Apr 12 20:10:22.548746 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Apr 12 20:10:22.548758 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 20:10:22.548765 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:10:22.548769 kernel: BIOS-provided physical RAM map: Apr 12 20:10:22.548773 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Apr 12 20:10:22.548776 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Apr 12 20:10:22.548781 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Apr 12 20:10:22.548785 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Apr 12 20:10:22.548789 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Apr 12 20:10:22.548793 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000061f6dfff] usable Apr 12 20:10:22.548797 kernel: BIOS-e820: [mem 0x0000000061f6e000-0x0000000061f6efff] ACPI NVS Apr 12 20:10:22.548801 kernel: BIOS-e820: [mem 0x0000000061f6f000-0x0000000061f6ffff] reserved Apr 12 20:10:22.548804 kernel: BIOS-e820: [mem 0x0000000061f70000-0x000000006c0c4fff] usable Apr 12 20:10:22.548808 kernel: BIOS-e820: [mem 0x000000006c0c5000-0x000000006d1a7fff] reserved Apr 12 20:10:22.548813 kernel: BIOS-e820: [mem 0x000000006d1a8000-0x000000006d330fff] usable Apr 12 20:10:22.548818 kernel: BIOS-e820: [mem 0x000000006d331000-0x000000006d762fff] ACPI NVS Apr 12 20:10:22.548822 kernel: BIOS-e820: [mem 0x000000006d763000-0x000000006fffefff] reserved Apr 12 20:10:22.548826 kernel: BIOS-e820: [mem 0x000000006ffff000-0x000000006fffffff] usable Apr 12 20:10:22.548830 kernel: BIOS-e820: [mem 0x0000000070000000-0x000000007b7fffff] reserved Apr 12 20:10:22.548834 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Apr 12 20:10:22.548838 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Apr 12 20:10:22.548842 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Apr 12 20:10:22.548847 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Apr 12 20:10:22.548851 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Apr 12 20:10:22.548855 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000008837fffff] usable Apr 12 20:10:22.548860 kernel: NX (Execute Disable) protection: active Apr 12 20:10:22.548864 kernel: SMBIOS 3.2.1 present. Apr 12 20:10:22.548868 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Apr 12 20:10:22.548872 kernel: tsc: Detected 3400.000 MHz processor Apr 12 20:10:22.548876 kernel: tsc: Detected 3399.906 MHz TSC Apr 12 20:10:22.548880 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 20:10:22.548885 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 20:10:22.548889 kernel: last_pfn = 0x883800 max_arch_pfn = 0x400000000 Apr 12 20:10:22.548894 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 20:10:22.548898 kernel: last_pfn = 0x70000 max_arch_pfn = 0x400000000 Apr 12 20:10:22.548902 kernel: Using GB pages for direct mapping Apr 12 20:10:22.548907 kernel: ACPI: Early table checksum verification disabled Apr 12 20:10:22.548911 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Apr 12 20:10:22.548916 kernel: ACPI: XSDT 0x000000006D6440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Apr 12 20:10:22.548920 kernel: ACPI: FACP 0x000000006D680620 000114 (v06 01072009 AMI 00010013) Apr 12 20:10:22.548926 kernel: ACPI: DSDT 0x000000006D644268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Apr 12 20:10:22.548931 kernel: ACPI: FACS 0x000000006D762F80 000040 Apr 12 20:10:22.548936 kernel: ACPI: APIC 0x000000006D680738 00012C (v04 01072009 AMI 00010013) Apr 12 20:10:22.548941 kernel: ACPI: FPDT 0x000000006D680868 000044 (v01 01072009 AMI 00010013) Apr 12 20:10:22.548945 kernel: ACPI: FIDT 0x000000006D6808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Apr 12 20:10:22.548950 kernel: ACPI: MCFG 0x000000006D680950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Apr 12 20:10:22.548954 kernel: ACPI: SPMI 0x000000006D680990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Apr 12 20:10:22.548959 kernel: ACPI: SSDT 0x000000006D6809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Apr 12 20:10:22.548964 kernel: ACPI: SSDT 0x000000006D6824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Apr 12 20:10:22.548969 kernel: ACPI: SSDT 0x000000006D6856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Apr 12 20:10:22.548974 kernel: ACPI: HPET 0x000000006D6879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:10:22.548978 kernel: ACPI: SSDT 0x000000006D687A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Apr 12 20:10:22.548983 kernel: ACPI: SSDT 0x000000006D6889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Apr 12 20:10:22.548987 kernel: ACPI: UEFI 0x000000006D6892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:10:22.548992 kernel: ACPI: LPIT 0x000000006D689318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:10:22.548997 kernel: ACPI: SSDT 0x000000006D6893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Apr 12 20:10:22.549001 kernel: ACPI: SSDT 0x000000006D68BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Apr 12 