 10:07:32.930072 systemd[1]: Started session-87.scope. Feb 13 10:07:33.008072 sshd[9149]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:33.009523 systemd[1]: sshd@190-139.178.70.11:22-139.178.68.195:60682.service: Deactivated successfully. Feb 13 10:07:33.009957 systemd[1]: session-87.scope: Deactivated successfully. Feb 13 10:07:33.010375 systemd-logind[1462]: Session 87 logged out. Waiting for processes to exit. Feb 13 10:07:33.010799 systemd-logind[1462]: Removed session 87. Feb 13 10:07:32.926000 audit[9149]: CRED_ACQ pid=9149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.107926 kernel: audit: type=1101 audit(1707818852.925:2192): pid=9149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.107971 kernel: audit: type=1103 audit(1707818852.926:2193): pid=9149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.107990 kernel: audit: type=1006 audit(1707818852.926:2194): pid=9149 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=87 res=1 Feb 13 10:07:33.166548 kernel: audit: type=1300 audit(1707818852.926:2194): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcb2a4380 a2=3 a3=0 items=0 ppid=1 pid=9149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:32.926000 audit[9149]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcb2a4380 a2=3 a3=0 items=0 ppid=1 pid=9149 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=87 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:33.202076 systemd[1]: Started sshd@191-139.178.70.11:22-5.135.90.165:41606.service. Feb 13 10:07:33.258634 kernel: audit: type=1327 audit(1707818852.926:2194): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:32.926000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:33.289154 kernel: audit: type=1105 audit(1707818852.931:2195): pid=9149 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:32.931000 audit[9149]: USER_START pid=9149 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.354759 sshd[9205]: Unable to negotiate with 5.135.90.165 port 41606: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:33.355088 systemd[1]: sshd@191-139.178.70.11:22-5.135.90.165:41606.service: Deactivated successfully. Feb 13 10:07:33.383675 kernel: audit: type=1103 audit(1707818852.931:2196): pid=9182 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:32.931000 audit[9182]: CRED_ACQ pid=9182 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.472912 kernel: audit: type=1106 audit(1707818853.007:2197): pid=9149 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.007000 audit[9149]: USER_END pid=9149 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.568442 kernel: audit: type=1104 audit(1707818853.008:2198): pid=9149 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.008000 audit[9149]: CRED_DISP pid=9149 uid=0 auid=500 ses=87 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:33.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@190-139.178.70.11:22-139.178.68.195:60682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:33.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-139.178.70.11:22-5.135.90.165:41606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:33.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@191-139.178.70.11:22-5.135.90.165:41606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:35.885732 env[1474]: time="2024-02-13T10:07:35.885622103Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:07:35.943426 env[1474]: time="2024-02-13T10:07:35.943274836Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:35.943800 kubelet[2572]: E0213 10:07:35.943757 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:07:35.944477 kubelet[2572]: E0213 10:07:35.943862 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:07:35.944477 kubelet[2572]: E0213 10:07:35.943965 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:35.944477 kubelet[2572]: E0213 10:07:35.944043 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:07:37.481242 systemd[1]: Started sshd@192-139.178.70.11:22-185.196.8.151:59218.service. Feb 13 10:07:37.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-139.178.70.11:22-185.196.8.151:59218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:37.644941 sshd[9243]: Unable to negotiate with 185.196.8.151 port 59218: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:37.646925 systemd[1]: sshd@192-139.178.70.11:22-185.196.8.151:59218.service: Deactivated successfully. Feb 13 10:07:37.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@192-139.178.70.11:22-185.196.8.151:59218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:38.011869 systemd[1]: Started sshd@193-139.178.70.11:22-139.178.68.195:52976.service. Feb 13 10:07:38.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.70.11:22-139.178.68.195:52976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:38.038921 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 13 10:07:38.038999 kernel: audit: type=1130 audit(1707818858.011:2204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.70.11:22-139.178.68.195:52976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:38.149000 audit[9247]: USER_ACCT pid=9247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.150035 sshd[9247]: Accepted publickey for core from 139.178.68.195 port 52976 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:38.151131 sshd[9247]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:38.153495 systemd-logind[1462]: New session 88 of user core. Feb 13 10:07:38.154005 systemd[1]: Started session-88.scope. Feb 13 10:07:38.231286 sshd[9247]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:38.232614 systemd[1]: sshd@193-139.178.70.11:22-139.178.68.195:52976.service: Deactivated successfully. Feb 13 10:07:38.233053 systemd[1]: session-88.scope: Deactivated successfully. Feb 13 10:07:38.233415 systemd-logind[1462]: Session 88 logged out. Waiting for processes to exit. Feb 13 10:07:38.233811 systemd-logind[1462]: Removed session 88. Feb 13 10:07:38.150000 audit[9247]: CRED_ACQ pid=9247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.332148 kernel: audit: type=1101 audit(1707818858.149:2205): pid=9247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.332185 kernel: audit: type=1103 audit(1707818858.150:2206): pid=9247 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.332203 kernel: audit: type=1006 audit(1707818858.150:2207): pid=9247 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=88 res=1 Feb 13 10:07:38.390779 kernel: audit: type=1300 audit(1707818858.150:2207): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36275ba0 a2=3 a3=0 items=0 ppid=1 pid=9247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:38.150000 audit[9247]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36275ba0 a2=3 a3=0 items=0 ppid=1 pid=9247 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=88 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:38.482846 kernel: audit: type=1327 audit(1707818858.150:2207): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:38.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:38.513362 kernel: audit: type=1105 audit(1707818858.155:2208): pid=9247 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.155000 audit[9247]: USER_START pid=9247 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.607923 kernel: audit: type=1103 audit(1707818858.155:2209): pid=9249 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.155000 audit[9249]: CRED_ACQ pid=9249 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.697122 kernel: audit: type=1106 audit(1707818858.231:2210): pid=9247 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.231000 audit[9247]: USER_END pid=9247 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.792618 kernel: audit: type=1104 audit(1707818858.231:2211): pid=9247 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.231000 audit[9247]: CRED_DISP pid=9247 uid=0 auid=500 ses=88 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:38.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@193-139.178.70.11:22-139.178.68.195:52976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:39.104133 systemd[1]: Started sshd@194-139.178.70.11:22-5.135.90.165:37552.service. Feb 13 10:07:39.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-139.178.70.11:22-5.135.90.165:37552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:39.261228 sshd[9271]: Unable to negotiate with 5.135.90.165 port 37552: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:39.262997 systemd[1]: sshd@194-139.178.70.11:22-5.135.90.165:37552.service: Deactivated successfully. Feb 13 10:07:39.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@194-139.178.70.11:22-5.135.90.165:37552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:39.889385 env[1474]: time="2024-02-13T10:07:39.889348441Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:07:39.902394 env[1474]: time="2024-02-13T10:07:39.902358360Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:39.902541 kubelet[2572]: E0213 10:07:39.902529 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:07:39.902727 kubelet[2572]: E0213 10:07:39.902561 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:07:39.902727 kubelet[2572]: E0213 10:07:39.902585 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:39.902727 kubelet[2572]: E0213 10:07:39.902604 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:07:41.886513 env[1474]: time="2024-02-13T10:07:41.886367370Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:07:41.934903 env[1474]: time="2024-02-13T10:07:41.934805281Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:41.935100 kubelet[2572]: E0213 10:07:41.935046 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:07:41.935100 kubelet[2572]: E0213 10:07:41.935093 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:07:41.935495 kubelet[2572]: E0213 10:07:41.935136 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:41.935495 kubelet[2572]: E0213 10:07:41.935176 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:07:43.240692 systemd[1]: Started sshd@195-139.178.70.11:22-139.178.68.195:52990.service. Feb 13 10:07:43.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.70.11:22-139.178.68.195:52990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:43.267330 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:07:43.267381 kernel: audit: type=1130 audit(1707818863.239:2215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.70.11:22-139.178.68.195:52990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:43.377000 audit[9332]: USER_ACCT pid=9332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.378938 sshd[9332]: Accepted publickey for core from 139.178.68.195 port 52990 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:43.379983 sshd[9332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:43.382631 systemd-logind[1462]: New session 89 of user core. Feb 13 10:07:43.383165 systemd[1]: Started session-89.scope. Feb 13 10:07:43.462508 sshd[9332]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:43.463928 systemd[1]: sshd@195-139.178.70.11:22-139.178.68.195:52990.service: Deactivated successfully. Feb 13 10:07:43.464356 systemd[1]: session-89.scope: Deactivated successfully. Feb 13 10:07:43.464710 systemd-logind[1462]: Session 89 logged out. Waiting for processes to exit. Feb 13 10:07:43.465297 systemd-logind[1462]: Removed session 89. Feb 13 10:07:43.378000 audit[9332]: CRED_ACQ pid=9332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.560734 kernel: audit: type=1101 audit(1707818863.377:2216): pid=9332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.560770 kernel: audit: type=1103 audit(1707818863.378:2217): pid=9332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.560787 kernel: audit: type=1006 audit(1707818863.378:2218): pid=9332 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=89 res=1 Feb 13 10:07:43.619300 kernel: audit: type=1300 audit(1707818863.378:2218): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb0b97bc0 a2=3 a3=0 items=0 ppid=1 pid=9332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:43.378000 audit[9332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb0b97bc0 a2=3 a3=0 items=0 ppid=1 pid=9332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=89 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:43.711293 kernel: audit: type=1327 audit(1707818863.378:2218): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:43.378000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:43.384000 audit[9332]: USER_START pid=9332 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.836339 kernel: audit: type=1105 audit(1707818863.384:2219): pid=9332 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.836397 kernel: audit: type=1103 audit(1707818863.385:2220): pid=9334 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.385000 audit[9334]: CRED_ACQ pid=9334 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.925560 kernel: audit: type=1106 audit(1707818863.462:2221): pid=9332 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.462000 audit[9332]: USER_END pid=9332 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:44.020986 kernel: audit: type=1104 audit(1707818863.462:2222): pid=9332 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.462000 audit[9332]: CRED_DISP pid=9332 uid=0 auid=500 ses=89 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:43.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@195-139.178.70.11:22-139.178.68.195:52990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:44.885813 env[1474]: time="2024-02-13T10:07:44.885715875Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:07:44.937015 env[1474]: time="2024-02-13T10:07:44.936916533Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:44.937197 kubelet[2572]: E0213 10:07:44.937164 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:07:44.937550 kubelet[2572]: E0213 10:07:44.937211 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:07:44.937550 kubelet[2572]: E0213 10:07:44.937273 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:44.937550 kubelet[2572]: E0213 10:07:44.937317 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:07:45.185733 systemd[1]: Started sshd@196-139.178.70.11:22-5.135.90.165:33620.service. Feb 13 10:07:45.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-139.178.70.11:22-5.135.90.165:33620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:45.352665 sshd[9387]: Unable to negotiate with 5.135.90.165 port 33620: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:45.354771 systemd[1]: sshd@196-139.178.70.11:22-5.135.90.165:33620.service: Deactivated successfully. Feb 13 10:07:45.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@196-139.178.70.11:22-5.135.90.165:33620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:46.215000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.215000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0012ffef0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:07:46.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:07:46.215000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.215000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00283b5a0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:07:46.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:07:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c128d80 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:07:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:07:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0086d60c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:07:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:07:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c5b8000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:07:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:07:46.474000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.474000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c128e10 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:07:46.474000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:07:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c013134780 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:07:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:07:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00c22e390 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:07:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:07:47.885716 env[1474]: time="2024-02-13T10:07:47.885626895Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:07:47.936861 env[1474]: time="2024-02-13T10:07:47.936765224Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:47.937047 kubelet[2572]: E0213 10:07:47.936990 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:07:47.937047 kubelet[2572]: E0213 10:07:47.937038 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:07:47.937456 kubelet[2572]: E0213 10:07:47.937091 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:47.937456 kubelet[2572]: E0213 10:07:47.937133 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:07:48.466052 systemd[1]: Started sshd@197-139.178.70.11:22-139.178.68.195:33292.service. Feb 13 10:07:48.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.70.11:22-139.178.68.195:33292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:48.493654 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 10:07:48.493724 kernel: audit: type=1130 audit(1707818868.465:2234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.70.11:22-139.178.68.195:33292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:48.602000 audit[9420]: USER_ACCT pid=9420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.604267 sshd[9420]: Accepted publickey for core from 139.178.68.195 port 33292 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:48.607185 sshd[9420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:48.616986 systemd-logind[1462]: New session 90 of user core. Feb 13 10:07:48.619189 systemd[1]: Started session-90.scope. Feb 13 10:07:48.605000 audit[9420]: CRED_ACQ pid=9420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.704881 sshd[9420]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:48.706315 systemd[1]: sshd@197-139.178.70.11:22-139.178.68.195:33292.service: Deactivated successfully. Feb 13 10:07:48.706749 systemd[1]: session-90.scope: Deactivated successfully. Feb 13 10:07:48.707129 systemd-logind[1462]: Session 90 logged out. Waiting for processes to exit. Feb 13 10:07:48.707578 systemd-logind[1462]: Removed session 90. Feb 13 10:07:48.786011 kernel: audit: type=1101 audit(1707818868.602:2235): pid=9420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.786054 kernel: audit: type=1103 audit(1707818868.605:2236): pid=9420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.786072 kernel: audit: type=1006 audit(1707818868.605:2237): pid=9420 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=90 res=1 Feb 13 10:07:48.605000 audit[9420]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdff856cb0 a2=3 a3=0 items=0 ppid=1 pid=9420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:48.936932 kernel: audit: type=1300 audit(1707818868.605:2237): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdff856cb0 a2=3 a3=0 items=0 ppid=1 pid=9420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=90 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:48.937004 kernel: audit: type=1327 audit(1707818868.605:2237): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:48.605000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:48.967478 kernel: audit: type=1105 audit(1707818868.626:2238): pid=9420 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.626000 audit[9420]: USER_START pid=9420 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.627000 audit[9422]: CRED_ACQ pid=9422 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:49.151509 kernel: audit: type=1103 audit(1707818868.627:2239): pid=9422 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:49.151593 kernel: audit: type=1106 audit(1707818868.704:2240): pid=9420 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.704000 audit[9420]: USER_END pid=9420 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:49.247145 kernel: audit: type=1104 audit(1707818868.704:2241): pid=9420 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.704000 audit[9420]: CRED_DISP pid=9420 uid=0 auid=500 ses=90 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:48.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@197-139.178.70.11:22-139.178.68.195:33292 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00283b8e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:07:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:07:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fbaf60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:07:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:07:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00015e7c0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:07:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:07:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:07:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00079af60 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:07:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:07:50.375368 systemd[1]: Started sshd@198-139.178.70.11:22-5.135.90.165:57866.service. Feb 13 10:07:50.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-139.178.70.11:22-5.135.90.165:57866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:50.532079 sshd[9446]: Unable to negotiate with 5.135.90.165 port 57866: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:50.533814 systemd[1]: sshd@198-139.178.70.11:22-5.135.90.165:57866.service: Deactivated successfully. Feb 13 10:07:50.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@198-139.178.70.11:22-5.135.90.165:57866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:53.708534 systemd[1]: Started sshd@199-139.178.70.11:22-139.178.68.195:33298.service. Feb 13 10:07:53.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.70.11:22-139.178.68.195:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:53.735547 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 13 10:07:53.735604 kernel: audit: type=1130 audit(1707818873.707:2249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.70.11:22-139.178.68.195:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:53.846000 audit[9450]: USER_ACCT pid=9450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:53.847655 sshd[9450]: Accepted publickey for core from 139.178.68.195 port 33298 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:53.848761 sshd[9450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:53.851299 systemd-logind[1462]: New session 91 of user core. Feb 13 10:07:53.851748 systemd[1]: Started session-91.scope. Feb 13 10:07:53.885083 env[1474]: time="2024-02-13T10:07:53.885062962Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:07:53.885296 env[1474]: time="2024-02-13T10:07:53.885062579Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:07:53.899996 env[1474]: time="2024-02-13T10:07:53.899956609Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:53.900177 kubelet[2572]: E0213 10:07:53.900163 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:07:53.900373 kubelet[2572]: E0213 10:07:53.900193 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:07:53.900373 kubelet[2572]: E0213 10:07:53.900217 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:53.900373 kubelet[2572]: E0213 10:07:53.900238 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:07:53.900481 env[1474]: time="2024-02-13T10:07:53.900270381Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:53.900508 kubelet[2572]: E0213 10:07:53.900375 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:07:53.900508 kubelet[2572]: E0213 10:07:53.900390 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:07:53.900508 kubelet[2572]: E0213 10:07:53.900409 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:53.900508 kubelet[2572]: E0213 10:07:53.900423 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:07:53.939853 kernel: audit: type=1101 audit(1707818873.846:2250): pid=9450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:53.939889 kernel: audit: type=1103 audit(1707818873.847:2251): pid=9450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:53.847000 audit[9450]: CRED_ACQ pid=9450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.014329 sshd[9450]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:54.015653 systemd[1]: sshd@199-139.178.70.11:22-139.178.68.195:33298.service: Deactivated successfully. Feb 13 10:07:54.016095 systemd[1]: session-91.scope: Deactivated successfully. Feb 13 10:07:54.016487 systemd-logind[1462]: Session 91 logged out. Waiting for processes to exit. Feb 13 10:07:54.017362 systemd-logind[1462]: Removed session 91. Feb 13 10:07:54.089140 kernel: audit: type=1006 audit(1707818873.847:2252): pid=9450 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=91 res=1 Feb 13 10:07:54.089174 kernel: audit: type=1300 audit(1707818873.847:2252): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8227fa30 a2=3 a3=0 items=0 ppid=1 pid=9450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:53.847000 audit[9450]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8227fa30 a2=3 a3=0 items=0 ppid=1 pid=9450 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=91 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:54.181272 kernel: audit: type=1327 audit(1707818873.847:2252): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:53.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:54.211808 kernel: audit: type=1105 audit(1707818873.853:2253): pid=9450 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:53.853000 audit[9450]: USER_START pid=9450 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.306505 kernel: audit: type=1103 audit(1707818873.854:2254): pid=9452 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:53.854000 audit[9452]: CRED_ACQ pid=9452 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.014000 audit[9450]: USER_END pid=9450 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.491390 kernel: audit: type=1106 audit(1707818874.014:2255): pid=9450 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.491420 kernel: audit: type=1104 audit(1707818874.014:2256): pid=9450 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.014000 audit[9450]: CRED_DISP pid=9450 uid=0 auid=500 ses=91 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:54.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@199-139.178.70.11:22-139.178.68.195:33298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:56.400582 systemd[1]: Started sshd@200-139.178.70.11:22-5.135.90.165:53998.service. Feb 13 10:07:56.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-139.178.70.11:22-5.135.90.165:53998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:56.554022 sshd[9536]: Unable to negotiate with 5.135.90.165 port 53998: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:07:56.555829 systemd[1]: sshd@200-139.178.70.11:22-5.135.90.165:53998.service: Deactivated successfully. Feb 13 10:07:56.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@200-139.178.70.11:22-5.135.90.165:53998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:56.885738 env[1474]: time="2024-02-13T10:07:56.885647473Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:07:56.936414 env[1474]: time="2024-02-13T10:07:56.936305326Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:07:56.936661 kubelet[2572]: E0213 10:07:56.936636 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:07:56.937066 kubelet[2572]: E0213 10:07:56.936693 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:07:56.937066 kubelet[2572]: E0213 10:07:56.936746 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:07:56.937066 kubelet[2572]: E0213 10:07:56.936789 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:07:59.024448 systemd[1]: Started sshd@201-139.178.70.11:22-139.178.68.195:59536.service. Feb 13 10:07:59.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.70.11:22-139.178.68.195:59536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:59.051044 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:07:59.051130 kernel: audit: type=1130 audit(1707818879.023:2260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.70.11:22-139.178.68.195:59536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:07:59.161000 audit[9571]: USER_ACCT pid=9571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.162494 sshd[9571]: Accepted publickey for core from 139.178.68.195 port 59536 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:07:59.166176 sshd[9571]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:07:59.170517 systemd-logind[1462]: New session 92 of user core. Feb 13 10:07:59.171125 systemd[1]: Started session-92.scope. Feb 13 10:07:59.249593 sshd[9571]: pam_unix(sshd:session): session closed for user core Feb 13 10:07:59.250992 systemd[1]: sshd@201-139.178.70.11:22-139.178.68.195:59536.service: Deactivated successfully. Feb 13 10:07:59.251544 systemd[1]: session-92.scope: Deactivated successfully. Feb 13 10:07:59.251850 systemd-logind[1462]: Session 92 logged out. Waiting for processes to exit. Feb 13 10:07:59.252366 systemd-logind[1462]: Removed session 92. Feb 13 10:07:59.164000 audit[9571]: CRED_ACQ pid=9571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.346861 kernel: audit: type=1101 audit(1707818879.161:2261): pid=9571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.346899 kernel: audit: type=1103 audit(1707818879.164:2262): pid=9571 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.346920 kernel: audit: type=1006 audit(1707818879.164:2263): pid=9571 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=92 res=1 Feb 13 10:07:59.164000 audit[9571]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00e1c3a0 a2=3 a3=0 items=0 ppid=1 pid=9571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:59.497581 kernel: audit: type=1300 audit(1707818879.164:2263): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00e1c3a0 a2=3 a3=0 items=0 ppid=1 pid=9571 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=92 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:07:59.497607 kernel: audit: type=1327 audit(1707818879.164:2263): proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:59.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:07:59.172000 audit[9571]: USER_START pid=9571 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.622720 kernel: audit: type=1105 audit(1707818879.172:2264): pid=9571 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.622754 kernel: audit: type=1103 audit(1707818879.172:2265): pid=9573 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.172000 audit[9573]: CRED_ACQ pid=9573 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.712003 kernel: audit: type=1106 audit(1707818879.249:2266): pid=9571 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.249000 audit[9571]: USER_END pid=9571 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.807557 kernel: audit: type=1104 audit(1707818879.249:2267): pid=9571 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.249000 audit[9571]: CRED_DISP pid=9571 uid=0 auid=500 ses=92 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:07:59.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@201-139.178.70.11:22-139.178.68.195:59536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:01.993103 systemd[1]: Started sshd@202-139.178.70.11:22-5.135.90.165:49940.service. Feb 13 10:08:01.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-139.178.70.11:22-5.135.90.165:49940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:02.145037 sshd[9596]: Unable to negotiate with 5.135.90.165 port 49940: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:02.147194 systemd[1]: sshd@202-139.178.70.11:22-5.135.90.165:49940.service: Deactivated successfully. Feb 13 10:08:02.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@202-139.178.70.11:22-5.135.90.165:49940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:02.886463 env[1474]: time="2024-02-13T10:08:02.886199232Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:02.928557 env[1474]: time="2024-02-13T10:08:02.928521557Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:02.928713 kubelet[2572]: E0213 10:08:02.928702 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:02.928923 kubelet[2572]: E0213 10:08:02.928733 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:08:02.928923 kubelet[2572]: E0213 10:08:02.928754 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:02.928923 kubelet[2572]: E0213 10:08:02.928771 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:08:04.259337 systemd[1]: Started sshd@203-139.178.70.11:22-139.178.68.195:59548.service. Feb 13 10:08:04.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.70.11:22-139.178.68.195:59548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:04.286343 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:08:04.286432 kernel: audit: type=1130 audit(1707818884.258:2271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.70.11:22-139.178.68.195:59548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:04.397000 audit[9628]: USER_ACCT pid=9628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.398381 sshd[9628]: Accepted publickey for core from 139.178.68.195 port 59548 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:04.399136 sshd[9628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:04.401535 systemd-logind[1462]: New session 93 of user core. Feb 13 10:08:04.401978 systemd[1]: Started session-93.scope. Feb 13 10:08:04.480270 sshd[9628]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:04.481715 systemd[1]: sshd@203-139.178.70.11:22-139.178.68.195:59548.service: Deactivated successfully. Feb 13 10:08:04.482243 systemd[1]: session-93.scope: Deactivated successfully. Feb 13 10:08:04.482640 systemd-logind[1462]: Session 93 logged out. Waiting for processes to exit. Feb 13 10:08:04.483097 systemd-logind[1462]: Removed session 93. Feb 13 10:08:04.398000 audit[9628]: CRED_ACQ pid=9628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.582641 kernel: audit: type=1101 audit(1707818884.397:2272): pid=9628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.582680 kernel: audit: type=1103 audit(1707818884.398:2273): pid=9628 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.582697 kernel: audit: type=1006 audit(1707818884.398:2274): pid=9628 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=93 res=1 Feb 13 10:08:04.641262 kernel: audit: type=1300 audit(1707818884.398:2274): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcc626f0 a2=3 a3=0 items=0 ppid=1 pid=9628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:04.398000 audit[9628]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbcc626f0 a2=3 a3=0 items=0 ppid=1 pid=9628 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=93 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:04.733362 kernel: audit: type=1327 audit(1707818884.398:2274): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:04.398000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:04.763921 kernel: audit: type=1105 audit(1707818884.402:2275): pid=9628 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.402000 audit[9628]: USER_START pid=9628 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.858627 kernel: audit: type=1103 audit(1707818884.403:2276): pid=9630 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.403000 audit[9630]: CRED_ACQ pid=9630 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.885183 env[1474]: time="2024-02-13T10:08:04.885162611Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:08:04.897343 env[1474]: time="2024-02-13T10:08:04.897308285Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:04.897486 kubelet[2572]: E0213 10:08:04.897474 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:04.897668 kubelet[2572]: E0213 10:08:04.897502 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:08:04.897668 kubelet[2572]: E0213 10:08:04.897532 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:04.897668 kubelet[2572]: E0213 10:08:04.897559 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:08:04.947920 kernel: audit: type=1106 audit(1707818884.479:2277): pid=9628 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.479000 audit[9628]: USER_END pid=9628 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:05.043465 kernel: audit: type=1104 audit(1707818884.480:2278): pid=9628 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.480000 audit[9628]: CRED_DISP pid=9628 uid=0 auid=500 ses=93 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:04.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@203-139.178.70.11:22-139.178.68.195:59548 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:07.885485 env[1474]: time="2024-02-13T10:08:07.885397292Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:08:07.937628 env[1474]: time="2024-02-13T10:08:07.937517749Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:07.937883 kubelet[2572]: E0213 10:08:07.937837 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:07.938351 kubelet[2572]: E0213 10:08:07.937921 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:08:07.938351 kubelet[2572]: E0213 10:08:07.938004 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:07.938351 kubelet[2572]: E0213 10:08:07.938073 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:08:08.208291 systemd[1]: Started sshd@204-139.178.70.11:22-5.135.90.165:45926.service. Feb 13 10:08:08.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-139.178.70.11:22-5.135.90.165:45926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:08.362119 sshd[9711]: Unable to negotiate with 5.135.90.165 port 45926: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:08.362665 systemd[1]: sshd@204-139.178.70.11:22-5.135.90.165:45926.service: Deactivated successfully. Feb 13 10:08:08.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@204-139.178.70.11:22-5.135.90.165:45926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:08.886180 env[1474]: time="2024-02-13T10:08:08.886084267Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:08:08.937481 env[1474]: time="2024-02-13T10:08:08.937378257Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:08.937691 kubelet[2572]: E0213 10:08:08.937666 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:08.937791 kubelet[2572]: E0213 10:08:08.937714 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:08:08.937791 kubelet[2572]: E0213 10:08:08.937767 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:08.937987 kubelet[2572]: E0213 10:08:08.937808 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:08:09.490429 systemd[1]: Started sshd@205-139.178.70.11:22-139.178.68.195:43066.service. Feb 13 10:08:09.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.70.11:22-139.178.68.195:43066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:09.517357 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:08:09.517472 kernel: audit: type=1130 audit(1707818889.489:2282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.70.11:22-139.178.68.195:43066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:09.627000 audit[9744]: USER_ACCT pid=9744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.628402 sshd[9744]: Accepted publickey for core from 139.178.68.195 port 43066 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:09.630144 sshd[9744]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:09.632539 systemd-logind[1462]: New session 94 of user core. Feb 13 10:08:09.632980 systemd[1]: Started session-94.scope. Feb 13 10:08:09.710775 sshd[9744]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:09.712280 systemd[1]: sshd@205-139.178.70.11:22-139.178.68.195:43066.service: Deactivated successfully. Feb 13 10:08:09.712712 systemd[1]: session-94.scope: Deactivated successfully. Feb 13 10:08:09.713067 systemd-logind[1462]: Session 94 logged out. Waiting for processes to exit. Feb 13 10:08:09.713861 systemd-logind[1462]: Removed session 94. Feb 13 10:08:09.629000 audit[9744]: CRED_ACQ pid=9744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.719886 kernel: audit: type=1101 audit(1707818889.627:2283): pid=9744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.719926 kernel: audit: type=1103 audit(1707818889.629:2284): pid=9744 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.868924 kernel: audit: type=1006 audit(1707818889.629:2285): pid=9744 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=94 res=1 Feb 13 10:08:09.868963 kernel: audit: type=1300 audit(1707818889.629:2285): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdef147ca0 a2=3 a3=0 items=0 ppid=1 pid=9744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:09.629000 audit[9744]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdef147ca0 a2=3 a3=0 items=0 ppid=1 pid=9744 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=94 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:09.961041 kernel: audit: type=1327 audit(1707818889.629:2285): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:09.629000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:09.991587 kernel: audit: type=1105 audit(1707818889.634:2286): pid=9744 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.634000 audit[9744]: USER_START pid=9744 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:10.086157 kernel: audit: type=1103 audit(1707818889.635:2287): pid=9746 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.635000 audit[9746]: CRED_ACQ pid=9746 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:10.175488 kernel: audit: type=1106 audit(1707818889.710:2288): pid=9744 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.710000 audit[9744]: USER_END pid=9744 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:10.271033 kernel: audit: type=1104 audit(1707818889.710:2289): pid=9744 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.710000 audit[9744]: CRED_DISP pid=9744 uid=0 auid=500 ses=94 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:09.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@205-139.178.70.11:22-139.178.68.195:43066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:13.885868 env[1474]: time="2024-02-13T10:08:13.885768343Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:13.937004 env[1474]: time="2024-02-13T10:08:13.936934598Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:13.937304 kubelet[2572]: E0213 10:08:13.937242 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:13.937304 kubelet[2572]: E0213 10:08:13.937299 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:08:13.937771 kubelet[2572]: E0213 10:08:13.937356 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:13.937771 kubelet[2572]: E0213 10:08:13.937397 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:08:14.714443 systemd[1]: Started sshd@206-139.178.70.11:22-139.178.68.195:43076.service. Feb 13 10:08:14.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.70.11:22-139.178.68.195:43076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:14.741440 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:08:14.741517 kernel: audit: type=1130 audit(1707818894.713:2291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.70.11:22-139.178.68.195:43076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:14.852000 audit[9799]: USER_ACCT pid=9799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.853237 sshd[9799]: Accepted publickey for core from 139.178.68.195 port 43076 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:14.855233 sshd[9799]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:14.857613 systemd-logind[1462]: New session 95 of user core. Feb 13 10:08:14.858270 systemd[1]: Started session-95.scope. Feb 13 10:08:14.937019 sshd[9799]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:14.938507 systemd[1]: sshd@206-139.178.70.11:22-139.178.68.195:43076.service: Deactivated successfully. Feb 13 10:08:14.938951 systemd[1]: session-95.scope: Deactivated successfully. Feb 13 10:08:14.939360 systemd-logind[1462]: Session 95 logged out. Waiting for processes to exit. Feb 13 10:08:14.939817 systemd-logind[1462]: Removed session 95. Feb 13 10:08:14.944896 kernel: audit: type=1101 audit(1707818894.852:2292): pid=9799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.944946 kernel: audit: type=1103 audit(1707818894.854:2293): pid=9799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.854000 audit[9799]: CRED_ACQ pid=9799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:15.094063 kernel: audit: type=1006 audit(1707818894.854:2294): pid=9799 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=95 res=1 Feb 13 10:08:15.094105 kernel: audit: type=1300 audit(1707818894.854:2294): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2fd555c0 a2=3 a3=0 items=0 ppid=1 pid=9799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:14.854000 audit[9799]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2fd555c0 a2=3 a3=0 items=0 ppid=1 pid=9799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=95 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:15.109926 systemd[1]: Started sshd@207-139.178.70.11:22-5.135.90.165:41938.service. Feb 13 10:08:15.186143 kernel: audit: type=1327 audit(1707818894.854:2294): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:14.854000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:15.216714 kernel: audit: type=1105 audit(1707818894.859:2295): pid=9799 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.859000 audit[9799]: USER_START pid=9799 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:15.261839 sshd[9823]: Unable to negotiate with 5.135.90.165 port 41938: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:15.262347 systemd[1]: sshd@207-139.178.70.11:22-5.135.90.165:41938.service: Deactivated successfully. Feb 13 10:08:14.860000 audit[9801]: CRED_ACQ pid=9801 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:15.400626 kernel: audit: type=1103 audit(1707818894.860:2296): pid=9801 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:15.400704 kernel: audit: type=1106 audit(1707818894.936:2297): pid=9799 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.936000 audit[9799]: USER_END pid=9799 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:15.496176 kernel: audit: type=1104 audit(1707818894.936:2298): pid=9799 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.936000 audit[9799]: CRED_DISP pid=9799 uid=0 auid=500 ses=95 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:14.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@206-139.178.70.11:22-139.178.68.195:43076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:15.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-139.178.70.11:22-5.135.90.165:41938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:15.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@207-139.178.70.11:22-5.135.90.165:41938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:16.885802 env[1474]: time="2024-02-13T10:08:16.885709444Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:08:16.936401 env[1474]: time="2024-02-13T10:08:16.936308167Z" level=error msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" failed" error="failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:16.936677 kubelet[2572]: E0213 10:08:16.936628 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:16.937088 kubelet[2572]: E0213 10:08:16.936681 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c"} Feb 13 10:08:16.937088 kubelet[2572]: E0213 10:08:16.936735 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:16.937088 kubelet[2572]: E0213 10:08:16.936779 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-npfv4" podUID="3e331d8a-1c45-4abd-a1a9-e47f55bcb21d" Feb 13 10:08:18.886385 env[1474]: time="2024-02-13T10:08:18.886289451Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:08:18.944421 env[1474]: time="2024-02-13T10:08:18.944271293Z" level=error msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" failed" error="failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:18.944800 kubelet[2572]: E0213 10:08:18.944756 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:18.945453 kubelet[2572]: E0213 10:08:18.944879 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1"} Feb 13 10:08:18.945453 kubelet[2572]: E0213 10:08:18.944983 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:18.945453 kubelet[2572]: E0213 10:08:18.945056 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b217c7e3-c759-42d3-a900-2c8ca05116be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-p4vct" podUID="b217c7e3-c759-42d3-a900-2c8ca05116be" Feb 13 10:08:19.946316 systemd[1]: Started sshd@208-139.178.70.11:22-139.178.68.195:36588.service. Feb 13 10:08:19.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-139.178.70.11:22-139.178.68.195:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:19.973405 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:08:19.973493 kernel: audit: type=1130 audit(1707818899.945:2302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-139.178.70.11:22-139.178.68.195:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:20.084000 audit[9892]: USER_ACCT pid=9892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.085217 sshd[9892]: Accepted publickey for core from 139.178.68.195 port 36588 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:20.087052 sshd[9892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:20.089564 systemd-logind[1462]: New session 96 of user core. Feb 13 10:08:20.090268 systemd[1]: Started session-96.scope. Feb 13 10:08:20.170810 sshd[9892]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:20.172409 systemd[1]: sshd@208-139.178.70.11:22-139.178.68.195:36588.service: Deactivated successfully. Feb 13 10:08:20.172935 systemd[1]: session-96.scope: Deactivated successfully. Feb 13 10:08:20.173345 systemd-logind[1462]: Session 96 logged out. Waiting for processes to exit. Feb 13 10:08:20.173793 systemd-logind[1462]: Removed session 96. Feb 13 10:08:20.086000 audit[9892]: CRED_ACQ pid=9892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.268981 kernel: audit: type=1101 audit(1707818900.084:2303): pid=9892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.269021 kernel: audit: type=1103 audit(1707818900.086:2304): pid=9892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.269044 kernel: audit: type=1006 audit(1707818900.086:2305): pid=9892 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=96 res=1 Feb 13 10:08:20.287874 systemd[1]: Started sshd@209-139.178.70.11:22-5.135.90.165:38016.service. Feb 13 10:08:20.327543 kernel: audit: type=1300 audit(1707818900.086:2305): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6f4a200 a2=3 a3=0 items=0 ppid=1 pid=9892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:20.086000 audit[9892]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee6f4a200 a2=3 a3=0 items=0 ppid=1 pid=9892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=96 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:20.419531 kernel: audit: type=1327 audit(1707818900.086:2305): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:20.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:20.449033 sshd[9917]: Unable to negotiate with 5.135.90.165 port 38016: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:20.449364 systemd[1]: sshd@209-139.178.70.11:22-5.135.90.165:38016.service: Deactivated successfully. Feb 13 10:08:20.450026 kernel: audit: type=1105 audit(1707818900.091:2306): pid=9892 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.091000 audit[9892]: USER_START pid=9892 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.544813 kernel: audit: type=1103 audit(1707818900.092:2307): pid=9894 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.092000 audit[9894]: CRED_ACQ pid=9894 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.633989 kernel: audit: type=1106 audit(1707818900.170:2308): pid=9892 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.170000 audit[9892]: USER_END pid=9892 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.729457 kernel: audit: type=1104 audit(1707818900.170:2309): pid=9892 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.170000 audit[9892]: CRED_DISP pid=9892 uid=0 auid=500 ses=96 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:20.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@208-139.178.70.11:22-139.178.68.195:36588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:20.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@209-139.178.70.11:22-5.135.90.165:38016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:20.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@209-139.178.70.11:22-5.135.90.165:38016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:22.886036 env[1474]: time="2024-02-13T10:08:22.885906876Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:08:22.914912 env[1474]: time="2024-02-13T10:08:22.914875007Z" level=error msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" failed" error="failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:22.915081 kubelet[2572]: E0213 10:08:22.915037 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:22.915081 kubelet[2572]: E0213 10:08:22.915066 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace"} Feb 13 10:08:22.915281 kubelet[2572]: E0213 10:08:22.915089 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:22.915281 kubelet[2572]: E0213 10:08:22.915107 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"46bb237c-2abc-45ef-94ac-007ed36d6a43\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podUID="46bb237c-2abc-45ef-94ac-007ed36d6a43" Feb 13 10:08:25.181922 systemd[1]: Started sshd@210-139.178.70.11:22-139.178.68.195:36602.service. Feb 13 10:08:25.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-139.178.70.11:22-139.178.68.195:36602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:25.209279 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:08:25.209367 kernel: audit: type=1130 audit(1707818905.180:2313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-139.178.70.11:22-139.178.68.195:36602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:25.320000 audit[9948]: USER_ACCT pid=9948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.321493 sshd[9948]: Accepted publickey for core from 139.178.68.195 port 36602 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:25.325126 sshd[9948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:25.333971 systemd-logind[1462]: New session 97 of user core. Feb 13 10:08:25.335739 systemd[1]: Started session-97.scope. Feb 13 10:08:25.323000 audit[9948]: CRED_ACQ pid=9948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.419361 sshd[9948]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:25.420646 systemd[1]: sshd@210-139.178.70.11:22-139.178.68.195:36602.service: Deactivated successfully. Feb 13 10:08:25.421088 systemd[1]: session-97.scope: Deactivated successfully. Feb 13 10:08:25.421461 systemd-logind[1462]: Session 97 logged out. Waiting for processes to exit. Feb 13 10:08:25.421858 systemd-logind[1462]: Removed session 97. Feb 13 10:08:25.503155 kernel: audit: type=1101 audit(1707818905.320:2314): pid=9948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.503189 kernel: audit: type=1103 audit(1707818905.323:2315): pid=9948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.503210 kernel: audit: type=1006 audit(1707818905.323:2316): pid=9948 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=97 res=1 Feb 13 10:08:25.561767 kernel: audit: type=1300 audit(1707818905.323:2316): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0038330 a2=3 a3=0 items=0 ppid=1 pid=9948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:25.323000 audit[9948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd0038330 a2=3 a3=0 items=0 ppid=1 pid=9948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=97 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:25.653752 kernel: audit: type=1327 audit(1707818905.323:2316): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:25.323000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:25.684264 kernel: audit: type=1105 audit(1707818905.340:2317): pid=9948 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.340000 audit[9948]: USER_START pid=9948 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.778755 kernel: audit: type=1103 audit(1707818905.343:2318): pid=9950 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.343000 audit[9950]: CRED_ACQ pid=9950 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.868097 kernel: audit: type=1106 audit(1707818905.418:2319): pid=9948 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.418000 audit[9948]: USER_END pid=9948 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.963574 kernel: audit: type=1104 audit(1707818905.418:2320): pid=9948 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.418000 audit[9948]: CRED_DISP pid=9948 uid=0 auid=500 ses=97 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:25.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@210-139.178.70.11:22-139.178.68.195:36602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:26.327122 systemd[1]: Started sshd@211-139.178.70.11:22-5.135.90.165:34034.service. Feb 13 10:08:26.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@211-139.178.70.11:22-5.135.90.165:34034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:26.486455 sshd[9972]: Unable to negotiate with 5.135.90.165 port 34034: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:26.488439 systemd[1]: sshd@211-139.178.70.11:22-5.135.90.165:34034.service: Deactivated successfully. Feb 13 10:08:26.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@211-139.178.70.11:22-5.135.90.165:34034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:26.885550 env[1474]: time="2024-02-13T10:08:26.885412515Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:26.911440 env[1474]: time="2024-02-13T10:08:26.911406415Z" level=error msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" failed" error="failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 10:08:26.911630 kubelet[2572]: E0213 10:08:26.911593 2572 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:26.911630 kubelet[2572]: E0213 10:08:26.911622 2572 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f"} Feb 13 10:08:26.911809 kubelet[2572]: E0213 10:08:26.911644 2572 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 10:08:26.911809 kubelet[2572]: E0213 10:08:26.911662 2572 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"25321284-19a1-4fad-84b5-db985c324966\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w8rcv" podUID="25321284-19a1-4fad-84b5-db985c324966" Feb 13 10:08:30.422651 systemd[1]: Started sshd@212-139.178.70.11:22-139.178.68.195:54466.service. Feb 13 10:08:30.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@212-139.178.70.11:22-139.178.68.195:54466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:30.449894 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:08:30.449983 kernel: audit: type=1130 audit(1707818910.420:2324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@212-139.178.70.11:22-139.178.68.195:54466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:30.559000 audit[10003]: USER_ACCT pid=10003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.561259 sshd[10003]: Accepted publickey for core from 139.178.68.195 port 54466 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:30.562140 sshd[10003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:30.564403 systemd-logind[1462]: New session 98 of user core. Feb 13 10:08:30.564900 systemd[1]: Started session-98.scope. Feb 13 10:08:30.643961 sshd[10003]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:30.645390 systemd[1]: sshd@212-139.178.70.11:22-139.178.68.195:54466.service: Deactivated successfully. Feb 13 10:08:30.645822 systemd[1]: session-98.scope: Deactivated successfully. Feb 13 10:08:30.646195 systemd-logind[1462]: Session 98 logged out. Waiting for processes to exit. Feb 13 10:08:30.646712 systemd-logind[1462]: Removed session 98. Feb 13 10:08:30.560000 audit[10003]: CRED_ACQ pid=10003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.743503 kernel: audit: type=1101 audit(1707818910.559:2325): pid=10003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.743573 kernel: audit: type=1103 audit(1707818910.560:2326): pid=10003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.743590 kernel: audit: type=1006 audit(1707818910.560:2327): pid=10003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=98 res=1 Feb 13 10:08:30.802222 kernel: audit: type=1300 audit(1707818910.560:2327): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd467f2840 a2=3 a3=0 items=0 ppid=1 pid=10003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:30.560000 audit[10003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd467f2840 a2=3 a3=0 items=0 ppid=1 pid=10003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=98 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:30.863653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount159851175.mount: Deactivated successfully. Feb 13 10:08:30.894353 kernel: audit: type=1327 audit(1707818910.560:2327): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:30.560000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:30.919446 env[1474]: time="2024-02-13T10:08:30.919398729Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:30.920136 env[1474]: time="2024-02-13T10:08:30.920095021Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:30.920883 env[1474]: time="2024-02-13T10:08:30.920836211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:30.921551 env[1474]: time="2024-02-13T10:08:30.921511425Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:30.921770 env[1474]: time="2024-02-13T10:08:30.921731238Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 13 10:08:30.565000 audit[10003]: USER_START pid=10003 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.925379 env[1474]: time="2024-02-13T10:08:30.925362959Z" level=info msg="CreateContainer within sandbox \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 13 10:08:31.019500 kernel: audit: type=1105 audit(1707818910.565:2328): pid=10003 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:31.019558 kernel: audit: type=1103 audit(1707818910.566:2329): pid=10005 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.566000 audit[10005]: CRED_ACQ pid=10005 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:31.108905 kernel: audit: type=1106 audit(1707818910.642:2330): pid=10003 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.642000 audit[10003]: USER_END pid=10003 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:31.110763 env[1474]: time="2024-02-13T10:08:31.110742283Z" level=info msg="CreateContainer within sandbox \"3ac3cd01b3dc2e2be141dd5c6689711cc12e8d73130df79396db0dcd1f4ade4e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"56b650f066de9ea9aeeff916bdbc76cf3db4f2948c965b4243499e176ac6159e\"" Feb 13 10:08:31.111076 env[1474]: time="2024-02-13T10:08:31.111064744Z" level=info msg="StartContainer for \"56b650f066de9ea9aeeff916bdbc76cf3db4f2948c965b4243499e176ac6159e\"" Feb 13 10:08:31.119212 systemd[1]: Started cri-containerd-56b650f066de9ea9aeeff916bdbc76cf3db4f2948c965b4243499e176ac6159e.scope. Feb 13 10:08:31.204433 kernel: audit: type=1104 audit(1707818910.642:2331): pid=10003 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.642000 audit[10003]: CRED_DISP pid=10003 uid=0 auid=500 ses=98 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:30.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@212-139.178.70.11:22-139.178.68.195:54466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9f7b1a6018 items=0 ppid=3132 pid=10035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:31.