20:10:22.549006 kernel: ACPI: DBGP 0x000000006D68D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:10:22.549011 kernel: ACPI: DBG2 0x000000006D68D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Apr 12 20:10:22.549016 kernel: ACPI: SSDT 0x000000006D68D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Apr 12 20:10:22.549020 kernel: ACPI: DMAR 0x000000006D68EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Apr 12 20:10:22.549025 kernel: ACPI: SSDT 0x000000006D68ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Apr 12 20:10:22.549029 kernel: ACPI: TPM2 0x000000006D68EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Apr 12 20:10:22.549034 kernel: ACPI: SSDT 0x000000006D68EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Apr 12 20:10:22.549039 kernel: ACPI: WSMT 0x000000006D68FC28 000028 (v01 \xf0a 01072009 AMI 00010013) Apr 12 20:10:22.549043 kernel: ACPI: EINJ 0x000000006D68FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Apr 12 20:10:22.549049 kernel: ACPI: ERST 0x000000006D68FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Apr 12 20:10:22.549053 kernel: ACPI: BERT 0x000000006D68FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Apr 12 20:10:22.549058 kernel: ACPI: HEST 0x000000006D68FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Apr 12 20:10:22.549063 kernel: ACPI: SSDT 0x000000006D690260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Apr 12 20:10:22.549067 kernel: ACPI: Reserving FACP table memory at [mem 0x6d680620-0x6d680733] Apr 12 20:10:22.549072 kernel: ACPI: Reserving DSDT table memory at [mem 0x6d644268-0x6d68061e] Apr 12 20:10:22.549076 kernel: ACPI: Reserving FACS table memory at [mem 0x6d762f80-0x6d762fbf] Apr 12 20:10:22.549081 kernel: ACPI: Reserving APIC table memory at [mem 0x6d680738-0x6d680863] Apr 12 20:10:22.549086 kernel: ACPI: Reserving FPDT table memory at [mem 0x6d680868-0x6d6808ab] Apr 12 20:10:22.549091 kernel: ACPI: Reserving FIDT table memory at [mem 0x6d6808b0-0x6d68094b] Apr 12 20:10:22.549095 kernel: ACPI: Reserving MCFG table memory at [mem 0x6d680950-0x6d68098b] Apr 12 20:10:22.549100 kernel: ACPI: Reserving SPMI table memory at [mem 0x6d680990-0x6d6809d0] Apr 12 20:10:22.549105 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6809d8-0x6d6824f3] Apr 12 20:10:22.549109 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6824f8-0x6d6856bd] Apr 12 20:10:22.549114 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6856c0-0x6d6879ea] Apr 12 20:10:22.549118 kernel: ACPI: Reserving HPET table memory at [mem 0x6d6879f0-0x6d687a27] Apr 12 20:10:22.549123 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d687a28-0x6d6889d5] Apr 12 20:10:22.549127 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6889d8-0x6d6892ce] Apr 12 20:10:22.549133 kernel: ACPI: Reserving UEFI table memory at [mem 0x6d6892d0-0x6d689311] Apr 12 20:10:22.549137 kernel: ACPI: Reserving LPIT table memory at [mem 0x6d689318-0x6d6893ab] Apr 12 20:10:22.549142 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d6893b0-0x6d68bb8d] Apr 12 20:10:22.549146 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68bb90-0x6d68d071] Apr 12 20:10:22.549151 kernel: ACPI: Reserving DBGP table memory at [mem 0x6d68d078-0x6d68d0ab] Apr 12 20:10:22.549156 kernel: ACPI: Reserving DBG2 table memory at [mem 0x6d68d0b0-0x6d68d103] Apr 12 20:10:22.549160 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68d108-0x6d68ec6e] Apr 12 20:10:22.549165 kernel: ACPI: Reserving DMAR table memory at [mem 0x6d68ec70-0x6d68ed17] Apr 12 20:10:22.549169 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ed18-0x6d68ee5b] Apr 12 20:10:22.549175 kernel: ACPI: Reserving TPM2 table memory at [mem 0x6d68ee60-0x6d68ee93] Apr 12 20:10:22.549179 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d68ee98-0x6d68fc26] Apr 12 20:10:22.549184 kernel: ACPI: Reserving WSMT table memory at [mem 0x6d68fc28-0x6d68fc4f] Apr 12 20:10:22.549188 kernel: ACPI: Reserving EINJ table memory at [mem 0x6d68fc50-0x6d68fd7f] Apr 12 20:10:22.549193 kernel: ACPI: Reserving ERST table memory at [mem 0x6d68fd80-0x6d68ffaf] Apr 12 20:10:22.549197 kernel: ACPI: Reserving BERT table memory at [mem 0x6d68ffb0-0x6d68ffdf] Apr 12 20:10:22.549202 kernel: ACPI: Reserving HEST table memory at [mem 0x6d68ffe0-0x6d69025b] Apr 12 20:10:22.549207 kernel: ACPI: Reserving SSDT table memory at [mem 0x6d690260-0x6d6903c1] Apr 12 20:10:22.549211 kernel: No NUMA configuration found Apr 12 20:10:22.549217 kernel: Faking a node at [mem 0x0000000000000000-0x00000008837fffff] Apr 12 20:10:22.549221 kernel: NODE_DATA(0) allocated [mem 0x8837fa000-0x8837fffff] Apr 12 20:10:22.549226 kernel: Zone ranges: Apr 12 20:10:22.549230 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 20:10:22.549235 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 20:10:22.549240 kernel: Normal [mem 0x0000000100000000-0x00000008837fffff] Apr 12 20:10:22.549244 kernel: Movable zone start for each node Apr 12 20:10:22.549249 kernel: Early memory node ranges Apr 12 20:10:22.549253 