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623635306630363664653965613961656566663931366264626337 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.212000 audit: BPF prog-id=142 op=LOAD Feb 13 10:08:31.212000 audit[10035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001faf58 items=0 ppid=3132 pid=10035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:31.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623635306630363664653965613961656566663931366264626337 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.291000 audit: BPF prog-id=143 op=LOAD Feb 13 10:08:31.291000 audit[10035]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fafa8 items=0 ppid=3132 pid=10035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:31.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623635306630363664653965613961656566663931366264626337 Feb 13 10:08:31.292000 audit: BPF prog-id=143 op=UNLOAD Feb 13 10:08:31.292000 audit: BPF prog-id=142 op=UNLOAD Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { perfmon } for pid=10035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit[10035]: AVC avc: denied { bpf } for pid=10035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:31.292000 audit: BPF prog-id=144 op=LOAD Feb 13 10:08:31.292000 audit[10035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fb038 items=0 ppid=3132 pid=10035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:31.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536623635306630363664653965613961656566663931366264626337 Feb 13 10:08:31.299724 env[1474]: time="2024-02-13T10:08:31.299697887Z" level=info msg="StartContainer for \"56b650f066de9ea9aeeff916bdbc76cf3db4f2948c965b4243499e176ac6159e\" returns successfully" Feb 13 10:08:31.407446 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 13 10:08:31.407511 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 13 10:08:31.885992 env[1474]: time="2024-02-13T10:08:31.885914055Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.950 [INFO][10129] k8s.go 578: Cleaning up netns ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.950 [INFO][10129] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" iface="eth0" netns="/var/run/netns/cni-d41891f1-5437-8749-8d5d-ea4a12c3a0eb" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.950 [INFO][10129] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" iface="eth0" netns="/var/run/netns/cni-d41891f1-5437-8749-8d5d-ea4a12c3a0eb" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.950 [INFO][10129] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" iface="eth0" netns="/var/run/netns/cni-d41891f1-5437-8749-8d5d-ea4a12c3a0eb" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.951 [INFO][10129] k8s.go 585: Releasing IP address(es) ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.951 [INFO][10129] utils.go 188: Calico CNI releasing IP address ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.969 [INFO][10146] ipam_plugin.go 415: Releasing address using handleID ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.969 [INFO][10146] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.969 [INFO][10146] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.976 [WARNING][10146] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.976 [INFO][10146] ipam_plugin.go 443: Releasing address using workloadID ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.978 [INFO][10146] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:31.980553 env[1474]: 2024-02-13 10:08:31.979 [INFO][10129] k8s.go 591: Teardown processing complete. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:31.981373 env[1474]: time="2024-02-13T10:08:31.980669955Z" level=info msg="TearDown network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" successfully" Feb 13 10:08:31.981373 env[1474]: time="2024-02-13T10:08:31.980709868Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" returns successfully" Feb 13 10:08:31.981467 env[1474]: time="2024-02-13T10:08:31.981406543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-npfv4,Uid:3e331d8a-1c45-4abd-a1a9-e47f55bcb21d,Namespace:kube-system,Attempt:1,}" Feb 13 10:08:31.983092 systemd[1]: run-netns-cni\x2dd41891f1\x2d5437\x2d8749\x2d8d5d\x2dea4a12c3a0eb.mount: Deactivated successfully. Feb 13 10:08:32.057005 kubelet[2572]: I0213 10:08:32.056969 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-d9897" podStartSLOduration=2.145136895 podCreationTimestamp="2024-02-13 09:55:09 +0000 UTC" firstStartedPulling="2024-02-13 09:55:10.01008133 +0000 UTC m=+20.178865055" lastFinishedPulling="2024-02-13 10:08:30.921864212 +0000 UTC m=+821.090647938" observedRunningTime="2024-02-13 10:08:32.056671584 +0000 UTC m=+822.225455352" watchObservedRunningTime="2024-02-13 10:08:32.056919778 +0000 UTC m=+822.225703516" Feb 13 10:08:32.097546 systemd-networkd[1326]: cali74fa1aaa893: Link UP Feb 13 10:08:32.152742 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 10:08:32.152789 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali74fa1aaa893: link becomes ready Feb 13 10:08:32.152792 systemd-networkd[1326]: cali74fa1aaa893: Gained carrier Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.007 [INFO][10160] utils.go 100: File /var/lib/calico/mtu does not exist Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.020 [INFO][10160] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0 coredns-5dd5756b68- kube-system 3e331d8a-1c45-4abd-a1a9-e47f55bcb21d 2371 0 2024-02-13 09:55:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-0e431cd218 coredns-5dd5756b68-npfv4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali74fa1aaa893 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.020 [INFO][10160] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.050 [INFO][10182] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" HandleID="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.061 [INFO][10182] ipam_plugin.go 268: Auto assigning IP ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" HandleID="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d4610), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-0e431cd218", "pod":"coredns-5dd5756b68-npfv4", "timestamp":"2024-02-13 10:08:32.050269839 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0e431cd218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.061 [INFO][10182] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.061 [INFO][10182] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.062 [INFO][10182] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0e431cd218' Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.064 [INFO][10182] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.068 [INFO][10182] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.072 [INFO][10182] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.074 [INFO][10182] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.076 [INFO][10182] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.076 [INFO][10182] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.078 [INFO][10182] ipam.go 1682: Creating new handle: k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739 Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.082 [INFO][10182] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.086 [INFO][10182] ipam.go 1216: Successfully claimed IPs: [192.168.90.193/26] block=192.168.90.192/26 handle="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.087 [INFO][10182] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.193/26] handle="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.087 [INFO][10182] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:32.158653 env[1474]: 2024-02-13 10:08:32.087 [INFO][10182] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.193/26] IPv6=[] ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" HandleID="k8s-pod-network.1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.159201 env[1474]: 2024-02-13 10:08:32.090 [INFO][10160] k8s.go 385: Populated endpoint ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d", ResourceVersion:"2371", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"", Pod:"coredns-5dd5756b68-npfv4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali74fa1aaa893", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:32.159201 env[1474]: 2024-02-13 10:08:32.090 [INFO][10160] k8s.go 386: Calico CNI using IPs: [192.168.90.193/32] ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.159201 env[1474]: 2024-02-13 10:08:32.090 [INFO][10160] dataplane_linux.go 68: Setting the host side veth name to cali74fa1aaa893 ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.159201 env[1474]: 2024-02-13 10:08:32.152 [INFO][10160] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.159201 env[1474]: 2024-02-13 10:08:32.152 [INFO][10160] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d", ResourceVersion:"2371", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739", Pod:"coredns-5dd5756b68-npfv4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali74fa1aaa893", MAC:"02:42:9b:68:95:85", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:32.159201 env[1474]: 2024-02-13 10:08:32.157 [INFO][10160] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739" Namespace="kube-system" Pod="coredns-5dd5756b68-npfv4" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:32.164313 env[1474]: time="2024-02-13T10:08:32.164258501Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 10:08:32.164313 env[1474]: time="2024-02-13T10:08:32.164282610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 10:08:32.164313 env[1474]: time="2024-02-13T10:08:32.164293259Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 10:08:32.164431 env[1474]: time="2024-02-13T10:08:32.164365615Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739 pid=10246 runtime=io.containerd.runc.v2 Feb 13 10:08:32.170231 systemd[1]: Started cri-containerd-1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739.scope. Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.174000 audit: BPF prog-id=145 op=LOAD Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=10246 pid=10255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383761376532323863616264333437313863396364623161373537 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=10246 pid=10255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383761376532323863616264333437313863396364623161373537 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit: BPF prog-id=146 op=LOAD Feb 13 10:08:32.175000 audit[10255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221bc0 items=0 ppid=10246 pid=10255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383761376532323863616264333437313863396364623161373537 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit: BPF prog-id=147 op=LOAD Feb 13 10:08:32.175000 audit[10255]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221c08 items=0 ppid=10246 pid=10255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383761376532323863616264333437313863396364623161373537 Feb 13 10:08:32.175000 audit: BPF prog-id=147 op=UNLOAD Feb 13 10:08:32.175000 audit: BPF prog-id=146 op=UNLOAD Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { perfmon } for pid=10255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit[10255]: AVC avc: denied { bpf } for pid=10255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.175000 audit: BPF prog-id=148 op=LOAD Feb 13 10:08:32.175000 audit[10255]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000416018 items=0 ppid=10246 pid=10255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383761376532323863616264333437313863396364623161373537 Feb 13 10:08:32.192386 env[1474]: time="2024-02-13T10:08:32.192359327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-npfv4,Uid:3e331d8a-1c45-4abd-a1a9-e47f55bcb21d,Namespace:kube-system,Attempt:1,} returns sandbox id \"1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739\"" Feb 13 10:08:32.193525 env[1474]: time="2024-02-13T10:08:32.193511612Z" level=info msg="CreateContainer within sandbox \"1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 10:08:32.197540 env[1474]: time="2024-02-13T10:08:32.197493053Z" level=info msg="CreateContainer within sandbox \"1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ed1d73008382ec4ac6571f6dc15bbe6c5e7b8c6f279917f63caa102b47b1330a\"" Feb 13 10:08:32.197726 env[1474]: time="2024-02-13T10:08:32.197691488Z" level=info msg="StartContainer for \"ed1d73008382ec4ac6571f6dc15bbe6c5e7b8c6f279917f63caa102b47b1330a\"" Feb 13 10:08:32.204892 systemd[1]: Started cri-containerd-ed1d73008382ec4ac6571f6dc15bbe6c5e7b8c6f279917f63caa102b47b1330a.scope. Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.209000 audit: BPF prog-id=149 op=LOAD Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=10246 pid=10285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316437333030383338326563346163363537316636646331356262 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=10246 pid=10285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316437333030383338326563346163363537316636646331356262 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit: BPF prog-id=150 op=LOAD Feb 13 10:08:32.210000 audit[10285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032ea20 items=0 ppid=10246 pid=10285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316437333030383338326563346163363537316636646331356262 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit: BPF prog-id=151 op=LOAD Feb 13 10:08:32.210000 audit[10285]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ea68 items=0 ppid=10246 pid=10285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316437333030383338326563346163363537316636646331356262 Feb 13 10:08:32.210000 audit: BPF prog-id=151 op=UNLOAD Feb 13 10:08:32.210000 audit: BPF prog-id=150 op=UNLOAD Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { perfmon } for pid=10285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit[10285]: AVC avc: denied { bpf } for pid=10285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.210000 audit: BPF prog-id=152 op=LOAD Feb 13 10:08:32.210000 audit[10285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032ee78 items=0 ppid=10246 pid=10285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564316437333030383338326563346163363537316636646331356262 Feb 13 10:08:32.217527 env[1474]: time="2024-02-13T10:08:32.217501993Z" level=info msg="StartContainer for \"ed1d73008382ec4ac6571f6dc15bbe6c5e7b8c6f279917f63caa102b47b1330a\" returns successfully" Feb 13 10:08:32.629000 audit[10366]: AVC avc: denied { write } for pid=10366 comm="tee" name="fd" dev="proc" ino=57159 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10371]: AVC avc: denied { write } for pid=10371 comm="tee" name="fd" dev="proc" ino=70766 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10371]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0bf92971 a2=241 a3=1b6 items=1 ppid=10334 pid=10371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=62908 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.629000 audit[10366]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7bad6971 a2=241 a3=1b6 items=1 ppid=10335 pid=10366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=57156 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.629000 audit[10367]: AVC avc: denied { write } for pid=10367 comm="tee" name="fd" dev="proc" ino=62911 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10370]: AVC avc: denied { write } for pid=10370 comm="tee" name="fd" dev="proc" ino=61988 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10370]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6f10e972 a2=241 a3=1b6 items=1 ppid=10338 pid=10370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit[10367]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeca0de971 a2=241 a3=1b6 items=1 ppid=10332 pid=10367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=70763 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=61985 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.629000 audit[10376]: AVC avc: denied { write } for pid=10376 comm="tee" name="fd" dev="proc" ino=69735 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10376]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6eda4973 a2=241 a3=1b6 items=1 ppid=10337 pid=10376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=69732 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.629000 audit[10379]: AVC avc: denied { write } for pid=10379 comm="tee" name="fd" dev="proc" ino=54151 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10379]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0899e961 a2=241 a3=1b6 items=1 ppid=10333 pid=10379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=54148 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.629000 audit[10377]: AVC avc: denied { write } for pid=10377 comm="tee" name="fd" dev="proc" ino=64890 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 10:08:32.629000 audit[10377]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcefe04962 a2=241 a3=1b6 items=1 ppid=10336 pid=10377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.629000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 13 10:08:32.629000 audit: PATH item=0 name="/dev/fd/63" inode=56110 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 10:08:32.629000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit: BPF prog-id=153 op=LOAD Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb675a020 a2=70 a3=7ff8b5b3b000 items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.722000 audit: BPF prog-id=153 op=UNLOAD Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit: BPF prog-id=154 op=LOAD Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb675a020 a2=70 a3=6e items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.722000 audit: BPF prog-id=154 op=UNLOAD Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb6759fd0 a2=70 a3=7ffeb675a020 items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit: BPF prog-id=155 op=LOAD Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffeb6759fb0 a2=70 a3=7ffeb675a020 items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.722000 audit: BPF prog-id=155 op=UNLOAD Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb675a090 a2=70 a3=0 items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb675a080 a2=70 a3=0 items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.722000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.722000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffeb675a0c0 a2=70 a3=0 items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { perfmon } for pid=10505 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit[10505]: AVC avc: denied { bpf } for pid=10505 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.723000 audit: BPF prog-id=156 op=LOAD Feb 13 10:08:32.723000 audit[10505]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffeb6759fe0 a2=70 a3=ffffffff items=0 ppid=10343 pid=10505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.723000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 10:08:32.724000 audit[10509]: AVC avc: denied { bpf } for pid=10509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.724000 audit[10509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffe249430 a2=70 a3=fff80800 items=0 ppid=10343 pid=10509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 10:08:32.724000 audit[10509]: AVC avc: denied { bpf } for pid=10509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:32.724000 audit[10509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffffe249300 a2=70 a3=3 items=0 ppid=10343 pid=10509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.724000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 10:08:32.736000 audit: BPF prog-id=156 op=UNLOAD Feb 13 10:08:32.766000 audit[10566]: NETFILTER_CFG table=mangle:101 family=2 entries=19 op=nft_register_chain pid=10566 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:32.766000 audit[10566]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff0f576c30 a2=0 a3=7fff0f576c1c items=0 ppid=10343 pid=10566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.766000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:32.767000 audit[10564]: NETFILTER_CFG table=raw:102 family=2 entries=19 op=nft_register_chain pid=10564 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:32.767000 audit[10564]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc40349c10 a2=0 a3=5621436ad000 items=0 ppid=10343 pid=10564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.767000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:32.768000 audit[10565]: NETFILTER_CFG table=nat:103 family=2 entries=16 op=nft_register_chain pid=10565 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:32.768000 audit[10565]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff619667d0 a2=0 a3=557009678000 items=0 ppid=10343 pid=10565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:32.770000 audit[10569]: NETFILTER_CFG table=filter:104 family=2 entries=71 op=nft_register_chain pid=10569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:32.770000 audit[10569]: SYSCALL arch=c000003e syscall=46 success=yes exit=36636 a0=3 a1=7ffcd85f35c0 a2=0 a3=7ffcd85f35ac items=0 ppid=10343 pid=10569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:32.770000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:33.076864 kubelet[2572]: I0213 10:08:33.076787 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-npfv4" podStartSLOduration=810.076701993 podCreationTimestamp="2024-02-13 09:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 10:08:33.075128288 +0000 UTC m=+823.243912096" watchObservedRunningTime="2024-02-13 10:08:33.076701993 +0000 UTC m=+823.245485766" Feb 13 10:08:33.097000 audit[10582]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_rule pid=10582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:33.097000 audit[10582]: SYSCALL arch=c000003e syscall=46 success=yes exit=13404 a0=3 a1=7ffca28c35b0 a2=0 a3=7ffca28c359c items=0 ppid=2846 pid=10582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:33.097000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:33.099000 audit[10582]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=10582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:33.099000 audit[10582]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffca28c35b0 a2=0 a3=31030 items=0 ppid=2846 pid=10582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:33.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:33.128800 systemd[1]: Started sshd@213-139.178.70.11:22-5.135.90.165:58276.service. Feb 13 10:08:33.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@213-139.178.70.11:22-5.135.90.165:58276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:33.288209 sshd[10595]: Unable to negotiate with 5.135.90.165 port 58276: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:33.290075 systemd[1]: sshd@213-139.178.70.11:22-5.135.90.165:58276.service: Deactivated successfully. Feb 13 10:08:33.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@213-139.178.70.11:22-5.135.90.165:58276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:33.647158 systemd-networkd[1326]: cali74fa1aaa893: Gained IPv6LL Feb 13 10:08:33.718867 systemd-networkd[1326]: vxlan.calico: Link UP Feb 13 10:08:33.718884 systemd-networkd[1326]: vxlan.calico: Gained carrier Feb 13 10:08:33.886332 env[1474]: time="2024-02-13T10:08:33.886246988Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.956 [INFO][10624] k8s.go 578: Cleaning up netns ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.956 [INFO][10624] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" iface="eth0" netns="/var/run/netns/cni-e3119973-9fe9-cf23-b80c-af87183b0542" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.957 [INFO][10624] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" iface="eth0" netns="/var/run/netns/cni-e3119973-9fe9-cf23-b80c-af87183b0542" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.957 [INFO][10624] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" iface="eth0" netns="/var/run/netns/cni-e3119973-9fe9-cf23-b80c-af87183b0542" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.957 [INFO][10624] k8s.go 585: Releasing IP address(es) ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.957 [INFO][10624] utils.go 188: Calico CNI releasing IP address ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.980 [INFO][10637] ipam_plugin.go 415: Releasing address using handleID ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.980 [INFO][10637] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.981 [INFO][10637] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.990 [WARNING][10637] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.990 [INFO][10637] ipam_plugin.go 443: Releasing address using workloadID ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.992 [INFO][10637] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:33.995548 env[1474]: 2024-02-13 10:08:33.994 [INFO][10624] k8s.go 591: Teardown processing complete. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:33.996345 env[1474]: time="2024-02-13T10:08:33.995667458Z" level=info msg="TearDown network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" successfully" Feb 13 10:08:33.996345 env[1474]: time="2024-02-13T10:08:33.995714091Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" returns successfully" Feb 13 10:08:33.996607 env[1474]: time="2024-02-13T10:08:33.996541215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-p4vct,Uid:b217c7e3-c759-42d3-a900-2c8ca05116be,Namespace:kube-system,Attempt:1,}" Feb 13 10:08:33.999056 systemd[1]: run-netns-cni\x2de3119973\x2d9fe9\x2dcf23\x2db80c\x2daf87183b0542.mount: Deactivated successfully. Feb 13 10:08:34.074000 audit[10683]: NETFILTER_CFG table=filter:107 family=2 entries=35 op=nft_register_rule pid=10683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:34.074000 audit[10683]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe4fc30800 a2=0 a3=7ffe4fc307ec items=0 ppid=2846 pid=10683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.074000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:34.076000 audit[10683]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=10683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:34.076000 audit[10683]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffe4fc30800 a2=0 a3=7ffe4fc307ec items=0 ppid=2846 pid=10683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.076000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:34.152290 systemd-networkd[1326]: cali994dcf1ea49: Link UP Feb 13 10:08:34.217169 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 10:08:34.217213 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali994dcf1ea49: link becomes ready Feb 13 10:08:34.217296 systemd-networkd[1326]: cali994dcf1ea49: Gained carrier Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.056 [INFO][10654] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0 coredns-5dd5756b68- kube-system b217c7e3-c759-42d3-a900-2c8ca05116be 2385 0 2024-02-13 09:55:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-0e431cd218 coredns-5dd5756b68-p4vct eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali994dcf1ea49 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.056 [INFO][10654] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.090 [INFO][10677] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" HandleID="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.102 [INFO][10677] ipam_plugin.go 268: Auto assigning IP ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" HandleID="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051420), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-0e431cd218", "pod":"coredns-5dd5756b68-p4vct", "timestamp":"2024-02-13 10:08:34.090938952 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0e431cd218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.102 [INFO][10677] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.102 [INFO][10677] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.102 [INFO][10677] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0e431cd218' Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.104 [INFO][10677] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.108 [INFO][10677] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.115 [INFO][10677] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.119 [INFO][10677] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.124 [INFO][10677] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.124 [INFO][10677] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.128 [INFO][10677] ipam.go 1682: Creating new handle: k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.135 [INFO][10677] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.145 [INFO][10677] ipam.go 1216: Successfully claimed IPs: [192.168.90.194/26] block=192.168.90.192/26 handle="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.145 [INFO][10677] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.194/26] handle="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.145 [INFO][10677] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:34.222716 env[1474]: 2024-02-13 10:08:34.145 [INFO][10677] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.194/26] IPv6=[] ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" HandleID="k8s-pod-network.33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.223240 env[1474]: 2024-02-13 10:08:34.149 [INFO][10654] k8s.go 385: Populated endpoint ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b217c7e3-c759-42d3-a900-2c8ca05116be", ResourceVersion:"2385", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"", Pod:"coredns-5dd5756b68-p4vct", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali994dcf1ea49", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:34.223240 env[1474]: 2024-02-13 10:08:34.149 [INFO][10654] k8s.go 386: Calico CNI using IPs: [192.168.90.194/32] ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.223240 env[1474]: 2024-02-13 10:08:34.149 [INFO][10654] dataplane_linux.go 68: Setting the host side veth name to cali994dcf1ea49 ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.223240 env[1474]: 2024-02-13 10:08:34.217 [INFO][10654] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.223240 env[1474]: 2024-02-13 10:08:34.217 [INFO][10654] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b217c7e3-c759-42d3-a900-2c8ca05116be", ResourceVersion:"2385", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd", Pod:"coredns-5dd5756b68-p4vct", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali994dcf1ea49", MAC:"ce:fe:41:de:98:54", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:34.223240 env[1474]: 2024-02-13 10:08:34.221 [INFO][10654] k8s.go 491: Wrote updated endpoint to datastore ContainerID="33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd" Namespace="kube-system" Pod="coredns-5dd5756b68-p4vct" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:34.228626 env[1474]: time="2024-02-13T10:08:34.228565548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 10:08:34.228626 env[1474]: time="2024-02-13T10:08:34.228586883Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 10:08:34.228626 env[1474]: time="2024-02-13T10:08:34.228593417Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 10:08:34.228752 env[1474]: time="2024-02-13T10:08:34.228660978Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd pid=10715 runtime=io.containerd.runc.v2 Feb 13 10:08:34.227000 audit[10716]: NETFILTER_CFG table=filter:109 family=2 entries=30 op=nft_register_chain pid=10716 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:34.227000 audit[10716]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7ffc1547dfe0 a2=0 a3=7ffc1547dfcc items=0 ppid=10343 pid=10716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.227000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:34.235365 systemd[1]: Started cri-containerd-33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd.scope. Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit: BPF prog-id=157 op=LOAD Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=10715 pid=10725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630623333653266366636643165646139666333323563303730 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=10715 pid=10725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630623333653266366636643165646139666333323563303730 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.238000 audit: BPF prog-id=158 op=LOAD Feb 13 10:08:34.238000 audit[10725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021ead0 items=0 ppid=10715 pid=10725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.238000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630623333653266366636643165646139666333323563303730 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit: BPF prog-id=159 op=LOAD Feb 13 10:08:34.239000 audit[10725]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021eb18 items=0 ppid=10715 pid=10725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630623333653266366636643165646139666333323563303730 Feb 13 10:08:34.239000 audit: BPF prog-id=159 op=UNLOAD Feb 13 10:08:34.239000 audit: BPF prog-id=158 op=UNLOAD Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { perfmon } for pid=10725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit[10725]: AVC avc: denied { bpf } for pid=10725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.239000 audit: BPF prog-id=160 op=LOAD Feb 13 10:08:34.239000 audit[10725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021ef28 items=0 ppid=10715 pid=10725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383630623333653266366636643165646139666333323563303730 Feb 13 10:08:34.256616 env[1474]: time="2024-02-13T10:08:34.256551007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-p4vct,Uid:b217c7e3-c759-42d3-a900-2c8ca05116be,Namespace:kube-system,Attempt:1,} returns sandbox id \"33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd\"" Feb 13 10:08:34.257984 env[1474]: time="2024-02-13T10:08:34.257969060Z" level=info msg="CreateContainer within sandbox \"33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 10:08:34.262173 env[1474]: time="2024-02-13T10:08:34.262129534Z" level=info msg="CreateContainer within sandbox \"33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"aa3f0abd6766b31fe8df5a7da4bc9f4292b05f53554648ca70d8270473eafc62\"" Feb 13 10:08:34.262364 env[1474]: time="2024-02-13T10:08:34.262320837Z" level=info msg="StartContainer for \"aa3f0abd6766b31fe8df5a7da4bc9f4292b05f53554648ca70d8270473eafc62\"" Feb 13 10:08:34.269889 systemd[1]: Started cri-containerd-aa3f0abd6766b31fe8df5a7da4bc9f4292b05f53554648ca70d8270473eafc62.scope. Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit: BPF prog-id=161 op=LOAD Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=10715 pid=10757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336630616264363736366233316665386466356137646134626339 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=10715 pid=10757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336630616264363736366233316665386466356137646134626339 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.274000 audit: BPF prog-id=162 op=LOAD Feb 13 10:08:34.274000 audit[10757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000285c20 items=0 ppid=10715 pid=10757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336630616264363736366233316665386466356137646134626339 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit: BPF prog-id=163 op=LOAD Feb 13 10:08:34.275000 audit[10757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000285c68 items=0 ppid=10715 pid=10757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336630616264363736366233316665386466356137646134626339 Feb 13 10:08:34.275000 audit: BPF prog-id=163 op=UNLOAD Feb 13 10:08:34.275000 audit: BPF prog-id=162 op=UNLOAD Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { perfmon } for pid=10757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit[10757]: AVC avc: denied { bpf } for pid=10757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:34.275000 audit: BPF prog-id=164 op=LOAD Feb 13 10:08:34.275000 audit[10757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000414078 items=0 ppid=10715 pid=10757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:34.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161336630616264363736366233316665386466356137646134626339 Feb 13 10:08:34.282517 env[1474]: time="2024-02-13T10:08:34.282462291Z" level=info msg="StartContainer for \"aa3f0abd6766b31fe8df5a7da4bc9f4292b05f53554648ca70d8270473eafc62\" returns successfully" Feb 13 10:08:35.071060 kubelet[2572]: I0213 10:08:35.070960 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-p4vct" podStartSLOduration=812.070880424 podCreationTimestamp="2024-02-13 09:55:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-13 10:08:35.07007831 +0000 UTC m=+825.238862122" watchObservedRunningTime="2024-02-13 10:08:35.070880424 +0000 UTC m=+825.239664193" Feb 13 10:08:35.078000 audit[10805]: NETFILTER_CFG table=filter:110 family=2 entries=32 op=nft_register_rule pid=10805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:35.078000 audit[10805]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff45ec6870 a2=0 a3=7fff45ec685c items=0 ppid=2846 pid=10805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:35.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:35.101000 audit[10805]: NETFILTER_CFG table=nat:111 family=2 entries=44 op=nft_register_rule pid=10805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:35.101000 audit[10805]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff45ec6870 a2=0 a3=7fff45ec685c items=0 ppid=2846 pid=10805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:35.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:35.631193 systemd-networkd[1326]: vxlan.calico: Gained IPv6LL Feb 13 10:08:35.655052 systemd[1]: Started sshd@214-139.178.70.11:22-139.178.68.195:54468.service. Feb 13 10:08:35.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-139.178.70.11:22-139.178.68.195:54468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:35.681554 kernel: kauditd_printk_skb: 413 callbacks suppressed Feb 13 10:08:35.681616 kernel: audit: type=1130 audit(1707818915.653:2445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-139.178.70.11:22-139.178.68.195:54468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:35.694977 systemd-networkd[1326]: cali994dcf1ea49: Gained IPv6LL Feb 13 10:08:35.789000 audit[10807]: USER_ACCT pid=10807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.791372 sshd[10807]: Accepted publickey for core from 139.178.68.195 port 54468 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:35.795239 sshd[10807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:35.805119 systemd-logind[1462]: New session 99 of user core. Feb 13 10:08:35.807145 systemd[1]: Started session-99.scope. Feb 13 10:08:35.792000 audit[10807]: CRED_ACQ pid=10807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.891512 sshd[10807]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:35.893025 systemd[1]: sshd@214-139.178.70.11:22-139.178.68.195:54468.service: Deactivated successfully. Feb 13 10:08:35.893455 systemd[1]: session-99.scope: Deactivated successfully. Feb 13 10:08:35.893796 systemd-logind[1462]: Session 99 logged out. Waiting for processes to exit. Feb 13 10:08:35.894432 systemd-logind[1462]: Removed session 99. Feb 13 10:08:35.966138 kernel: audit: type=1101 audit(1707818915.789:2446): pid=10807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.966178 kernel: audit: type=1103 audit(1707818915.792:2447): pid=10807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.966196 kernel: audit: type=1006 audit(1707818915.792:2448): pid=10807 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=99 res=1 Feb 13 10:08:36.022206 kernel: audit: type=1300 audit(1707818915.792:2448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff18ed2110 a2=3 a3=0 items=0 ppid=1 pid=10807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=99 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:35.792000 audit[10807]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff18ed2110 a2=3 a3=0 items=0 ppid=1 pid=10807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=99 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:36.110922 kernel: audit: type=1327 audit(1707818915.792:2448): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:35.792000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:36.140482 kernel: audit: type=1105 audit(1707818915.813:2449): pid=10807 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.813000 audit[10807]: USER_START pid=10807 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:36.231996 kernel: audit: type=1103 audit(1707818915.815:2450): pid=10809 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.815000 audit[10809]: CRED_ACQ pid=10809 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:36.317389 kernel: audit: type=1106 audit(1707818915.890:2451): pid=10807 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.890000 audit[10807]: USER_END pid=10807 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:36.408925 kernel: audit: type=1104 audit(1707818915.890:2452): pid=10807 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.890000 audit[10807]: CRED_DISP pid=10807 uid=0 auid=500 ses=99 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:35.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@214-139.178.70.11:22-139.178.68.195:54468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:36.066000 audit[10835]: NETFILTER_CFG table=filter:112 family=2 entries=32 op=nft_register_rule pid=10835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:36.066000 audit[10835]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd1c930360 a2=0 a3=7ffd1c93034c items=0 ppid=2846 pid=10835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:36.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:36.407000 audit[10835]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=10835 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 10:08:36.407000 audit[10835]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffd1c930360 a2=0 a3=7ffd1c93034c items=0 ppid=2846 pid=10835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:36.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 10:08:36.886259 env[1474]: time="2024-02-13T10:08:36.886168236Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.922 [INFO][10854] k8s.go 578: Cleaning up netns ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.922 [INFO][10854] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" iface="eth0" netns="/var/run/netns/cni-aebc6754-1cb8-825d-48ac-1982e84938ae" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.922 [INFO][10854] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" iface="eth0" netns="/var/run/netns/cni-aebc6754-1cb8-825d-48ac-1982e84938ae" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.922 [INFO][10854] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" iface="eth0" netns="/var/run/netns/cni-aebc6754-1cb8-825d-48ac-1982e84938ae" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.922 [INFO][10854] k8s.go 585: Releasing IP address(es) ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.922 [INFO][10854] utils.go 188: Calico CNI releasing IP address ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.932 [INFO][10871] ipam_plugin.go 415: Releasing address using handleID ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.932 [INFO][10871] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.932 [INFO][10871] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.936 [WARNING][10871] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.936 [INFO][10871] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.937 [INFO][10871] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:36.939186 env[1474]: 2024-02-13 10:08:36.938 [INFO][10854] k8s.go 591: Teardown processing complete. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:36.939547 env[1474]: time="2024-02-13T10:08:36.939223082Z" level=info msg="TearDown network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" successfully" Feb 13 10:08:36.939547 env[1474]: time="2024-02-13T10:08:36.939247617Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" returns successfully" Feb 13 10:08:36.939653 env[1474]: time="2024-02-13T10:08:36.939639092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cdb6b9d57-v78qf,Uid:46bb237c-2abc-45ef-94ac-007ed36d6a43,Namespace:calico-system,Attempt:1,}" Feb 13 10:08:36.940602 systemd[1]: run-netns-cni\x2daebc6754\x2d1cb8\x2d825d\x2d48ac\x2d1982e84938ae.mount: Deactivated successfully. Feb 13 10:08:37.001857 systemd-networkd[1326]: calif9ba0ee5a05: Link UP Feb 13 10:08:37.055118 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 10:08:37.055163 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif9ba0ee5a05: link becomes ready Feb 13 10:08:37.055213 systemd-networkd[1326]: calif9ba0ee5a05: Gained carrier Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.961 [INFO][10884] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0 calico-kube-controllers-7cdb6b9d57- calico-system 46bb237c-2abc-45ef-94ac-007ed36d6a43 2410 0 2024-02-13 09:55:09 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7cdb6b9d57 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-0e431cd218 calico-kube-controllers-7cdb6b9d57-v78qf eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calif9ba0ee5a05 [] []}} ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.961 [INFO][10884] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.976 [INFO][10909] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" HandleID="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.983 [INFO][10909] ipam_plugin.go 268: Auto assigning IP ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" HandleID="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c1680), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-0e431cd218", "pod":"calico-kube-controllers-7cdb6b9d57-v78qf", "timestamp":"2024-02-13 10:08:36.976873021 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0e431cd218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.983 [INFO][10909] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.983 [INFO][10909] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.983 [INFO][10909] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0e431cd218' Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.984 [INFO][10909] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.988 [INFO][10909] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.990 [INFO][10909] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.992 [INFO][10909] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.993 [INFO][10909] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.993 [INFO][10909] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.994 [INFO][10909] ipam.go 1682: Creating new handle: k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9 Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.996 [INFO][10909] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.999 [INFO][10909] ipam.go 1216: Successfully claimed IPs: [192.168.90.195/26] block=192.168.90.192/26 handle="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.999 [INFO][10909] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.195/26] handle="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.999 [INFO][10909] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:37.061006 env[1474]: 2024-02-13 10:08:36.999 [INFO][10909] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.195/26] IPv6=[] ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" HandleID="k8s-pod-network.656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.061671 env[1474]: 2024-02-13 10:08:37.000 [INFO][10884] k8s.go 385: Populated endpoint ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0", GenerateName:"calico-kube-controllers-7cdb6b9d57-", Namespace:"calico-system", SelfLink:"", UID:"46bb237c-2abc-45ef-94ac-007ed36d6a43", ResourceVersion:"2410", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cdb6b9d57", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"", Pod:"calico-kube-controllers-7cdb6b9d57-v78qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ba0ee5a05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:37.061671 env[1474]: 2024-02-13 10:08:37.001 [INFO][10884] k8s.go 386: Calico CNI using IPs: [192.168.90.195/32] ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.061671 env[1474]: 2024-02-13 10:08:37.001 [INFO][10884] dataplane_linux.go 68: Setting the host side veth name to calif9ba0ee5a05 ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.061671 env[1474]: 2024-02-13 10:08:37.055 [INFO][10884] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.061671 env[1474]: 2024-02-13 10:08:37.055 [INFO][10884] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0", GenerateName:"calico-kube-controllers-7cdb6b9d57-", Namespace:"calico-system", SelfLink:"", UID:"46bb237c-2abc-45ef-94ac-007ed36d6a43", ResourceVersion:"2410", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cdb6b9d57", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9", Pod:"calico-kube-controllers-7cdb6b9d57-v78qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ba0ee5a05", MAC:"ea:e3:f0:26:b6:a7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:37.061671 env[1474]: 2024-02-13 10:08:37.060 [INFO][10884] k8s.go 491: Wrote updated endpoint to datastore ContainerID="656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9" Namespace="calico-system" Pod="calico-kube-controllers-7cdb6b9d57-v78qf" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:37.066784 env[1474]: time="2024-02-13T10:08:37.066749448Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 10:08:37.066784 env[1474]: time="2024-02-13T10:08:37.066771445Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 10:08:37.066784 env[1474]: time="2024-02-13T10:08:37.066778374Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 10:08:37.066924 env[1474]: time="2024-02-13T10:08:37.066839528Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9 pid=10947 runtime=io.containerd.runc.v2 Feb 13 10:08:37.067000 audit[10953]: NETFILTER_CFG table=filter:114 family=2 entries=44 op=nft_register_chain pid=10953 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:37.067000 audit[10953]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffc4da20af0 a2=0 a3=7ffc4da20adc items=0 ppid=10343 pid=10953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:37.067000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:37.073405 systemd[1]: Started cri-containerd-656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9.scope. Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit: BPF prog-id=165 op=LOAD Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=10947 pid=10959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:37.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366461343333613535633963303437663839653062386461306138 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=10947 pid=10959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:37.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366461343333613535633963303437663839653062386461306138 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.077000 audit: BPF prog-id=166 op=LOAD Feb 13 10:08:37.077000 audit[10959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000265d70 items=0 ppid=10947 pid=10959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:37.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366461343333613535633963303437663839653062386461306138 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit: BPF prog-id=167 op=LOAD Feb 13 10:08:37.078000 audit[10959]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000265db8 items=0 ppid=10947 pid=10959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:37.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366461343333613535633963303437663839653062386461306138 Feb 13 10:08:37.078000 audit: BPF prog-id=167 op=UNLOAD Feb 13 10:08:37.078000 audit: BPF prog-id=166 op=UNLOAD Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { perfmon } for pid=10959 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit[10959]: AVC avc: denied { bpf } for pid=10959 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:37.078000 audit: BPF prog-id=168 op=LOAD Feb 13 10:08:37.078000 audit[10959]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003de1c8 items=0 ppid=10947 pid=10959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:37.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366461343333613535633963303437663839653062386461306138 Feb 13 10:08:37.094598 env[1474]: time="2024-02-13T10:08:37.094572593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7cdb6b9d57-v78qf,Uid:46bb237c-2abc-45ef-94ac-007ed36d6a43,Namespace:calico-system,Attempt:1,} returns sandbox id \"656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9\"" Feb 13 10:08:37.095386 env[1474]: time="2024-02-13T10:08:37.095371988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 13 10:08:38.255224 systemd-networkd[1326]: calif9ba0ee5a05: Gained IPv6LL Feb 13 10:08:39.721611 systemd[1]: Started sshd@215-139.178.70.11:22-5.135.90.165:54284.service. Feb 13 10:08:39.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@215-139.178.70.11:22-5.135.90.165:54284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:39.920425 sshd[10991]: Unable to negotiate with 5.135.90.165 port 54284: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:39.922239 systemd[1]: sshd@215-139.178.70.11:22-5.135.90.165:54284.service: Deactivated successfully. Feb 13 10:08:39.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@215-139.178.70.11:22-5.135.90.165:54284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:40.886077 env[1474]: time="2024-02-13T10:08:40.885941291Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:40.901111 systemd[1]: Started sshd@216-139.178.70.11:22-139.178.68.195:49672.service. Feb 13 10:08:40.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@216-139.178.70.11:22-139.178.68.195:49672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:40.926061 kernel: kauditd_printk_skb: 69 callbacks suppressed Feb 13 10:08:40.926135 kernel: audit: type=1130 audit(1707818920.900:2477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@216-139.178.70.11:22-139.178.68.195:49672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.920 [INFO][11011] k8s.go 578: Cleaning up netns ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.920 [INFO][11011] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" iface="eth0" netns="/var/run/netns/cni-331b34be-81b2-6476-2988-00ca7798ddb5" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.920 [INFO][11011] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" iface="eth0" netns="/var/run/netns/cni-331b34be-81b2-6476-2988-00ca7798ddb5" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.920 [INFO][11011] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" iface="eth0" netns="/var/run/netns/cni-331b34be-81b2-6476-2988-00ca7798ddb5" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.920 [INFO][11011] k8s.go 585: Releasing IP address(es) ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.920 [INFO][11011] utils.go 188: Calico CNI releasing IP address ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.929 [INFO][11028] ipam_plugin.go 415: Releasing address using handleID ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.929 [INFO][11028] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.929 [INFO][11028] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.934 [WARNING][11028] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.934 [INFO][11028] ipam_plugin.go 443: Releasing address using workloadID ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.936 [INFO][11028] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:41.011201 env[1474]: 2024-02-13 10:08:40.936 [INFO][11011] k8s.go 591: Teardown processing complete. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:41.011536 env[1474]: time="2024-02-13T10:08:41.011242716Z" level=info msg="TearDown network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" successfully" Feb 13 10:08:41.011536 env[1474]: time="2024-02-13T10:08:41.011263860Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" returns successfully" Feb 13 10:08:41.011624 env[1474]: time="2024-02-13T10:08:41.011611846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w8rcv,Uid:25321284-19a1-4fad-84b5-db985c324966,Namespace:calico-system,Attempt:1,}" Feb 13 10:08:41.012663 systemd[1]: run-netns-cni\x2d331b34be\x2d81b2\x2d6476\x2d2988\x2d00ca7798ddb5.mount: Deactivated successfully. Feb 13 10:08:41.031000 audit[11016]: USER_ACCT pid=11016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.032688 sshd[11016]: Accepted publickey for core from 139.178.68.195 port 49672 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:41.034111 sshd[11016]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:41.036332 systemd-logind[1462]: New session 100 of user core. Feb 13 10:08:41.036926 systemd[1]: Started session-100.scope. Feb 13 10:08:41.033000 audit[11016]: CRED_ACQ pid=11016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.205471 kernel: audit: type=1101 audit(1707818921.031:2478): pid=11016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.205575 kernel: audit: type=1103 audit(1707818921.033:2479): pid=11016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.205597 kernel: audit: type=1006 audit(1707818921.033:2480): pid=11016 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=100 res=1 Feb 13 10:08:41.033000 audit[11016]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d7d0d50 a2=3 a3=0 items=0 ppid=1 pid=11016 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=100 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.349331 kernel: audit: type=1300 audit(1707818921.033:2480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3d7d0d50 a2=3 a3=0 items=0 ppid=1 pid=11016 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=100 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.349406 kernel: audit: type=1327 audit(1707818921.033:2480): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:41.033000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:41.350125 systemd-networkd[1326]: calib7164950128: Link UP Feb 13 10:08:41.348000 audit[11016]: USER_START pid=11016 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.406041 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 10:08:41.406068 kernel: audit: type=1105 audit(1707818921.348:2481): pid=11016 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.406088 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib7164950128: link becomes ready Feb 13 10:08:41.527000 audit[11084]: CRED_ACQ pid=11084 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.528303 systemd-networkd[1326]: calib7164950128: Gained carrier Feb 13 10:08:41.528859 kernel: audit: type=1103 audit(1707818921.527:2482): pid=11084 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.031 [INFO][11044] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0 csi-node-driver- calico-system 25321284-19a1-4fad-84b5-db985c324966 2422 0 2024-02-13 09:55:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-0e431cd218 csi-node-driver-w8rcv eth0 default [] [] [kns.calico-system ksa.calico-system.default] calib7164950128 [] []}} ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.031 [INFO][11044] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.045 [INFO][11066] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" HandleID="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.052 [INFO][11066] ipam_plugin.go 268: Auto assigning IP ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" HandleID="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00073b390), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-0e431cd218", "pod":"csi-node-driver-w8rcv", "timestamp":"2024-02-13 10:08:41.045457698 +0000 UTC"}, Hostname:"ci-3510.3.2-a-0e431cd218", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.052 [INFO][11066] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.052 [INFO][11066] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.052 [INFO][11066] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-0e431cd218' Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.053 [INFO][11066] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.056 [INFO][11066] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.058 [INFO][11066] ipam.go 489: Trying affinity for 192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.060 [INFO][11066] ipam.go 155: Attempting to load block cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.061 [INFO][11066] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.90.192/26 host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.061 [INFO][11066] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.90.192/26 handle="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.062 [INFO][11066] ipam.go 1682: Creating new handle: k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.064 [INFO][11066] ipam.go 1203: Writing block in order to claim IPs block=192.168.90.192/26 handle="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.067 [INFO][11066] ipam.go 1216: Successfully claimed IPs: [192.168.90.196/26] block=192.168.90.192/26 handle="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.067 [INFO][11066] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.90.196/26] handle="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" host="ci-3510.3.2-a-0e431cd218" Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.067 [INFO][11066] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:41.534997 env[1474]: 2024-02-13 10:08:41.067 [INFO][11066] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.90.196/26] IPv6=[] ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" HandleID="k8s-pod-network.f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.535593 env[1474]: 2024-02-13 10:08:41.068 [INFO][11044] k8s.go 385: Populated endpoint ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"25321284-19a1-4fad-84b5-db985c324966", ResourceVersion:"2422", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"", Pod:"csi-node-driver-w8rcv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib7164950128", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:41.535593 env[1474]: 2024-02-13 10:08:41.068 [INFO][11044] k8s.go 386: Calico CNI using IPs: [192.168.90.196/32] ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.535593 env[1474]: 2024-02-13 10:08:41.068 [INFO][11044] dataplane_linux.go 68: Setting the host side veth name to calib7164950128 ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.535593 env[1474]: 2024-02-13 10:08:41.528 [INFO][11044] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.535593 env[1474]: 2024-02-13 10:08:41.528 [INFO][11044] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"25321284-19a1-4fad-84b5-db985c324966", ResourceVersion:"2422", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f", Pod:"csi-node-driver-w8rcv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib7164950128", MAC:"46:28:b6:a6:0b:74", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:41.535593 env[1474]: 2024-02-13 10:08:41.533 [INFO][11044] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f" Namespace="calico-system" Pod="csi-node-driver-w8rcv" WorkloadEndpoint="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:41.541496 env[1474]: time="2024-02-13T10:08:41.541428272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 10:08:41.541496 env[1474]: time="2024-02-13T10:08:41.541450351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 10:08:41.541496 env[1474]: time="2024-02-13T10:08:41.541457065Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 10:08:41.541630 env[1474]: time="2024-02-13T10:08:41.541514985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f pid=11108 runtime=io.containerd.runc.v2 Feb 13 10:08:41.548138 systemd[1]: Started cri-containerd-f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f.scope. Feb 13 10:08:41.603170 sshd[11016]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:41.604571 systemd[1]: sshd@216-139.178.70.11:22-139.178.68.195:49672.service: Deactivated successfully. Feb 13 10:08:41.605030 systemd[1]: session-100.scope: Deactivated successfully. Feb 13 10:08:41.605450 systemd-logind[1462]: Session 100 logged out. Waiting for processes to exit. Feb 13 10:08:41.605927 systemd-logind[1462]: Removed session 100. Feb 13 10:08:41.542000 audit[11116]: NETFILTER_CFG table=filter:115 family=2 entries=42 op=nft_register_chain pid=11116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:41.674093 kernel: audit: type=1325 audit(1707818921.542:2483): table=filter:115 family=2 entries=42 op=nft_register_chain pid=11116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 10:08:41.674151 kernel: audit: type=1300 audit(1707818921.542:2483): arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffecb089f40 a2=0 a3=7ffecb089f2c items=0 ppid=10343 pid=11116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.542000 audit[11116]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffecb089f40 a2=0 a3=7ffecb089f2c items=0 ppid=10343 pid=11116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.542000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 10:08:41.602000 audit[11016]: USER_END pid=11016 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.603000 audit[11016]: CRED_DISP pid=11016 uid=0 auid=500 ses=100 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:41.