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Apr 12 20:10:22.549259 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Apr 12 20:10:22.549263 kernel: node 0: [mem 0x0000000040400000-0x0000000061f6dfff] Apr 12 20:10:22.549268 kernel: node 0: [mem 0x0000000061f70000-0x000000006c0c4fff] Apr 12 20:10:22.549272 kernel: node 0: [mem 0x000000006d1a8000-0x000000006d330fff] Apr 12 20:10:22.549277 kernel: node 0: [mem 0x000000006ffff000-0x000000006fffffff] Apr 12 20:10:22.549282 kernel: node 0: [mem 0x0000000100000000-0x00000008837fffff] Apr 12 20:10:22.549286 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000008837fffff] Apr 12 20:10:22.549295 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 20:10:22.549300 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Apr 12 20:10:22.549305 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Apr 12 20:10:22.549310 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Apr 12 20:10:22.549315 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Apr 12 20:10:22.549320 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Apr 12 20:10:22.549325 kernel: On node 0, zone Normal: 18432 pages in unavailable ranges Apr 12 20:10:22.549330 kernel: ACPI: PM-Timer IO Port: 0x1808 Apr 12 20:10:22.549335 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Apr 12 20:10:22.549340 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Apr 12 20:10:22.549346 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Apr 12 20:10:22.549351 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Apr 12 20:10:22.549355 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Apr 12 20:10:22.549360 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Apr 12 20:10:22.549365 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Apr 12 20:10:22.549370 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Apr 12 20:10:22.549375 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Apr 12 20:10:22.549380 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Apr 12 20:10:22.549385 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Apr 12 20:10:22.549390 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Apr 12 20:10:22.549395 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Apr 12 20:10:22.549400 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Apr 12 20:10:22.549405 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Apr 12 20:10:22.549410 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Apr 12 20:10:22.549415 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Apr 12 20:10:22.549419 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 20:10:22.549424 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 20:10:22.549429 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 20:10:22.549435 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 20:10:22.549440 kernel: TSC deadline timer available Apr 12 20:10:22.549447 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Apr 12 20:10:22.549452 kernel: [mem 0x7b800000-0xdfffffff] available for PCI devices Apr 12 20:10:22.549474 kernel: Booting paravirtualized kernel on bare hardware Apr 12 20:10:22.549479 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 20:10:22.549484 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Apr 12 20:10:22.549489 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Apr 12 20:10:22.549494 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Apr 12 20:10:22.549500 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Apr 12 20:10:22.549518 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8190323 Apr 12 20:10:22.549523 kernel: Policy zone: Normal Apr 12 20:10:22.549529 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:10:22.549534 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 20:10:22.549539 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Apr 12 20:10:22.549544 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Apr 12 20:10:22.549549 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 20:10:22.549555 kernel: Memory: 32553612K/33281940K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 728068K reserved, 0K cma-reserved) Apr 12 20:10:22.549560 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Apr 12 20:10:22.549565 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 20:10:22.549570 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 20:10:22.549575 kernel: rcu: Hierarchical RCU implementation. Apr 12 20:10:22.549580 kernel: rcu: RCU event tracing is enabled. Apr 12 20:10:22.549585 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Apr 12 20:10:22.549589 kernel: Rude variant of Tasks RCU enabled. Apr 12 20:10:22.549594 kernel: Tracing variant of Tasks RCU enabled. Apr 12 20:10:22.549600 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 20:10:22.549605 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Apr 12 20:10:22.549610 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Apr 12 20:10:22.549615 kernel: random: crng init done Apr 12 20:10:22.549620 kernel: Console: colour dummy