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@216-139.178.70.11:22-139.178.68.195:49672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit: BPF prog-id=169 op=LOAD Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=11108 pid=11120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333566663636336635343033666330396439376265646436313933 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=11108 pid=11120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333566663636336635343033666330396439376265646436313933 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit: BPF prog-id=170 op=LOAD Feb 13 10:08:41.769000 audit[11120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000edd70 items=0 ppid=11108 pid=11120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333566663636336635343033666330396439376265646436313933 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit: BPF prog-id=171 op=LOAD Feb 13 10:08:41.769000 audit[11120]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000eddb8 items=0 ppid=11108 pid=11120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333566663636336635343033666330396439376265646436313933 Feb 13 10:08:41.769000 audit: BPF prog-id=171 op=UNLOAD Feb 13 10:08:41.769000 audit: BPF prog-id=170 op=UNLOAD Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { perfmon } for pid=11120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit[11120]: AVC avc: denied { bpf } for pid=11120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:41.769000 audit: BPF prog-id=172 op=LOAD Feb 13 10:08:41.769000 audit[11120]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003461c8 items=0 ppid=11108 pid=11120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:41.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333566663636336635343033666330396439376265646436313933 Feb 13 10:08:41.775521 env[1474]: time="2024-02-13T10:08:41.775491253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w8rcv,Uid:25321284-19a1-4fad-84b5-db985c324966,Namespace:calico-system,Attempt:1,} returns sandbox id \"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f\"" Feb 13 10:08:42.863165 systemd-networkd[1326]: calib7164950128: Gained IPv6LL Feb 13 10:08:45.970082 systemd[1]: Started sshd@217-139.178.70.11:22-5.135.90.165:50310.service. Feb 13 10:08:45.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@217-139.178.70.11:22-5.135.90.165:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:45.996671 kernel: kauditd_printk_skb: 61 callbacks suppressed Feb 13 10:08:45.996756 kernel: audit: type=1130 audit(1707818925.969:2505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@217-139.178.70.11:22-5.135.90.165:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:46.127469 sshd[11195]: Unable to negotiate with 5.135.90.165 port 50310: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:46.127981 systemd[1]: sshd@217-139.178.70.11:22-5.135.90.165:50310.service: Deactivated successfully. Feb 13 10:08:46.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@217-139.178.70.11:22-5.135.90.165:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:46.215909 kernel: audit: type=1131 audit(1707818926.127:2506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@217-139.178.70.11:22-5.135.90.165:50310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:46.215000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.215000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009e8b40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:46.424393 kernel: audit: type=1400 audit(1707818926.215:2507): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.424469 kernel: audit: type=1300 audit(1707818926.215:2507): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009e8b40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:46.424483 kernel: audit: type=1327 audit(1707818926.215:2507): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:46.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:46.516053 kernel: audit: type=1400 audit(1707818926.215:2508): avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.215000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.215000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a78480 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:46.727259 kernel: audit: type=1300 audit(1707818926.215:2508): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a78480 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:46.727314 kernel: audit: type=1327 audit(1707818926.215:2508): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:46.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:46.729727 systemd[1]: Started sshd@218-139.178.70.11:22-139.178.68.195:47068.service. Feb 13 10:08:46.730559 systemd[1]: Starting systemd-tmpfiles-clean.service... Feb 13 10:08:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.825970 systemd-tmpfiles[11200]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 10:08:46.826193 systemd-tmpfiles[11200]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 10:08:46.826868 systemd-tmpfiles[11200]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 10:08:46.837304 systemd[1]: systemd-tmpfiles-clean.service: Deactivated successfully. Feb 13 10:08:46.837408 systemd[1]: Finished systemd-tmpfiles-clean.service. Feb 13 10:08:46.910939 kernel: audit: type=1400 audit(1707818926.475:2509): avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.910997 kernel: audit: type=1300 audit(1707818926.475:2509): arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a98e8e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00a98e8e0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.912430 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dclean.service.mount: Deactivated successfully. Feb 13 10:08:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:08:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00c2c4960 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:08:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00c1306f0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:08:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00ca62240 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:08:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c008786f20 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:08:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00c2c4ab0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:08:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:08:46.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@218-139.178.70.11:22-139.178.68.195:47068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:46.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:46.836000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-clean comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:47.029000 audit[11199]: USER_ACCT pid=11199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:47.030759 sshd[11199]: Accepted publickey for core from 139.178.68.195 port 47068 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:47.030000 audit[11199]: CRED_ACQ pid=11199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:47.030000 audit[11199]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc40b4ced0 a2=3 a3=0 items=0 ppid=1 pid=11199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=101 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:47.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:47.031468 sshd[11199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:47.033519 systemd-logind[1462]: New session 101 of user core. Feb 13 10:08:47.034286 systemd[1]: Started session-101.scope. Feb 13 10:08:47.035000 audit[11199]: USER_START pid=11199 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:47.036000 audit[11205]: CRED_ACQ pid=11205 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:47.112510 sshd[11199]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:47.112000 audit[11199]: USER_END pid=11199 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:47.112000 audit[11199]: CRED_DISP pid=11199 uid=0 auid=500 ses=101 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:47.113961 systemd[1]: sshd@218-139.178.70.11:22-139.178.68.195:47068.service: Deactivated successfully. Feb 13 10:08:47.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@218-139.178.70.11:22-139.178.68.195:47068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:47.114441 systemd[1]: session-101.scope: Deactivated successfully. Feb 13 10:08:47.114782 systemd-logind[1462]: Session 101 logged out. Waiting for processes to exit. Feb 13 10:08:47.115364 systemd-logind[1462]: Removed session 101. Feb 13 10:08:49.271900 env[1474]: time="2024-02-13T10:08:49.271854180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:49.272656 env[1474]: time="2024-02-13T10:08:49.272643621Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:49.274255 env[1474]: time="2024-02-13T10:08:49.274244134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:49.275427 env[1474]: time="2024-02-13T10:08:49.275400877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:08:49.276069 env[1474]: time="2024-02-13T10:08:49.276027220Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 13 10:08:49.276627 env[1474]: time="2024-02-13T10:08:49.276600458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 13 10:08:49.280472 env[1474]: time="2024-02-13T10:08:49.280452286Z" level=info msg="CreateContainer within sandbox \"656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 13 10:08:49.285337 env[1474]: time="2024-02-13T10:08:49.285313457Z" level=info msg="CreateContainer within sandbox \"656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9097b0216ea038b21639e15874f2cc094d6607c57ec5fdad1d25b17f9ce51a22\"" Feb 13 10:08:49.285728 env[1474]: time="2024-02-13T10:08:49.285713483Z" level=info msg="StartContainer for \"9097b0216ea038b21639e15874f2cc094d6607c57ec5fdad1d25b17f9ce51a22\"" Feb 13 10:08:49.294256 systemd[1]: Started cri-containerd-9097b0216ea038b21639e15874f2cc094d6607c57ec5fdad1d25b17f9ce51a22.scope. Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.300000 audit: BPF prog-id=173 op=LOAD Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=10947 pid=11235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:49.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393762303231366561303338623231363339653135383734663263 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=10947 pid=11235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:49.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393762303231366561303338623231363339653135383734663263 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit: BPF prog-id=174 op=LOAD Feb 13 10:08:49.301000 audit[11235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000331b80 items=0 ppid=10947 pid=11235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:49.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393762303231366561303338623231363339653135383734663263 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit: BPF prog-id=175 op=LOAD Feb 13 10:08:49.301000 audit[11235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000331bc8 items=0 ppid=10947 pid=11235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:49.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393762303231366561303338623231363339653135383734663263 Feb 13 10:08:49.301000 audit: BPF prog-id=175 op=UNLOAD Feb 13 10:08:49.301000 audit: BPF prog-id=174 op=UNLOAD Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { perfmon } for pid=11235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit[11235]: AVC avc: denied { bpf } for pid=11235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:08:49.301000 audit: BPF prog-id=176 op=LOAD Feb 13 10:08:49.301000 audit[11235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000331fd8 items=0 ppid=10947 pid=11235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:49.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930393762303231366561303338623231363339653135383734663263 Feb 13 10:08:49.319194 env[1474]: time="2024-02-13T10:08:49.319163797Z" level=info msg="StartContainer for \"9097b0216ea038b21639e15874f2cc094d6607c57ec5fdad1d25b17f9ce51a22\" returns successfully" Feb 13 10:08:49.906724 env[1474]: time="2024-02-13T10:08:49.906647176Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.966 [WARNING][11293] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b217c7e3-c759-42d3-a900-2c8ca05116be", ResourceVersion:"2404", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd", Pod:"coredns-5dd5756b68-p4vct", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali994dcf1ea49", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.966 [INFO][11293] k8s.go 578: Cleaning up netns ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.966 [INFO][11293] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" iface="eth0" netns="" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.966 [INFO][11293] k8s.go 585: Releasing IP address(es) ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.966 [INFO][11293] utils.go 188: Calico CNI releasing IP address ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.982 [INFO][11311] ipam_plugin.go 415: Releasing address using handleID ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.982 [INFO][11311] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.982 [INFO][11311] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.989 [WARNING][11311] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.989 [INFO][11311] ipam_plugin.go 443: Releasing address using workloadID ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.990 [INFO][11311] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:49.993265 env[1474]: 2024-02-13 10:08:49.992 [INFO][11293] k8s.go 591: Teardown processing complete. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:49.993855 env[1474]: time="2024-02-13T10:08:49.993271124Z" level=info msg="TearDown network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" successfully" Feb 13 10:08:49.993855 env[1474]: time="2024-02-13T10:08:49.993311910Z" level=info msg="StopPodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" returns successfully" Feb 13 10:08:49.993855 env[1474]: time="2024-02-13T10:08:49.993778661Z" level=info msg="RemovePodSandbox for \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:08:49.993855 env[1474]: time="2024-02-13T10:08:49.993812919Z" level=info msg="Forcibly stopping sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\"" Feb 13 10:08:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a79600 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e141e0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002a79620 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:50.043000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:08:50.043000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000e78c20 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:08:50.043000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.023 [WARNING][11341] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"b217c7e3-c759-42d3-a900-2c8ca05116be", ResourceVersion:"2404", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"33860b33e2f6f6d1eda9fc325c070fefa690a59f127375b8f70545dad639bebd", Pod:"coredns-5dd5756b68-p4vct", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali994dcf1ea49", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.023 [INFO][11341] k8s.go 578: Cleaning up netns ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.024 [INFO][11341] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" iface="eth0" netns="" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.024 [INFO][11341] k8s.go 585: Releasing IP address(es) ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.024 [INFO][11341] utils.go 188: Calico CNI releasing IP address ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.040 [INFO][11357] ipam_plugin.go 415: Releasing address using handleID ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.040 [INFO][11357] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.040 [INFO][11357] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.047 [WARNING][11357] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.047 [INFO][11357] ipam_plugin.go 443: Releasing address using workloadID ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" HandleID="k8s-pod-network.59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--p4vct-eth0" Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.048 [INFO][11357] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.050579 env[1474]: 2024-02-13 10:08:50.049 [INFO][11341] k8s.go 591: Teardown processing complete. ContainerID="59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1" Feb 13 10:08:50.051262 env[1474]: time="2024-02-13T10:08:50.050604032Z" level=info msg="TearDown network for sandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" successfully" Feb 13 10:08:50.053067 env[1474]: time="2024-02-13T10:08:50.053016962Z" level=info msg="RemovePodSandbox \"59d4273497f53b463f1d1c2e4bdb6bc075b26f37c93ed1b39c3fcdbbfc5ae9a1\" returns successfully" Feb 13 10:08:50.053480 env[1474]: time="2024-02-13T10:08:50.053431488Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:08:50.104742 kubelet[2572]: I0213 10:08:50.104690 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7cdb6b9d57-v78qf" podStartSLOduration=808.923502826 podCreationTimestamp="2024-02-13 09:55:09 +0000 UTC" firstStartedPulling="2024-02-13 10:08:37.095214814 +0000 UTC m=+827.263998540" lastFinishedPulling="2024-02-13 10:08:49.276340698 +0000 UTC m=+839.445124423" observedRunningTime="2024-02-13 10:08:50.103572433 +0000 UTC m=+840.272356194" watchObservedRunningTime="2024-02-13 10:08:50.104628709 +0000 UTC m=+840.273412444" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.083 [WARNING][11385] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d", ResourceVersion:"2388", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739", Pod:"coredns-5dd5756b68-npfv4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali74fa1aaa893", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.084 [INFO][11385] k8s.go 578: Cleaning up netns ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.084 [INFO][11385] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" iface="eth0" netns="" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.084 [INFO][11385] k8s.go 585: Releasing IP address(es) ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.084 [INFO][11385] utils.go 188: Calico CNI releasing IP address ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.104 [INFO][11403] ipam_plugin.go 415: Releasing address using handleID ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.104 [INFO][11403] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.105 [INFO][11403] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.113 [WARNING][11403] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.113 [INFO][11403] ipam_plugin.go 443: Releasing address using workloadID ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.114 [INFO][11403] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.116650 env[1474]: 2024-02-13 10:08:50.115 [INFO][11385] k8s.go 591: Teardown processing complete. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.117203 env[1474]: time="2024-02-13T10:08:50.116688470Z" level=info msg="TearDown network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" successfully" Feb 13 10:08:50.117203 env[1474]: time="2024-02-13T10:08:50.116732146Z" level=info msg="StopPodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" returns successfully" Feb 13 10:08:50.117203 env[1474]: time="2024-02-13T10:08:50.117129541Z" level=info msg="RemovePodSandbox for \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:08:50.117203 env[1474]: time="2024-02-13T10:08:50.117166237Z" level=info msg="Forcibly stopping sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\"" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.144 [WARNING][11451] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"3e331d8a-1c45-4abd-a1a9-e47f55bcb21d", ResourceVersion:"2388", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"1e87a7e228cabd34718c9cdb1a7570b8240bae2126c1c44aba7586ee49b09739", Pod:"coredns-5dd5756b68-npfv4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.90.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali74fa1aaa893", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.144 [INFO][11451] k8s.go 578: Cleaning up netns ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.144 [INFO][11451] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" iface="eth0" netns="" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.144 [INFO][11451] k8s.go 585: Releasing IP address(es) ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.144 [INFO][11451] utils.go 188: Calico CNI releasing IP address ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.158 [INFO][11475] ipam_plugin.go 415: Releasing address using handleID ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.158 [INFO][11475] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.158 [INFO][11475] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.163 [WARNING][11475] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.163 [INFO][11475] ipam_plugin.go 443: Releasing address using workloadID ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" HandleID="k8s-pod-network.89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Workload="ci--3510.3.2--a--0e431cd218-k8s-coredns--5dd5756b68--npfv4-eth0" Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.164 [INFO][11475] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.166360 env[1474]: 2024-02-13 10:08:50.165 [INFO][11451] k8s.go 591: Teardown processing complete. ContainerID="89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c" Feb 13 10:08:50.166360 env[1474]: time="2024-02-13T10:08:50.166302060Z" level=info msg="TearDown network for sandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" successfully" Feb 13 10:08:50.167937 env[1474]: time="2024-02-13T10:08:50.167920035Z" level=info msg="RemovePodSandbox \"89cf3e80abe00cf8eda3b64f2cd3368d7fc34198bb255ba0ec1a3cdfb83cfc9c\" returns successfully" Feb 13 10:08:50.168228 env[1474]: time="2024-02-13T10:08:50.168212994Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.191 [WARNING][11503] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"25321284-19a1-4fad-84b5-db985c324966", ResourceVersion:"2426", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f", Pod:"csi-node-driver-w8rcv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib7164950128", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.192 [INFO][11503] k8s.go 578: Cleaning up netns ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.192 [INFO][11503] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" iface="eth0" netns="" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.192 [INFO][11503] k8s.go 585: Releasing IP address(es) ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.192 [INFO][11503] utils.go 188: Calico CNI releasing IP address ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.204 [INFO][11519] ipam_plugin.go 415: Releasing address using handleID ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.204 [INFO][11519] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.204 [INFO][11519] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.210 [WARNING][11519] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.210 [INFO][11519] ipam_plugin.go 443: Releasing address using workloadID ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.211 [INFO][11519] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.213098 env[1474]: 2024-02-13 10:08:50.212 [INFO][11503] k8s.go 591: Teardown processing complete. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.213098 env[1474]: time="2024-02-13T10:08:50.213088592Z" level=info msg="TearDown network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" successfully" Feb 13 10:08:50.213555 env[1474]: time="2024-02-13T10:08:50.213111506Z" level=info msg="StopPodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" returns successfully" Feb 13 10:08:50.213555 env[1474]: time="2024-02-13T10:08:50.213471896Z" level=info msg="RemovePodSandbox for \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:50.213555 env[1474]: time="2024-02-13T10:08:50.213495109Z" level=info msg="Forcibly stopping sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\"" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.241 [WARNING][11548] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"25321284-19a1-4fad-84b5-db985c324966", ResourceVersion:"2426", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f", Pod:"csi-node-driver-w8rcv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.90.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calib7164950128", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.242 [INFO][11548] k8s.go 578: Cleaning up netns ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.242 [INFO][11548] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" iface="eth0" netns="" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.242 [INFO][11548] k8s.go 585: Releasing IP address(es) ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.242 [INFO][11548] utils.go 188: Calico CNI releasing IP address ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.283 [INFO][11563] ipam_plugin.go 415: Releasing address using handleID ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.283 [INFO][11563] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.283 [INFO][11563] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.294 [WARNING][11563] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.294 [INFO][11563] ipam_plugin.go 443: Releasing address using workloadID ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" HandleID="k8s-pod-network.99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Workload="ci--3510.3.2--a--0e431cd218-k8s-csi--node--driver--w8rcv-eth0" Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.296 [INFO][11563] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.300275 env[1474]: 2024-02-13 10:08:50.298 [INFO][11548] k8s.go 591: Teardown processing complete. ContainerID="99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f" Feb 13 10:08:50.301647 env[1474]: time="2024-02-13T10:08:50.300320829Z" level=info msg="TearDown network for sandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" successfully" Feb 13 10:08:50.303919 env[1474]: time="2024-02-13T10:08:50.303872683Z" level=info msg="RemovePodSandbox \"99e280ab33e88a83f4d9ebd5efc6156013b9eacabc4983add4db3ea67faf5f2f\" returns successfully" Feb 13 10:08:50.304552 env[1474]: time="2024-02-13T10:08:50.304513621Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.356 [WARNING][11595] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0", GenerateName:"calico-kube-controllers-7cdb6b9d57-", Namespace:"calico-system", SelfLink:"", UID:"46bb237c-2abc-45ef-94ac-007ed36d6a43", ResourceVersion:"2459", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cdb6b9d57", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9", Pod:"calico-kube-controllers-7cdb6b9d57-v78qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ba0ee5a05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.357 [INFO][11595] k8s.go 578: Cleaning up netns ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.357 [INFO][11595] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" iface="eth0" netns="" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.357 [INFO][11595] k8s.go 585: Releasing IP address(es) ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.357 [INFO][11595] utils.go 188: Calico CNI releasing IP address ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.380 [INFO][11612] ipam_plugin.go 415: Releasing address using handleID ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.380 [INFO][11612] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.380 [INFO][11612] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.390 [WARNING][11612] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.390 [INFO][11612] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.392 [INFO][11612] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.395182 env[1474]: 2024-02-13 10:08:50.393 [INFO][11595] k8s.go 591: Teardown processing complete. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.396058 env[1474]: time="2024-02-13T10:08:50.395213338Z" level=info msg="TearDown network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" successfully" Feb 13 10:08:50.396058 env[1474]: time="2024-02-13T10:08:50.395253765Z" level=info msg="StopPodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" returns successfully" Feb 13 10:08:50.396058 env[1474]: time="2024-02-13T10:08:50.395809615Z" level=info msg="RemovePodSandbox for \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:08:50.396058 env[1474]: time="2024-02-13T10:08:50.395871690Z" level=info msg="Forcibly stopping sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\"" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.440 [WARNING][11646] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0", GenerateName:"calico-kube-controllers-7cdb6b9d57-", Namespace:"calico-system", SelfLink:"", UID:"46bb237c-2abc-45ef-94ac-007ed36d6a43", ResourceVersion:"2459", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 9, 55, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7cdb6b9d57", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-0e431cd218", ContainerID:"656da433a55c9c047f89e0b8da0a899821b424b94d21abef9ec4876a6069ddb9", Pod:"calico-kube-controllers-7cdb6b9d57-v78qf", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.90.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calif9ba0ee5a05", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.440 [INFO][11646] k8s.go 578: Cleaning up netns ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.440 [INFO][11646] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" iface="eth0" netns="" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.440 [INFO][11646] k8s.go 585: Releasing IP address(es) ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.440 [INFO][11646] utils.go 188: Calico CNI releasing IP address ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.466 [INFO][11664] ipam_plugin.go 415: Releasing address using handleID ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.466 [INFO][11664] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.466 [INFO][11664] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.475 [WARNING][11664] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.475 [INFO][11664] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" HandleID="k8s-pod-network.3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Workload="ci--3510.3.2--a--0e431cd218-k8s-calico--kube--controllers--7cdb6b9d57--v78qf-eth0" Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.477 [INFO][11664] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 10:08:50.480446 env[1474]: 2024-02-13 10:08:50.478 [INFO][11646] k8s.go 591: Teardown processing complete. ContainerID="3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace" Feb 13 10:08:50.480446 env[1474]: time="2024-02-13T10:08:50.480411365Z" level=info msg="TearDown network for sandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" successfully" Feb 13 10:08:50.483283 env[1474]: time="2024-02-13T10:08:50.483246949Z" level=info msg="RemovePodSandbox \"3226d0c681bfae77bb0e49d53e7092e4a1f21be75f849d1f56e4145c7f961ace\" returns successfully" Feb 13 10:08:52.123120 systemd[1]: Started sshd@219-139.178.70.11:22-139.178.68.195:47072.service. Feb 13 10:08:52.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-139.178.70.11:22-139.178.68.195:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:52.150619 kernel: kauditd_printk_skb: 98 callbacks suppressed Feb 13 10:08:52.150665 kernel: audit: type=1130 audit(1707818932.122:2548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-139.178.70.11:22-139.178.68.195:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:52.264000 audit[11683]: USER_ACCT pid=11683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.265688 sshd[11683]: Accepted publickey for core from 139.178.68.195 port 47072 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:52.269158 sshd[11683]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:52.279268 systemd-logind[1462]: New session 102 of user core. Feb 13 10:08:52.281426 systemd[1]: Started session-102.scope. Feb 13 10:08:52.267000 audit[11683]: CRED_ACQ pid=11683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.365296 sshd[11683]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:52.366730 systemd[1]: sshd@219-139.178.70.11:22-139.178.68.195:47072.service: Deactivated successfully. Feb 13 10:08:52.367166 systemd[1]: session-102.scope: Deactivated successfully. Feb 13 10:08:52.367552 systemd-logind[1462]: Session 102 logged out. Waiting for processes to exit. Feb 13 10:08:52.367989 systemd-logind[1462]: Removed session 102. Feb 13 10:08:52.451307 kernel: audit: type=1101 audit(1707818932.264:2549): pid=11683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.451344 kernel: audit: type=1103 audit(1707818932.267:2550): pid=11683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.451362 kernel: audit: type=1006 audit(1707818932.267:2551): pid=11683 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=102 res=1 Feb 13 10:08:52.511158 kernel: audit: type=1300 audit(1707818932.267:2551): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f1a9150 a2=3 a3=0 items=0 ppid=1 pid=11683 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=102 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:52.267000 audit[11683]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5f1a9150 a2=3 a3=0 items=0 ppid=1 pid=11683 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=102 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:52.604976 kernel: audit: type=1327 audit(1707818932.267:2551): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:52.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:52.636077 kernel: audit: type=1105 audit(1707818932.286:2552): pid=11683 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.286000 audit[11683]: USER_START pid=11683 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.732550 kernel: audit: type=1103 audit(1707818932.288:2553): pid=11685 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.288000 audit[11685]: CRED_ACQ pid=11685 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.822860 kernel: audit: type=1106 audit(1707818932.365:2554): pid=11683 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.365000 audit[11683]: USER_END pid=11683 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.901479 systemd[1]: Started sshd@220-139.178.70.11:22-5.135.90.165:46392.service. Feb 13 10:08:52.919557 kernel: audit: type=1104 audit(1707818932.365:2555): pid=11683 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.365000 audit[11683]: CRED_DISP pid=11683 uid=0 auid=500 ses=102 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:52.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@219-139.178.70.11:22-139.178.68.195:47072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:52.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@220-139.178.70.11:22-5.135.90.165:46392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:53.096503 sshd[11714]: Unable to negotiate with 5.135.90.165 port 46392: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:53.098173 systemd[1]: sshd@220-139.178.70.11:22-5.135.90.165:46392.service: Deactivated successfully. Feb 13 10:08:53.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@220-139.178.70.11:22-5.135.90.165:46392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:53.933902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2420223331.mount: Deactivated successfully. Feb 13 10:08:57.374466 systemd[1]: Started sshd@221-139.178.70.11:22-139.178.68.195:40694.service. Feb 13 10:08:57.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@221-139.178.70.11:22-139.178.68.195:40694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:57.401143 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:08:57.401184 kernel: audit: type=1130 audit(1707818937.373:2559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@221-139.178.70.11:22-139.178.68.195:40694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:57.513000 audit[11719]: USER_ACCT pid=11719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.514097 sshd[11719]: Accepted publickey for core from 139.178.68.195 port 40694 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:08:57.515194 sshd[11719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:08:57.517537 systemd-logind[1462]: New session 103 of user core. Feb 13 10:08:57.518089 systemd[1]: Started session-103.scope. Feb 13 10:08:57.596567 sshd[11719]: pam_unix(sshd:session): session closed for user core Feb 13 10:08:57.598081 systemd[1]: sshd@221-139.178.70.11:22-139.178.68.195:40694.service: Deactivated successfully. Feb 13 10:08:57.598530 systemd[1]: session-103.scope: Deactivated successfully. Feb 13 10:08:57.598818 systemd-logind[1462]: Session 103 logged out. Waiting for processes to exit. Feb 13 10:08:57.599456 systemd-logind[1462]: Removed session 103. Feb 13 10:08:57.514000 audit[11719]: CRED_ACQ pid=11719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.697695 kernel: audit: type=1101 audit(1707818937.513:2560): pid=11719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.697734 kernel: audit: type=1103 audit(1707818937.514:2561): pid=11719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.697750 kernel: audit: type=1006 audit(1707818937.514:2562): pid=11719 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=103 res=1 Feb 13 10:08:57.756802 kernel: audit: type=1300 audit(1707818937.514:2562): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f1a37b0 a2=3 a3=0 items=0 ppid=1 pid=11719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=103 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:57.514000 audit[11719]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5f1a37b0 a2=3 a3=0 items=0 ppid=1 pid=11719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=103 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:08:57.849687 kernel: audit: type=1327 audit(1707818937.514:2562): proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:57.514000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:08:57.880403 kernel: audit: type=1105 audit(1707818937.519:2563): pid=11719 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.519000 audit[11719]: USER_START pid=11719 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.519000 audit[11721]: CRED_ACQ pid=11721 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:58.065088 kernel: audit: type=1103 audit(1707818937.519:2564): pid=11721 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:58.065124 kernel: audit: type=1106 audit(1707818937.596:2565): pid=11719 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.596000 audit[11719]: USER_END pid=11719 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:58.160663 kernel: audit: type=1104 audit(1707818937.596:2566): pid=11719 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.596000 audit[11719]: CRED_DISP pid=11719 uid=0 auid=500 ses=103 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:08:57.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@221-139.178.70.11:22-139.178.68.195:40694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:58.928394 systemd[1]: Started sshd@222-139.178.70.11:22-5.135.90.165:42372.service. Feb 13 10:08:58.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@222-139.178.70.11:22-5.135.90.165:42372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:59.086280 sshd[11763]: Unable to negotiate with 5.135.90.165 port 42372: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:08:59.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@222-139.178.70.11:22-5.135.90.165:42372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:08:59.088016 systemd[1]: sshd@222-139.178.70.11:22-5.135.90.165:42372.service: Deactivated successfully. Feb 13 10:09:02.608148 systemd[1]: Started sshd@223-139.178.70.11:22-139.178.68.195:40708.service. Feb 13 10:09:02.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-139.178.70.11:22-139.178.68.195:40708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:02.635324 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:09:02.635366 kernel: audit: type=1130 audit(1707818942.607:2570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-139.178.70.11:22-139.178.68.195:40708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:02.745000 audit[11770]: USER_ACCT pid=11770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.746393 sshd[11770]: Accepted publickey for core from 139.178.68.195 port 40708 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:02.749089 sshd[11770]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:02.751560 systemd-logind[1462]: New session 104 of user core. Feb 13 10:09:02.752019 systemd[1]: Started session-104.scope. Feb 13 10:09:02.748000 audit[11770]: CRED_ACQ pid=11770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.842952 sshd[11770]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:02.844464 systemd[1]: sshd@223-139.178.70.11:22-139.178.68.195:40708.service: Deactivated successfully. Feb 13 10:09:02.844925 systemd[1]: session-104.scope: Deactivated successfully. Feb 13 10:09:02.845296 systemd-logind[1462]: Session 104 logged out. Waiting for processes to exit. Feb 13 10:09:02.845689 systemd-logind[1462]: Removed session 104. Feb 13 10:09:02.928275 kernel: audit: type=1101 audit(1707818942.745:2571): pid=11770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.928318 kernel: audit: type=1103 audit(1707818942.748:2572): pid=11770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.928338 kernel: audit: type=1006 audit(1707818942.748:2573): pid=11770 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=104 res=1 Feb 13 10:09:02.987003 kernel: audit: type=1300 audit(1707818942.748:2573): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5704ad60 a2=3 a3=0 items=0 ppid=1 pid=11770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=104 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:02.748000 audit[11770]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5704ad60 a2=3 a3=0 items=0 ppid=1 pid=11770 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=104 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:03.079090 kernel: audit: type=1327 audit(1707818942.748:2573): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:02.748000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:03.109550 kernel: audit: type=1105 audit(1707818942.753:2574): pid=11770 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.753000 audit[11770]: USER_START pid=11770 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:03.204038 kernel: audit: type=1103 audit(1707818942.753:2575): pid=11772 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.753000 audit[11772]: CRED_ACQ pid=11772 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:03.293285 kernel: audit: type=1106 audit(1707818942.842:2576): pid=11770 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.842000 audit[11770]: USER_END pid=11770 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.842000 audit[11770]: CRED_DISP pid=11770 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:03.478242 kernel: audit: type=1104 audit(1707818942.842:2577): pid=11770 uid=0 auid=500 ses=104 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:02.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@223-139.178.70.11:22-139.178.68.195:40708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:04.680966 systemd[1]: Started sshd@224-139.178.70.11:22-5.135.90.165:38488.service. Feb 13 10:09:04.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@224-139.178.70.11:22-5.135.90.165:38488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:04.845802 sshd[11798]: Unable to negotiate with 5.135.90.165 port 38488: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:04.847561 systemd[1]: sshd@224-139.178.70.11:22-5.135.90.165:38488.service: Deactivated successfully. Feb 13 10:09:04.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@224-139.178.70.11:22-5.135.90.165:38488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:05.751003 env[1474]: time="2024-02-13T10:09:05.750944551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:05.751673 env[1474]: time="2024-02-13T10:09:05.751636382Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:05.752533 env[1474]: time="2024-02-13T10:09:05.752487158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:05.753639 env[1474]: time="2024-02-13T10:09:05.753605433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:05.754027 env[1474]: time="2024-02-13T10:09:05.753983905Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 13 10:09:05.755181 env[1474]: time="2024-02-13T10:09:05.755143935Z" level=info msg="CreateContainer within sandbox \"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 13 10:09:05.761041 env[1474]: time="2024-02-13T10:09:05.760998013Z" level=info msg="CreateContainer within sandbox \"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3b90c3bfddafddda2b1b90062223d2c187ef105473d51e6b9529201037091eda\"" Feb 13 10:09:05.761257 env[1474]: time="2024-02-13T10:09:05.761197549Z" level=info msg="StartContainer for \"3b90c3bfddafddda2b1b90062223d2c187ef105473d51e6b9529201037091eda\"" Feb 13 10:09:05.772608 systemd[1]: Started cri-containerd-3b90c3bfddafddda2b1b90062223d2c187ef105473d51e6b9529201037091eda.scope. Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f8976d602f8 items=0 ppid=11108 pid=11808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:05.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393063336266646461666464646132623162393030363232323364 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit: BPF prog-id=177 op=LOAD Feb 13 10:09:05.778000 audit[11808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000024cc8 items=0 ppid=11108 pid=11808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:05.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393063336266646461666464646132623162393030363232323364 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.778000 audit: BPF prog-id=178 op=LOAD Feb 13 10:09:05.778000 audit[11808]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024d18 items=0 ppid=11108 pid=11808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:05.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393063336266646461666464646132623162393030363232323364 Feb 13 10:09:05.779000 audit: BPF prog-id=178 op=UNLOAD Feb 13 10:09:05.779000 audit: BPF prog-id=177 op=UNLOAD Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { perfmon } for pid=11808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit[11808]: AVC avc: denied { bpf } for pid=11808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:05.779000 audit: BPF prog-id=179 op=LOAD Feb 13 10:09:05.779000 audit[11808]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024da8 items=0 ppid=11108 pid=11808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:05.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362393063336266646461666464646132623162393030363232323364 Feb 13 10:09:05.785228 env[1474]: time="2024-02-13T10:09:05.785201938Z" level=info msg="StartContainer for \"3b90c3bfddafddda2b1b90062223d2c187ef105473d51e6b9529201037091eda\" returns successfully" Feb 13 10:09:05.785794 env[1474]: time="2024-02-13T10:09:05.785782497Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 13 10:09:07.854542 systemd[1]: Started sshd@225-139.178.70.11:22-139.178.68.195:60818.service. Feb 13 10:09:07.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-139.178.70.11:22-139.178.68.195:60818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:07.882019 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 13 10:09:07.882072 kernel: audit: type=1130 audit(1707818947.854:2587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-139.178.70.11:22-139.178.68.195:60818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:07.993526 sshd[11836]: Accepted publickey for core from 139.178.68.195 port 60818 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:07.992000 audit[11836]: USER_ACCT pid=11836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:07.995176 sshd[11836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:07.997760 systemd-logind[1462]: New session 105 of user core. Feb 13 10:09:07.998347 systemd[1]: Started session-105.scope. Feb 13 10:09:08.082134 sshd[11836]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:08.083578 systemd[1]: sshd@225-139.178.70.11:22-139.178.68.195:60818.service: Deactivated successfully. Feb 13 10:09:08.084129 systemd[1]: session-105.scope: Deactivated successfully. Feb 13 10:09:08.084578 systemd-logind[1462]: Session 105 logged out. Waiting for processes to exit. Feb 13 10:09:08.084980 systemd-logind[1462]: Removed session 105. Feb 13 10:09:07.994000 audit[11836]: CRED_ACQ pid=11836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.177496 kernel: audit: type=1101 audit(1707818947.992:2588): pid=11836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.177540 kernel: audit: type=1103 audit(1707818947.994:2589): pid=11836 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.177558 kernel: audit: type=1006 audit(1707818947.994:2590): pid=11836 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=105 res=1 Feb 13 10:09:08.236220 kernel: audit: type=1300 audit(1707818947.994:2590): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb313f2b0 a2=3 a3=0 items=0 ppid=1 pid=11836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=105 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:07.994000 audit[11836]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb313f2b0 a2=3 a3=0 items=0 ppid=1 pid=11836 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=105 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:08.328353 kernel: audit: type=1327 audit(1707818947.994:2590): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:07.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:07.999000 audit[11836]: USER_START pid=11836 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.453286 kernel: audit: type=1105 audit(1707818947.999:2591): pid=11836 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.453317 kernel: audit: type=1103 audit(1707818948.000:2592): pid=11841 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.000000 audit[11841]: CRED_ACQ pid=11841 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.081000 audit[11836]: USER_END pid=11836 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.638244 kernel: audit: type=1106 audit(1707818948.081:2593): pid=11836 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.638279 kernel: audit: type=1104 audit(1707818948.082:2594): pid=11836 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.082000 audit[11836]: CRED_DISP pid=11836 uid=0 auid=500 ses=105 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:08.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@225-139.178.70.11:22-139.178.68.195:60818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:10.341922 systemd[1]: Started sshd@226-139.178.70.11:22-5.135.90.165:34416.service. Feb 13 10:09:10.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@226-139.178.70.11:22-5.135.90.165:34416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:10.501189 sshd[11864]: Unable to negotiate with 5.135.90.165 port 34416: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:10.502942 systemd[1]: sshd@226-139.178.70.11:22-5.135.90.165:34416.service: Deactivated successfully. Feb 13 10:09:10.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@226-139.178.70.11:22-5.135.90.165:34416 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:12.642834 env[1474]: time="2024-02-13T10:09:12.642806659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:12.643597 env[1474]: time="2024-02-13T10:09:12.643557305Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:12.644402 env[1474]: time="2024-02-13T10:09:12.644369135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:12.645257 env[1474]: time="2024-02-13T10:09:12.645192626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 10:09:12.645592 env[1474]: time="2024-02-13T10:09:12.645532187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 13 10:09:12.646725 env[1474]: time="2024-02-13T10:09:12.646711844Z" level=info msg="CreateContainer within sandbox \"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 13 10:09:12.653125 env[1474]: time="2024-02-13T10:09:12.653086266Z" level=info msg="CreateContainer within sandbox \"f835ff663f5403fc09d97bedd6193639597cc8d0c484039528aea8bc7bd5903f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a15f8c75e2b91cc0d87c02bdad7b395d157e4afca03cca3e7ec160e0bb798822\"" Feb 13 10:09:12.653438 env[1474]: time="2024-02-13T10:09:12.653386811Z" level=info msg="StartContainer for \"a15f8c75e2b91cc0d87c02bdad7b395d157e4afca03cca3e7ec160e0bb798822\"" Feb 13 10:09:12.664037 systemd[1]: Started cri-containerd-a15f8c75e2b91cc0d87c02bdad7b395d157e4afca03cca3e7ec160e0bb798822.scope. Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc224c0cca8 items=0 ppid=11108 pid=11874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:12.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356638633735653262393163633064383763303262646164376233 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit: BPF prog-id=180 op=LOAD Feb 13 10:09:12.670000 audit[11874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002fe228 items=0 ppid=11108 pid=11874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:12.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356638633735653262393163633064383763303262646164376233 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit: BPF prog-id=181 op=LOAD Feb 13 10:09:12.670000 audit[11874]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002fe278 items=0 ppid=11108 pid=11874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:12.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356638633735653262393163633064383763303262646164376233 Feb 13 10:09:12.670000 audit: BPF prog-id=181 op=UNLOAD Feb 13 10:09:12.670000 audit: BPF prog-id=180 op=UNLOAD Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { perfmon } for pid=11874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit[11874]: AVC avc: denied { bpf } for pid=11874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 10:09:12.670000 audit: BPF prog-id=182 op=LOAD Feb 13 10:09:12.670000 audit[11874]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002fe308 items=0 ppid=11108 pid=11874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:12.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131356638633735653262393163633064383763303262646164376233 Feb 13 10:09:12.677711 env[1474]: time="2024-02-13T10:09:12.677681716Z" level=info msg="StartContainer for \"a15f8c75e2b91cc0d87c02bdad7b395d157e4afca03cca3e7ec160e0bb798822\" returns successfully" Feb 13 10:09:13.091589 systemd[1]: Started sshd@227-139.178.70.11:22-139.178.68.195:60820.service. Feb 13 10:09:13.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@227-139.178.70.11:22-139.178.68.195:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:13.118542 kernel: kauditd_printk_skb: 46 callbacks suppressed Feb 13 10:09:13.118588 kernel: audit: type=1130 audit(1707818953.090:2604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@227-139.178.70.11:22-139.178.68.195:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:13.172690 kubelet[2572]: I0213 10:09:13.172669 2572 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-w8rcv" podStartSLOduration=813.302987625 podCreationTimestamp="2024-02-13 09:55:09 +0000 UTC" firstStartedPulling="2024-02-13 10:08:41.776088954 +0000 UTC m=+831.944872678" lastFinishedPulling="2024-02-13 10:09:12.645733539 +0000 UTC m=+862.814517270" observedRunningTime="2024-02-13 10:09:13.172256966 +0000 UTC m=+863.341040692" watchObservedRunningTime="2024-02-13 10:09:13.172632217 +0000 UTC m=+863.341415939" Feb 13 10:09:13.229000 audit[11913]: USER_ACCT pid=11913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.230356 sshd[11913]: Accepted publickey for core from 139.178.68.195 port 60820 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:13.231149 sshd[11913]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:13.233606 systemd-logind[1462]: New session 106 of user core. Feb 13 10:09:13.234088 systemd[1]: Started session-106.scope. Feb 13 10:09:13.230000 audit[11913]: CRED_ACQ pid=11913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.324763 sshd[11913]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:13.326287 systemd[1]: sshd@227-139.178.70.11:22-139.178.68.195:60820.service: Deactivated successfully. Feb 13 10:09:13.326749 systemd[1]: session-106.scope: Deactivated successfully. Feb 13 10:09:13.327173 systemd-logind[1462]: Session 106 logged out. Waiting for processes to exit. Feb 13 10:09:13.327651 systemd-logind[1462]: Removed session 106. Feb 13 10:09:13.412379 kernel: audit: type=1101 audit(1707818953.229:2605): pid=11913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.412450 kernel: audit: type=1103 audit(1707818953.230:2606): pid=11913 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.412471 kernel: audit: type=1006 audit(1707818953.230:2607): pid=11913 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=106 res=1 Feb 13 10:09:13.438359 kubelet[2572]: I0213 10:09:13.438313 2572 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 13 10:09:13.438359 kubelet[2572]: I0213 10:09:13.438341 2572 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 13 10:09:13.230000 audit[11913]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc95b4f960 a2=3 a3=0 items=0 ppid=1 pid=11913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=106 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:13.563490 kernel: audit: type=1300 audit(1707818953.230:2607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc95b4f960 a2=3 a3=0 items=0 ppid=1 pid=11913 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=106 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:13.563540 kernel: audit: type=1327 audit(1707818953.230:2607): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:13.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:13.235000 audit[11913]: USER_START pid=11913 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.688677 kernel: audit: type=1105 audit(1707818953.235:2608): pid=11913 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.688736 kernel: audit: type=1103 audit(1707818953.235:2609): pid=11915 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.235000 audit[11915]: CRED_ACQ pid=11915 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.324000 audit[11913]: USER_END pid=11913 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.873687 kernel: audit: type=1106 audit(1707818953.324:2610): pid=11913 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.324000 audit[11913]: CRED_DISP pid=11913 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.963187 kernel: audit: type=1104 audit(1707818953.324:2611): pid=11913 uid=0 auid=500 ses=106 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:13.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@227-139.178.70.11:22-139.178.68.195:60820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:16.335088 systemd[1]: Started sshd@228-139.178.70.11:22-5.135.90.165:58708.service. Feb 13 10:09:16.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@228-139.178.70.11:22-5.135.90.165:58708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:16.488204 sshd[11973]: Unable to negotiate with 5.135.90.165 port 58708: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:16.489987 systemd[1]: sshd@228-139.178.70.11:22-5.135.90.165:58708.service: Deactivated successfully. Feb 13 10:09:16.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@228-139.178.70.11:22-5.135.90.165:58708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:18.334336 systemd[1]: Started sshd@229-139.178.70.11:22-139.178.68.195:52646.service. Feb 13 10:09:18.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-139.178.70.11:22-139.178.68.195:52646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:18.369572 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:09:18.369689 kernel: audit: type=1130 audit(1707818958.333:2615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-139.178.70.11:22-139.178.68.195:52646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:18.478832 sshd[11977]: Accepted publickey for core from 139.178.68.195 port 52646 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:18.477000 audit[11977]: USER_ACCT pid=11977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.480146 sshd[11977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:18.482600 systemd-logind[1462]: New session 107 of user core. Feb 13 10:09:18.483067 systemd[1]: Started session-107.scope. Feb 13 10:09:18.562757 sshd[11977]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:18.564282 systemd[1]: sshd@229-139.178.70.11:22-139.178.68.195:52646.service: Deactivated successfully. Feb 13 10:09:18.564738 systemd[1]: session-107.scope: Deactivated successfully. Feb 13 10:09:18.565174 systemd-logind[1462]: Session 107 logged out. Waiting for processes to exit. Feb 13 10:09:18.565685 systemd-logind[1462]: Removed session 107. Feb 13 10:09:18.479000 audit[11977]: CRED_ACQ pid=11977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.661036 kernel: audit: type=1101 audit(1707818958.477:2616): pid=11977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.661152 kernel: audit: type=1103 audit(1707818958.479:2617): pid=11977 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.661195 kernel: audit: type=1006 audit(1707818958.479:2618): pid=11977 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=107 res=1 Feb 13 10:09:18.479000 audit[11977]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb0891c50 a2=3 a3=0 items=0 ppid=1 pid=11977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=107 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:18.812257 kernel: audit: type=1300 audit(1707818958.479:2618): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb0891c50 a2=3 a3=0 items=0 ppid=1 pid=11977 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=107 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:18.812301 kernel: audit: type=1327 audit(1707818958.479:2618): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:18.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:18.842783 kernel: audit: type=1105 audit(1707818958.484:2619): pid=11977 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.484000 audit[11977]: USER_START pid=11977 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.937499 kernel: audit: type=1103 audit(1707818958.485:2620): pid=11979 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.485000 audit[11979]: CRED_ACQ pid=11979 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.562000 audit[11977]: USER_END pid=11977 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:19.122530 kernel: audit: type=1106 audit(1707818958.562:2621): pid=11977 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:19.122565 kernel: audit: type=1104 audit(1707818958.562:2622): pid=11977 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.562000 audit[11977]: CRED_DISP pid=11977 uid=0 auid=500 ses=107 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:18.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@229-139.178.70.11:22-139.178.68.195:52646 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:21.905834 systemd[1]: Started sshd@230-139.178.70.11:22-5.135.90.165:54744.service. Feb 13 10:09:21.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@230-139.178.70.11:22-5.135.90.165:54744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:22.064324 sshd[12004]: Unable to negotiate with 5.135.90.165 port 54744: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:22.065992 systemd[1]: sshd@230-139.178.70.11:22-5.135.90.165:54744.service: Deactivated successfully. Feb 13 10:09:22.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@230-139.178.70.11:22-5.135.90.165:54744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:23.572119 systemd[1]: Started sshd@231-139.178.70.11:22-139.178.68.195:52652.service. Feb 13 10:09:23.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@231-139.178.70.11:22-139.178.68.195:52652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:23.599102 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:09:23.599176 kernel: audit: type=1130 audit(1707818963.571:2626): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@231-139.178.70.11:22-139.178.68.195:52652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:23.709000 audit[12008]: USER_ACCT pid=12008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.710965 sshd[12008]: Accepted publickey for core from 139.178.68.195 port 52652 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:23.713972 sshd[12008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:23.719167 systemd-logind[1462]: New session 108 of user core. Feb 13 10:09:23.719658 systemd[1]: Started session-108.scope. Feb 13 10:09:23.801154 sshd[12008]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:23.802497 systemd[1]: sshd@231-139.178.70.11:22-139.178.68.195:52652.service: Deactivated successfully. Feb 13 10:09:23.803002 systemd[1]: session-108.scope: Deactivated successfully. Feb 13 10:09:23.803418 systemd-logind[1462]: Session 108 logged out. Waiting for processes to exit. Feb 13 10:09:23.712000 audit[12008]: CRED_ACQ pid=12008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.803803 systemd-logind[1462]: Removed session 108. Feb 13 10:09:23.894451 kernel: audit: type=1101 audit(1707818963.709:2627): pid=12008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.894491 kernel: audit: type=1103 audit(1707818963.712:2628): pid=12008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.894510 kernel: audit: type=1006 audit(1707818963.712:2629): pid=12008 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=108 res=1 Feb 13 10:09:23.953223 kernel: audit: type=1300 audit(1707818963.712:2629): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb8a05ff0 a2=3 a3=0 items=0 ppid=1 pid=12008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=108 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:23.712000 audit[12008]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb8a05ff0 a2=3 a3=0 items=0 ppid=1 pid=12008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=108 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:24.045412 kernel: audit: type=1327 audit(1707818963.712:2629): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:23.712000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:24.075923 kernel: audit: type=1105 audit(1707818963.719:2630): pid=12008 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.719000 audit[12008]: USER_START pid=12008 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:24.170529 kernel: audit: type=1103 audit(1707818963.719:2631): pid=12010 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.719000 audit[12010]: CRED_ACQ pid=12010 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:24.259858 kernel: audit: type=1106 audit(1707818963.796:2632): pid=12008 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.796000 audit[12008]: USER_END pid=12008 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:24.355490 kernel: audit: type=1104 audit(1707818963.796:2633): pid=12008 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.796000 audit[12008]: CRED_DISP pid=12008 uid=0 auid=500 ses=108 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:23.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@231-139.178.70.11:22-139.178.68.195:52652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:27.682342 systemd[1]: Started sshd@232-139.178.70.11:22-5.135.90.165:50800.service. Feb 13 10:09:27.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@232-139.178.70.11:22-5.135.90.165:50800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:27.851707 sshd[12034]: Unable to negotiate with 5.135.90.165 port 50800: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:27.853823 systemd[1]: sshd@232-139.178.70.11:22-5.135.90.165:50800.service: Deactivated successfully. Feb 13 10:09:27.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@232-139.178.70.11:22-5.135.90.165:50800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:28.812537 systemd[1]: Started sshd@233-139.178.70.11:22-139.178.68.195:34964.service. Feb 13 10:09:28.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-139.178.70.11:22-139.178.68.195:34964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:28.851144 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:09:28.851260 kernel: audit: type=1130 audit(1707818968.812:2637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-139.178.70.11:22-139.178.68.195:34964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:28.961000 audit[12057]: USER_ACCT pid=12057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:28.962882 sshd[12057]: Accepted publickey for core from 139.178.68.195 port 34964 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:28.964024 sshd[12057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:28.966739 systemd-logind[1462]: New session 109 of user core. Feb 13 10:09:28.967804 systemd[1]: Started session-109.scope. Feb 13 10:09:29.045215 sshd[12057]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:29.047048 systemd[1]: sshd@233-139.178.70.11:22-139.178.68.195:34964.service: Deactivated successfully. Feb 13 10:09:29.047558 systemd[1]: session-109.scope: Deactivated successfully. Feb 13 10:09:29.047898 systemd-logind[1462]: Session 109 logged out. Waiting for processes to exit. Feb 13 10:09:29.048387 systemd-logind[1462]: Removed session 109. Feb 13 10:09:28.962000 audit[12057]: CRED_ACQ pid=12057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.145015 kernel: audit: type=1101 audit(1707818968.961:2638): pid=12057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.145071 kernel: audit: type=1103 audit(1707818968.962:2639): pid=12057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.145092 kernel: audit: type=1006 audit(1707818968.963:2640): pid=12057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=109 res=1 Feb 13 10:09:29.203795 kernel: audit: type=1300 audit(1707818968.963:2640): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcfcab1f0 a2=3 a3=0 items=0 ppid=1 pid=12057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=109 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:28.963000 audit[12057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcfcab1f0 a2=3 a3=0 items=0 ppid=1 pid=12057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=109 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:29.295974 kernel: audit: type=1327 audit(1707818968.963:2640): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:28.963000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:28.969000 audit[12057]: USER_START pid=12057 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.421125 kernel: audit: type=1105 audit(1707818968.969:2641): pid=12057 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.421173 kernel: audit: type=1103 audit(1707818968.970:2642): pid=12059 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:28.970000 audit[12059]: CRED_ACQ pid=12059 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.045000 audit[12057]: USER_END pid=12057 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.606145 kernel: audit: type=1106 audit(1707818969.045:2643): pid=12057 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.606179 kernel: audit: type=1104 audit(1707818969.045:2644): pid=12057 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.045000 audit[12057]: CRED_DISP pid=12057 uid=0 auid=500 ses=109 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:29.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@233-139.178.70.11:22-139.178.68.195:34964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:34.054400 systemd[1]: Started sshd@234-139.178.70.11:22-139.178.68.195:34978.service. Feb 13 10:09:34.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-139.178.70.11:22-139.178.68.195:34978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:34.081325 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:09:34.081394 kernel: audit: type=1130 audit(1707818974.053:2646): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-139.178.70.11:22-139.178.68.195:34978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:34.190000 audit[12082]: USER_ACCT pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.191535 sshd[12082]: Accepted publickey for core from 139.178.68.195 port 34978 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:34.193145 sshd[12082]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:34.195559 systemd-logind[1462]: New session 110 of user core. Feb 13 10:09:34.196038 systemd[1]: Started session-110.scope. Feb 13 10:09:34.277090 sshd[12082]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:34.278533 systemd[1]: sshd@234-139.178.70.11:22-139.178.68.195:34978.service: Deactivated successfully. Feb 13 10:09:34.279024 systemd[1]: session-110.scope: Deactivated successfully. Feb 13 10:09:34.279420 systemd-logind[1462]: Session 110 logged out. Waiting for processes to exit. Feb 13 10:09:34.279923 systemd-logind[1462]: Removed session 110. Feb 13 10:09:34.192000 audit[12082]: CRED_ACQ pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.375800 kernel: audit: type=1101 audit(1707818974.190:2647): pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.375842 kernel: audit: type=1103 audit(1707818974.192:2648): pid=12082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.375862 kernel: audit: type=1006 audit(1707818974.192:2649): pid=12082 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=110 res=1 Feb 13 10:09:34.434568 kernel: audit: type=1300 audit(1707818974.192:2649): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe92463900 a2=3 a3=0 items=0 ppid=1 pid=12082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=110 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:34.192000 audit[12082]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe92463900 a2=3 a3=0 items=0 ppid=1 pid=12082 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=110 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:34.526738 kernel: audit: type=1327 audit(1707818974.192:2649): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:34.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:34.557218 kernel: audit: type=1105 audit(1707818974.197:2650): pid=12082 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.197000 audit[12082]: USER_START pid=12082 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.651851 kernel: audit: type=1103 audit(1707818974.198:2651): pid=12084 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.198000 audit[12084]: CRED_ACQ pid=12084 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.741181 kernel: audit: type=1106 audit(1707818974.276:2652): pid=12082 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.276000 audit[12082]: USER_END pid=12082 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.836733 kernel: audit: type=1104 audit(1707818974.276:2653): pid=12082 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.276000 audit[12082]: CRED_DISP pid=12082 uid=0 auid=500 ses=110 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:34.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@234-139.178.70.11:22-139.178.68.195:34978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:35.026963 systemd[1]: Started sshd@235-139.178.70.11:22-5.135.90.165:46792.service. Feb 13 10:09:35.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@235-139.178.70.11:22-5.135.90.165:46792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:35.182278 sshd[12110]: Unable to negotiate with 5.135.90.165 port 46792: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:35.184062 systemd[1]: sshd@235-139.178.70.11:22-5.135.90.165:46792.service: Deactivated successfully. Feb 13 10:09:35.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@235-139.178.70.11:22-5.135.90.165:46792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:39.287313 systemd[1]: Started sshd@236-139.178.70.11:22-139.178.68.195:52400.service. Feb 13 10:09:39.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@236-139.178.70.11:22-139.178.68.195:52400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:39.314232 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:09:39.314303 kernel: audit: type=1130 audit(1707818979.286:2657): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@236-139.178.70.11:22-139.178.68.195:52400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:39.424000 audit[12115]: USER_ACCT pid=12115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.425904 sshd[12115]: Accepted publickey for core from 139.178.68.195 port 52400 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:39.427147 sshd[12115]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:39.429602 systemd-logind[1462]: New session 111 of user core. Feb 13 10:09:39.430052 systemd[1]: Started session-111.scope. Feb 13 10:09:39.507582 sshd[12115]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:39.508899 systemd[1]: sshd@236-139.178.70.11:22-139.178.68.195:52400.service: Deactivated successfully. Feb 13 10:09:39.509341 systemd[1]: session-111.scope: Deactivated successfully. Feb 13 10:09:39.509678 systemd-logind[1462]: Session 111 logged out. Waiting for processes to exit. Feb 13 10:09:39.510207 systemd-logind[1462]: Removed session 111. Feb 13 10:09:39.426000 audit[12115]: CRED_ACQ pid=12115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.608007 kernel: audit: type=1101 audit(1707818979.424:2658): pid=12115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.608050 kernel: audit: type=1103 audit(1707818979.426:2659): pid=12115 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.608067 kernel: audit: type=1006 audit(1707818979.426:2660): pid=12115 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=111 res=1 Feb 13 10:09:39.666816 kernel: audit: type=1300 audit(1707818979.426:2660): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc752d310 a2=3 a3=0 items=0 ppid=1 pid=12115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=111 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:39.426000 audit[12115]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc752d310 a2=3 a3=0 items=0 ppid=1 pid=12115 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=111 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:39.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:39.789468 kernel: audit: type=1327 audit(1707818979.426:2660): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:39.789499 kernel: audit: type=1105 audit(1707818979.431:2661): pid=12115 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.431000 audit[12115]: USER_START pid=12115 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.884032 kernel: audit: type=1103 audit(1707818979.431:2662): pid=12117 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.431000 audit[12117]: CRED_ACQ pid=12117 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.973503 kernel: audit: type=1106 audit(1707818979.507:2663): pid=12115 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.507000 audit[12115]: USER_END pid=12115 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:40.069088 kernel: audit: type=1104 audit(1707818979.507:2664): pid=12115 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.507000 audit[12115]: CRED_DISP pid=12115 uid=0 auid=500 ses=111 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:39.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@236-139.178.70.11:22-139.178.68.195:52400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:41.472272 systemd[1]: Started sshd@237-139.178.70.11:22-5.135.90.165:42828.service. Feb 13 10:09:41.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@237-139.178.70.11:22-5.135.90.165:42828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:41.631543 sshd[12140]: Unable to negotiate with 5.135.90.165 port 42828: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:41.633274 systemd[1]: sshd@237-139.178.70.11:22-5.135.90.165:42828.service: Deactivated successfully. Feb 13 10:09:41.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@237-139.178.70.11:22-5.135.90.165:42828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:44.517633 systemd[1]: Started sshd@238-139.178.70.11:22-139.178.68.195:52406.service. Feb 13 10:09:44.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-139.178.70.11:22-139.178.68.195:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:44.560887 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:09:44.561001 kernel: audit: type=1130 audit(1707818984.517:2668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-139.178.70.11:22-139.178.68.195:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:44.670000 audit[12169]: USER_ACCT pid=12169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.671544 sshd[12169]: Accepted publickey for core from 139.178.68.195 port 52406 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:44.675152 sshd[12169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:44.684784 systemd-logind[1462]: New session 112 of user core. Feb 13 10:09:44.687112 systemd[1]: Started session-112.scope. Feb 13 10:09:44.673000 audit[12169]: CRED_ACQ pid=12169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.771933 sshd[12169]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:44.773371 systemd[1]: sshd@238-139.178.70.11:22-139.178.68.195:52406.service: Deactivated successfully. Feb 13 10:09:44.773813 systemd[1]: session-112.scope: Deactivated successfully. Feb 13 10:09:44.774235 systemd-logind[1462]: Session 112 logged out. Waiting for processes to exit. Feb 13 10:09:44.774731 systemd-logind[1462]: Removed session 112. Feb 13 10:09:44.853663 kernel: audit: type=1101 audit(1707818984.670:2669): pid=12169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.853751 kernel: audit: type=1103 audit(1707818984.673:2670): pid=12169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.853775 kernel: audit: type=1006 audit(1707818984.673:2671): pid=12169 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=112 res=1 Feb 13 10:09:44.673000 audit[12169]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8b1766c0 a2=3 a3=0 items=0 ppid=1 pid=12169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=112 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:45.004766 kernel: audit: type=1300 audit(1707818984.673:2671): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8b1766c0 a2=3 a3=0 items=0 ppid=1 pid=12169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=112 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:45.004810 kernel: audit: type=1327 audit(1707818984.673:2671): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:44.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:45.035265 kernel: audit: type=1105 audit(1707818984.693:2672): pid=12169 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.693000 audit[12169]: USER_START pid=12169 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:45.129853 kernel: audit: type=1103 audit(1707818984.695:2673): pid=12171 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.695000 audit[12171]: CRED_ACQ pid=12171 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.771000 audit[12169]: USER_END pid=12169 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:45.314765 kernel: audit: type=1106 audit(1707818984.771:2674): pid=12169 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:45.314827 kernel: audit: type=1104 audit(1707818984.771:2675): pid=12169 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.771000 audit[12169]: CRED_DISP pid=12169 uid=0 auid=500 ses=112 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:44.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@238-139.178.70.11:22-139.178.68.195:52406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:46.216000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.216000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.216000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a2a700 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:09:46.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:09:46.216000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000e6aba0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:09:46.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:09:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=524877 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c006530c30 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:09:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:09:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c015830d20 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:09:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:09:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=524871 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0067343c0 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:09:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:09:46.475000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.475000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00bfea030 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:09:46.475000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:09:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=524875 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.476000 audit[2392]: AVC avc: denied { watch } for pid=2392 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0043aa540 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:09:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:09:46.476000 audit[2392]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00fff0000 a2=fc6 a3=0 items=0 ppid=2240 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c21,c335 key=(null) Feb 13 10:09:46.476000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E3131002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Feb 13 10:09:48.163986 systemd[1]: Started sshd@239-139.178.70.11:22-5.135.90.165:38836.service. Feb 13 10:09:48.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@239-139.178.70.11:22-5.135.90.165:38836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:48.324515 sshd[12195]: Unable to negotiate with 5.135.90.165 port 38836: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:48.326300 systemd[1]: sshd@239-139.178.70.11:22-5.135.90.165:38836.service: Deactivated successfully. Feb 13 10:09:48.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@239-139.178.70.11:22-5.135.90.165:38836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:49.782668 systemd[1]: Started sshd@240-139.178.70.11:22-139.178.68.195:39702.service. Feb 13 10:09:49.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-139.178.70.11:22-139.178.68.195:39702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:49.816199 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 13 10:09:49.816322 kernel: audit: type=1130 audit(1707818989.782:2687): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-139.178.70.11:22-139.178.68.195:39702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:49.925000 audit[12199]: USER_ACCT pid=12199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:49.926269 sshd[12199]: Accepted publickey for core from 139.178.68.195 port 39702 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:49.928003 sshd[12199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:49.930342 systemd-logind[1462]: New session 113 of user core. Feb 13 10:09:49.931076 systemd[1]: Started session-113.scope. Feb 13 10:09:50.007695 sshd[12199]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:50.009038 systemd[1]: sshd@240-139.178.70.11:22-139.178.68.195:39702.service: Deactivated successfully. Feb 13 10:09:50.009535 systemd[1]: session-113.scope: Deactivated successfully. Feb 13 10:09:50.009877 systemd-logind[1462]: Session 113 logged out. Waiting for processes to exit. Feb 13 10:09:50.010329 systemd-logind[1462]: Removed session 113. Feb 13 10:09:49.926000 audit[12199]: CRED_ACQ pid=12199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.108401 kernel: audit: type=1101 audit(1707818989.925:2688): pid=12199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.108441 kernel: audit: type=1103 audit(1707818989.926:2689): pid=12199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.108460 kernel: audit: type=1006 audit(1707818989.927:2690): pid=12199 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=113 res=1 Feb 13 10:09:50.167235 kernel: audit: type=1300 audit(1707818989.927:2690): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe99d57220 a2=3 a3=0 items=0 ppid=1 pid=12199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=113 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:49.927000 audit[12199]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe99d57220 a2=3 a3=0 items=0 ppid=1 pid=12199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=113 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:50.259423 kernel: audit: type=1327 audit(1707818989.927:2690): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:49.927000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:50.289951 kernel: audit: type=1105 audit(1707818989.932:2691): pid=12199 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:49.932000 audit[12199]: USER_START pid=12199 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:49.933000 audit[12203]: CRED_ACQ pid=12203 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.474023 kernel: audit: type=1103 audit(1707818989.933:2692): pid=12203 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.474066 kernel: audit: type=1106 audit(1707818990.007:2693): pid=12199 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.007000 audit[12199]: USER_END pid=12199 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.569688 kernel: audit: type=1104 audit(1707818990.007:2694): pid=12199 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.007000 audit[12199]: CRED_DISP pid=12199 uid=0 auid=500 ses=113 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:50.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@240-139.178.70.11:22-139.178.68.195:39702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:50.044000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:50.044000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f23740 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:09:50.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:09:50.044000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:50.044000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015c3dc0 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:09:50.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:09:50.044000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:50.044000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0015c3e00 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:09:50.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:09:50.044000 audit[2401]: AVC avc: denied { watch } for pid=2401 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=524860 scontext=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 13 10:09:50.044000 audit[2401]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015c3e40 a2=fc6 a3=0 items=0 ppid=2225 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c675,c920 key=(null) Feb 13 10:09:50.044000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 13 10:09:54.675637 systemd[1]: Started sshd@241-139.178.70.11:22-5.135.90.165:35250.service. Feb 13 10:09:54.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@241-139.178.70.11:22-5.135.90.165:35250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:54.828894 sshd[12232]: Unable to negotiate with 5.135.90.165 port 35250: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:09:54.830832 systemd[1]: sshd@241-139.178.70.11:22-5.135.90.165:35250.service: Deactivated successfully. Feb 13 10:09:54.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@241-139.178.70.11:22-5.135.90.165:35250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:54.858455 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 13 10:09:54.858523 kernel: audit: type=1131 audit(1707818994.830:2701): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@241-139.178.70.11:22-5.135.90.165:35250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:55.016251 systemd[1]: Started sshd@242-139.178.70.11:22-139.178.68.195:39714.service. Feb 13 10:09:55.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@242-139.178.70.11:22-139.178.68.195:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:55.106905 kernel: audit: type=1130 audit(1707818995.015:2702): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@242-139.178.70.11:22-139.178.68.195:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:09:55.126000 audit[12236]: USER_ACCT pid=12236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.127964 sshd[12236]: Accepted publickey for core from 139.178.68.195 port 39714 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:09:55.129004 sshd[12236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:09:55.131533 systemd-logind[1462]: New session 114 of user core. Feb 13 10:09:55.132018 systemd[1]: Started session-114.scope. Feb 13 10:09:55.210299 sshd[12236]: pam_unix(sshd:session): session closed for user core Feb 13 10:09:55.211736 systemd[1]: sshd@242-139.178.70.11:22-139.178.68.195:39714.service: Deactivated successfully. Feb 13 10:09:55.212178 systemd[1]: session-114.scope: Deactivated successfully. Feb 13 10:09:55.212607 systemd-logind[1462]: Session 114 logged out. Waiting for processes to exit. Feb 13 10:09:55.213194 systemd-logind[1462]: Removed session 114. Feb 13 10:09:55.127000 audit[12236]: CRED_ACQ pid=12236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.310868 kernel: audit: type=1101 audit(1707818995.126:2703): pid=12236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.310924 kernel: audit: type=1103 audit(1707818995.127:2704): pid=12236 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.310951 kernel: audit: type=1006 audit(1707818995.127:2705): pid=12236 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=114 res=1 Feb 13 10:09:55.127000 audit[12236]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2efabc40 a2=3 a3=0 items=0 ppid=1 pid=12236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=114 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:55.461873 kernel: audit: type=1300 audit(1707818995.127:2705): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2efabc40 a2=3 a3=0 items=0 ppid=1 pid=12236 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=114 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:09:55.461906 kernel: audit: type=1327 audit(1707818995.127:2705): proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:55.127000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:09:55.492350 kernel: audit: type=1105 audit(1707818995.133:2706): pid=12236 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.133000 audit[12236]: USER_START pid=12236 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.587850 kernel: audit: type=1103 audit(1707818995.133:2707): pid=12238 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.133000 audit[12238]: CRED_ACQ pid=12238 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.210000 audit[12236]: USER_END pid=12236 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.772923 kernel: audit: type=1106 audit(1707818995.210:2708): pid=12236 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.210000 audit[12236]: CRED_DISP pid=12236 uid=0 auid=500 ses=114 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:09:55.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@242-139.178.70.11:22-139.178.68.195:39714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:00.222064 systemd[1]: Started sshd@243-139.178.70.11:22-139.178.68.195:49168.service. Feb 13 10:10:00.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-139.178.70.11:22-139.178.68.195:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:00.249639 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 13 10:10:00.249710 kernel: audit: type=1130 audit(1707819000.221:2711): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-139.178.70.11:22-139.178.68.195:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:00.339714 systemd[1]: Started sshd@244-139.178.70.11:22-5.135.90.165:59148.service. Feb 13 10:10:00.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-139.178.70.11:22-5.135.90.165:59148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:00.340897 kernel: audit: type=1130 audit(1707819000.338:2712): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-139.178.70.11:22-5.135.90.165:59148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:00.361616 sshd[12303]: Accepted publickey for core from 139.178.68.195 port 49168 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:00.363572 sshd[12303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:00.366230 systemd-logind[1462]: New session 115 of user core. Feb 13 10:10:00.366752 systemd[1]: Started session-115.scope. Feb 13 10:10:00.360000 audit[12303]: USER_ACCT pid=12303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.444292 sshd[12303]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:00.445610 systemd[1]: sshd@243-139.178.70.11:22-139.178.68.195:49168.service: Deactivated successfully. Feb 13 10:10:00.446057 systemd[1]: session-115.scope: Deactivated successfully. Feb 13 10:10:00.446432 systemd-logind[1462]: Session 115 logged out. Waiting for processes to exit. Feb 13 10:10:00.446805 systemd-logind[1462]: Removed session 115. Feb 13 10:10:00.522091 kernel: audit: type=1101 audit(1707819000.360:2713): pid=12303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.522137 kernel: audit: type=1103 audit(1707819000.362:2714): pid=12303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.362000 audit[12303]: CRED_ACQ pid=12303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.613238 kernel: audit: type=1006 audit(1707819000.362:2715): pid=12303 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=115 res=1 Feb 13 10:10:00.613410 sshd[12306]: Unable to negotiate with 5.135.90.165 port 59148: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:10:00.613770 systemd[1]: sshd@244-139.178.70.11:22-5.135.90.165:59148.service: Deactivated successfully. Feb 13 10:10:00.362000 audit[12303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80e47d10 a2=3 a3=0 items=0 ppid=1 pid=12303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=115 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:00.765075 kernel: audit: type=1300 audit(1707819000.362:2715): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc80e47d10 a2=3 a3=0 items=0 ppid=1 pid=12303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=115 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:00.765112 kernel: audit: type=1327 audit(1707819000.362:2715): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:00.362000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:00.795757 kernel: audit: type=1105 audit(1707819000.367:2716): pid=12303 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.367000 audit[12303]: USER_START pid=12303 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.891778 kernel: audit: type=1103 audit(1707819000.368:2717): pid=12308 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.368000 audit[12308]: CRED_ACQ pid=12308 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.981717 kernel: audit: type=1106 audit(1707819000.444:2718): pid=12303 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.444000 audit[12303]: USER_END pid=12303 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.444000 audit[12303]: CRED_DISP pid=12303 uid=0 auid=500 ses=115 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:00.444000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@243-139.178.70.11:22-139.178.68.195:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:00.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@244-139.178.70.11:22-5.135.90.165:59148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:05.456032 systemd[1]: Started sshd@245-139.178.70.11:22-139.178.68.195:49178.service. Feb 13 10:10:05.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-139.178.70.11:22-139.178.68.195:49178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:05.483579 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:10:05.483657 kernel: audit: type=1130 audit(1707819005.454:2722): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-139.178.70.11:22-139.178.68.195:49178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:05.593000 audit[12336]: USER_ACCT pid=12336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.595701 sshd[12336]: Accepted publickey for core from 139.178.68.195 port 49178 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:05.597182 sshd[12336]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:05.599542 systemd-logind[1462]: New session 116 of user core. Feb 13 10:10:05.600167 systemd[1]: Started session-116.scope. Feb 13 10:10:05.680553 sshd[12336]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:05.681982 systemd[1]: sshd@245-139.178.70.11:22-139.178.68.195:49178.service: Deactivated successfully. Feb 13 10:10:05.682499 systemd[1]: session-116.scope: Deactivated successfully. Feb 13 10:10:05.682847 systemd-logind[1462]: Session 116 logged out. Waiting for processes to exit. Feb 13 10:10:05.683502 systemd-logind[1462]: Removed session 116. Feb 13 10:10:05.595000 audit[12336]: CRED_ACQ pid=12336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.781282 kernel: audit: type=1101 audit(1707819005.593:2723): pid=12336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.781320 kernel: audit: type=1103 audit(1707819005.595:2724): pid=12336 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.781337 kernel: audit: type=1006 audit(1707819005.595:2725): pid=12336 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=116 res=1 Feb 13 10:10:05.840768 kernel: audit: type=1300 audit(1707819005.595:2725): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d40e580 a2=3 a3=0 items=0 ppid=1 pid=12336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=116 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:05.595000 audit[12336]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d40e580 a2=3 a3=0 items=0 ppid=1 pid=12336 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=116 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:05.934231 kernel: audit: type=1327 audit(1707819005.595:2725): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:05.595000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:05.965103 kernel: audit: type=1105 audit(1707819005.600:2726): pid=12336 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.600000 audit[12336]: USER_START pid=12336 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:06.060795 kernel: audit: type=1103 audit(1707819005.601:2727): pid=12338 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.601000 audit[12338]: CRED_ACQ pid=12338 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:06.150682 kernel: audit: type=1106 audit(1707819005.679:2728): pid=12336 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.679000 audit[12336]: USER_END pid=12336 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:06.246858 kernel: audit: type=1104 audit(1707819005.679:2729): pid=12336 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.679000 audit[12336]: CRED_DISP pid=12336 uid=0 auid=500 ses=116 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:05.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@245-139.178.70.11:22-139.178.68.195:49178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:08.623770 systemd[1]: Started sshd@246-139.178.70.11:22-5.135.90.165:55242.service. Feb 13 10:10:08.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@246-139.178.70.11:22-5.135.90.165:55242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:08.784131 sshd[12375]: Unable to negotiate with 5.135.90.165 port 55242: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:10:08.786088 systemd[1]: sshd@246-139.178.70.11:22-5.135.90.165:55242.service: Deactivated successfully. Feb 13 10:10:08.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@246-139.178.70.11:22-5.135.90.165:55242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:10.685486 systemd[1]: Started sshd@247-139.178.70.11:22-139.178.68.195:39634.service. Feb 13 10:10:10.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@247-139.178.70.11:22-139.178.68.195:39634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:10.712607 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:10:10.712715 kernel: audit: type=1130 audit(1707819010.683:2733): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@247-139.178.70.11:22-139.178.68.195:39634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:10.824965 sshd[12379]: Accepted publickey for core from 139.178.68.195 port 39634 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:10.823000 audit[12379]: USER_ACCT pid=12379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:10.826157 sshd[12379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:10.828784 systemd-logind[1462]: New session 117 of user core. Feb 13 10:10:10.829297 systemd[1]: Started session-117.scope. Feb 13 10:10:10.824000 audit[12379]: CRED_ACQ pid=12379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.007378 kernel: audit: type=1101 audit(1707819010.823:2734): pid=12379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.007430 kernel: audit: type=1103 audit(1707819010.824:2735): pid=12379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.007484 kernel: audit: type=1006 audit(1707819010.824:2736): pid=12379 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=117 res=1 Feb 13 10:10:10.824000 audit[12379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff22fd6fb0 a2=3 a3=0 items=0 ppid=1 pid=12379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=117 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:11.159285 kernel: audit: type=1300 audit(1707819010.824:2736): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff22fd6fb0 a2=3 a3=0 items=0 ppid=1 pid=12379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=117 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:11.159392 kernel: audit: type=1327 audit(1707819010.824:2736): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:10.824000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:11.159582 sshd[12379]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:11.161110 systemd[1]: sshd@247-139.178.70.11:22-139.178.68.195:39634.service: Deactivated successfully. Feb 13 10:10:11.161554 systemd[1]: session-117.scope: Deactivated successfully. Feb 13 10:10:11.161926 systemd-logind[1462]: Session 117 logged out. Waiting for processes to exit. Feb 13 10:10:11.162357 systemd-logind[1462]: Removed session 117. Feb 13 10:10:10.829000 audit[12379]: USER_START pid=12379 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.285178 kernel: audit: type=1105 audit(1707819010.829:2737): pid=12379 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.285274 kernel: audit: type=1103 audit(1707819010.830:2738): pid=12381 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:10.830000 audit[12381]: CRED_ACQ pid=12381 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.158000 audit[12379]: USER_END pid=12379 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.470174 kernel: audit: type=1106 audit(1707819011.158:2739): pid=12379 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.470228 kernel: audit: type=1104 audit(1707819011.158:2740): pid=12379 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.158000 audit[12379]: CRED_DISP pid=12379 uid=0 auid=500 ses=117 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:11.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@247-139.178.70.11:22-139.178.68.195:39634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:14.230698 systemd[1]: Started sshd@248-139.178.70.11:22-5.135.90.165:51196.service. Feb 13 10:10:14.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@248-139.178.70.11:22-5.135.90.165:51196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:14.411189 sshd[12431]: Unable to negotiate with 5.135.90.165 port 51196: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:10:14.413023 systemd[1]: sshd@248-139.178.70.11:22-5.135.90.165:51196.service: Deactivated successfully. Feb 13 10:10:14.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@248-139.178.70.11:22-5.135.90.165:51196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:16.113020 systemd[1]: Started sshd@249-139.178.70.11:22-139.178.68.195:51758.service. Feb 13 10:10:16.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-139.178.70.11:22-139.178.68.195:51758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:16.140562 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:10:16.140690 kernel: audit: type=1130 audit(1707819016.111:2744): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-139.178.70.11:22-139.178.68.195:51758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:16.249000 audit[12435]: USER_ACCT pid=12435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.251466 sshd[12435]: Accepted publickey for core from 139.178.68.195 port 51758 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:16.254211 sshd[12435]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:16.257025 systemd-logind[1462]: New session 118 of user core. Feb 13 10:10:16.257647 systemd[1]: Started session-118.scope. Feb 13 10:10:16.336912 sshd[12435]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:16.338434 systemd[1]: sshd@249-139.178.70.11:22-139.178.68.195:51758.service: Deactivated successfully. Feb 13 10:10:16.338895 systemd[1]: session-118.scope: Deactivated successfully. Feb 13 10:10:16.339294 systemd-logind[1462]: Session 118 logged out. Waiting for processes to exit. Feb 13 10:10:16.339732 systemd-logind[1462]: Removed session 118. Feb 13 10:10:16.252000 audit[12435]: CRED_ACQ pid=12435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.433732 kernel: audit: type=1101 audit(1707819016.249:2745): pid=12435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.433808 kernel: audit: type=1103 audit(1707819016.252:2746): pid=12435 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.433868 kernel: audit: type=1006 audit(1707819016.252:2747): pid=12435 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=118 res=1 Feb 13 10:10:16.252000 audit[12435]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdf32bb40 a2=3 a3=0 items=0 ppid=1 pid=12435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=118 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:16.584701 kernel: audit: type=1300 audit(1707819016.252:2747): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdf32bb40 a2=3 a3=0 items=0 ppid=1 pid=12435 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=118 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:16.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:16.584857 kernel: audit: type=1327 audit(1707819016.252:2747): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:16.258000 audit[12435]: USER_START pid=12435 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.709779 kernel: audit: type=1105 audit(1707819016.258:2748): pid=12435 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.259000 audit[12437]: CRED_ACQ pid=12437 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.335000 audit[12435]: USER_END pid=12435 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.894736 kernel: audit: type=1103 audit(1707819016.259:2749): pid=12437 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.894773 kernel: audit: type=1106 audit(1707819016.335:2750): pid=12435 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.894790 kernel: audit: type=1104 audit(1707819016.335:2751): pid=12435 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.335000 audit[12435]: CRED_DISP pid=12435 uid=0 auid=500 ses=118 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:16.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@249-139.178.70.11:22-139.178.68.195:51758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:20.876259 systemd[1]: Started sshd@250-139.178.70.11:22-5.135.90.165:47158.service. Feb 13 10:10:20.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@250-139.178.70.11:22-5.135.90.165:47158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:21.043570 sshd[12460]: Unable to negotiate with 5.135.90.165 port 47158: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:10:21.045530 systemd[1]: sshd@250-139.178.70.11:22-5.135.90.165:47158.service: Deactivated successfully. Feb 13 10:10:21.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@250-139.178.70.11:22-5.135.90.165:47158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:21.345978 systemd[1]: Started sshd@251-139.178.70.11:22-139.178.68.195:51774.service. Feb 13 10:10:21.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@251-139.178.70.11:22-139.178.68.195:51774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:21.372908 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:10:21.372968 kernel: audit: type=1130 audit(1707819021.345:2755): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@251-139.178.70.11:22-139.178.68.195:51774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:21.481000 audit[12464]: USER_ACCT pid=12464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.482703 sshd[12464]: Accepted publickey for core from 139.178.68.195 port 51774 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:21.484080 sshd[12464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:21.486505 systemd-logind[1462]: New session 119 of user core. Feb 13 10:10:21.487178 systemd[1]: Started session-119.scope. Feb 13 10:10:21.567010 sshd[12464]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:21.568469 systemd[1]: sshd@251-139.178.70.11:22-139.178.68.195:51774.service: Deactivated successfully. Feb 13 10:10:21.568916 systemd[1]: session-119.scope: Deactivated successfully. Feb 13 10:10:21.569282 systemd-logind[1462]: Session 119 logged out. Waiting for processes to exit. Feb 13 10:10:21.569694 systemd-logind[1462]: Removed session 119. Feb 13 10:10:21.482000 audit[12464]: CRED_ACQ pid=12464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.664711 kernel: audit: type=1101 audit(1707819021.481:2756): pid=12464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.664751 kernel: audit: type=1103 audit(1707819021.482:2757): pid=12464 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.664770 kernel: audit: type=1006 audit(1707819021.483:2758): pid=12464 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=119 res=1 Feb 13 10:10:21.723432 kernel: audit: type=1300 audit(1707819021.483:2758): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8db80c10 a2=3 a3=0 items=0 ppid=1 pid=12464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=119 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:21.483000 audit[12464]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8db80c10 a2=3 a3=0 items=0 ppid=1 pid=12464 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=119 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:21.815551 kernel: audit: type=1327 audit(1707819021.483:2758): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:21.483000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:21.846020 kernel: audit: type=1105 audit(1707819021.488:2759): pid=12464 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.488000 audit[12464]: USER_START pid=12464 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.940612 kernel: audit: type=1103 audit(1707819021.488:2760): pid=12466 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.488000 audit[12466]: CRED_ACQ pid=12466 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:22.029920 kernel: audit: type=1106 audit(1707819021.566:2761): pid=12464 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.566000 audit[12464]: USER_END pid=12464 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:22.125478 kernel: audit: type=1104 audit(1707819021.566:2762): pid=12464 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.566000 audit[12464]: CRED_DISP pid=12464 uid=0 auid=500 ses=119 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:21.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@251-139.178.70.11:22-139.178.68.195:51774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:26.578985 systemd[1]: Started sshd@252-139.178.70.11:22-139.178.68.195:36528.service. Feb 13 10:10:26.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@252-139.178.70.11:22-139.178.68.195:36528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:26.606548 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 13 10:10:26.606592 kernel: audit: type=1130 audit(1707819026.578:2764): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@252-139.178.70.11:22-139.178.68.195:36528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:26.717000 audit[12488]: USER_ACCT pid=12488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.718682 sshd[12488]: Accepted publickey for core from 139.178.68.195 port 36528 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:26.720172 sshd[12488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:26.722508 systemd-logind[1462]: New session 120 of user core. Feb 13 10:10:26.723161 systemd[1]: Started session-120.scope. Feb 13 10:10:26.801868 sshd[12488]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:26.803351 systemd[1]: sshd@252-139.178.70.11:22-139.178.68.195:36528.service: Deactivated successfully. Feb 13 10:10:26.803806 systemd[1]: session-120.scope: Deactivated successfully. Feb 13 10:10:26.804163 systemd-logind[1462]: Session 120 logged out. Waiting for processes to exit. Feb 13 10:10:26.804663 systemd-logind[1462]: Removed session 120. Feb 13 10:10:26.719000 audit[12488]: CRED_ACQ pid=12488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.900925 kernel: audit: type=1101 audit(1707819026.717:2765): pid=12488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.900963 kernel: audit: type=1103 audit(1707819026.719:2766): pid=12488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.900986 kernel: audit: type=1006 audit(1707819026.719:2767): pid=12488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=120 res=1 Feb 13 10:10:26.959810 kernel: audit: type=1300 audit(1707819026.719:2767): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2e19a7c0 a2=3 a3=0 items=0 ppid=1 pid=12488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=120 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:26.719000 audit[12488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2e19a7c0 a2=3 a3=0 items=0 ppid=1 pid=12488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=120 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:27.052021 kernel: audit: type=1327 audit(1707819026.719:2767): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:26.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:27.082518 kernel: audit: type=1105 audit(1707819026.724:2768): pid=12488 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.724000 audit[12488]: USER_START pid=12488 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:27.141341 systemd[1]: Started sshd@253-139.178.70.11:22-5.135.90.165:43246.service. Feb 13 10:10:27.177202 kernel: audit: type=1103 audit(1707819026.724:2769): pid=12490 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.724000 audit[12490]: CRED_ACQ pid=12490 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:27.266586 kernel: audit: type=1106 audit(1707819026.801:2770): pid=12488 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.801000 audit[12488]: USER_END pid=12488 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:27.294910 sshd[12513]: Unable to negotiate with 5.135.90.165 port 43246: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:10:27.295256 systemd[1]: sshd@253-139.178.70.11:22-5.135.90.165:43246.service: Deactivated successfully. Feb 13 10:10:27.362257 kernel: audit: type=1104 audit(1707819026.801:2771): pid=12488 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.801000 audit[12488]: CRED_DISP pid=12488 uid=0 auid=500 ses=120 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:26.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@252-139.178.70.11:22-139.178.68.195:36528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:27.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@253-139.178.70.11:22-5.135.90.165:43246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:27.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@253-139.178.70.11:22-5.135.90.165:43246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:31.811710 systemd[1]: Started sshd@254-139.178.70.11:22-139.178.68.195:36544.service. Feb 13 10:10:31.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@254-139.178.70.11:22-139.178.68.195:36544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:31.838544 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 13 10:10:31.838647 kernel: audit: type=1130 audit(1707819031.810:2775): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@254-139.178.70.11:22-139.178.68.195:36544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:31.948000 audit[12538]: USER_ACCT pid=12538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:31.949457 sshd[12538]: Accepted publickey for core from 139.178.68.195 port 36544 ssh2: RSA SHA256:wM1bdaCPwerSW1mOnJZTsZDRswKX2qe3WXCkDWmUy9w Feb 13 10:10:31.950053 sshd[12538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 10:10:31.952235 systemd-logind[1462]: New session 121 of user core. Feb 13 10:10:31.952745 systemd[1]: Started session-121.scope. Feb 13 10:10:32.031301 sshd[12538]: pam_unix(sshd:session): session closed for user core Feb 13 10:10:32.032680 systemd[1]: sshd@254-139.178.70.11:22-139.178.68.195:36544.service: Deactivated successfully. Feb 13 10:10:32.033139 systemd[1]: session-121.scope: Deactivated successfully. Feb 13 10:10:32.033472 systemd-logind[1462]: Session 121 logged out. Waiting for processes to exit. Feb 13 10:10:32.033849 systemd-logind[1462]: Removed session 121. Feb 13 10:10:31.949000 audit[12538]: CRED_ACQ pid=12538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.131677 kernel: audit: type=1101 audit(1707819031.948:2776): pid=12538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.131726 kernel: audit: type=1103 audit(1707819031.949:2777): pid=12538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.131746 kernel: audit: type=1006 audit(1707819031.949:2778): pid=12538 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=121 res=1 Feb 13 10:10:32.190515 kernel: audit: type=1300 audit(1707819031.949:2778): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd005ac9f0 a2=3 a3=0 items=0 ppid=1 pid=12538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=121 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:31.949000 audit[12538]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd005ac9f0 a2=3 a3=0 items=0 ppid=1 pid=12538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=121 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 10:10:32.282768 kernel: audit: type=1327 audit(1707819031.949:2778): proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:31.949000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 10:10:31.953000 audit[12538]: USER_START pid=12538 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.407930 kernel: audit: type=1105 audit(1707819031.953:2779): pid=12538 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.407966 kernel: audit: type=1103 audit(1707819031.954:2780): pid=12540 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:31.954000 audit[12540]: CRED_ACQ pid=12540 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.497344 kernel: audit: type=1106 audit(1707819032.031:2781): pid=12538 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.031000 audit[12538]: USER_END pid=12538 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.593018 kernel: audit: type=1104 audit(1707819032.031:2782): pid=12538 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.031000 audit[12538]: CRED_DISP pid=12538 uid=0 auid=500 ses=121 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 10:10:32.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@254-139.178.70.11:22-139.178.68.195:36544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:33.530685 systemd[1]: Started sshd@255-139.178.70.11:22-5.135.90.165:39316.service. Feb 13 10:10:33.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@255-139.178.70.11:22-5.135.90.165:39316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 10:10:33.712779 sshd[12564]: Unable to negotiate with 5.135.90.165 port 39316: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth] Feb 13 10:10:33.714545 systemd[1]: sshd@255-139.178.70.11:22-5.135.90.165:39316.service: Deactivated successfully. Feb 13 10:10:33.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@255-139.178.70.11:22-5.135.90.165:39316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'