device 80x25 Apr 12 20:10:22.549625 kernel: printk: console [tty0] enabled Apr 12 20:10:22.549629 kernel: printk: console [ttyS1] enabled Apr 12 20:10:22.549634 kernel: ACPI: Core revision 20210730 Apr 12 20:10:22.549639 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Apr 12 20:10:22.549645 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 20:10:22.549650 kernel: DMAR: Host address width 39 Apr 12 20:10:22.549655 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Apr 12 20:10:22.549660 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Apr 12 20:10:22.549665 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Apr 12 20:10:22.549670 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Apr 12 20:10:22.549675 kernel: DMAR: RMRR base: 0x0000006e011000 end: 0x0000006e25afff Apr 12 20:10:22.549680 kernel: DMAR: RMRR base: 0x00000079000000 end: 0x0000007b7fffff Apr 12 20:10:22.549685 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Apr 12 20:10:22.549691 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Apr 12 20:10:22.549696 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Apr 12 20:10:22.549701 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Apr 12 20:10:22.549705 kernel: x2apic enabled Apr 12 20:10:22.549710 kernel: Switched APIC routing to cluster x2apic. Apr 12 20:10:22.549715 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 20:10:22.549720 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Apr 12 20:10:22.549725 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Apr 12 20:10:22.549730 kernel: CPU0: Thermal monitoring enabled (TM1) Apr 12 20:10:22.549736 kernel: process: using mwait in idle threads Apr 12 20:10:22.549741 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Apr 12 20:10:22.549746 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Apr 12 20:10:22.549750 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 20:10:22.549756 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Apr 12 20:10:22.549761 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 20:10:22.549765 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 20:10:22.549770 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Apr 12 20:10:22.549775 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 20:10:22.549781 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Apr 12 20:10:22.549786 kernel: RETBleed: Mitigation: Enhanced IBRS Apr 12 20:10:22.549791 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 20:10:22.549796 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 20:10:22.549801 kernel: TAA: Mitigation: TSX disabled Apr 12 20:10:22.549806 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Apr 12 20:10:22.549811 kernel: SRBDS: Mitigation: Microcode Apr 12 20:10:22.549815 kernel: GDS: Vulnerable: No microcode Apr 12 20:10:22.549820 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 20:10:22.549826 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 20:10:22.549831 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 20:10:22.549836 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Apr 12 20:10:22.549841 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Apr 12 20:10:22.549846 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 20:10:22.549851 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Apr 12 20:10:22.549855 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Apr 12 20:10:22.549860 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Apr 12 20:10:22.549866 kernel: Freeing SMP alternatives memory: 32K Apr 12 20:10:22.549871 kernel: pid_max: default: 32768 minimum: 301 Apr 12 20:10:22.549876 kernel: LSM: Security Framework initializing Apr 12 20:10:22.549881 kernel: SELinux: Initializing. Apr 12 20:10:22.549886 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:10:22.549891 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 20:10:22.549896 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Apr 12 20:10:22.549901 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Apr 12 20:10:22.549906 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Apr 12 20:10:22.549911 kernel: ... version: 4 Apr 12 20:10:22.549916 kernel: ... bit width: 48 Apr 12 20:10:22.549921 kernel: ... generic registers: 4 Apr 12 20:10:22.549926 kernel: ... value mask: 0000ffffffffffff Apr 12 20:10:22.549931 kernel: ... max period: 00007fffffffffff Apr 12 20:10:22.549936 kernel: ... fixed-purpose events: 3 Apr 12 20:10:22.549941 kernel: ... event mask: 000000070000000f Apr 12 20:10:22.549945 kernel: signal: max sigframe size: 2032 Apr 12 20:10:22.549950 kernel: rcu: Hierarchical SRCU implementation. Apr 12 20:10:22.549955 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Apr 12 20:10:22.549961 kernel: smp: Bringing up secondary CPUs ... Apr 12 20:10:22.549966 kernel: x86: Booting SMP configuration: Apr 12 20:10:22.549971 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Apr 12 20:10:22.549976 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 20:10:22.549981 kernel: #9 #10 #11 #12 #13 #14 #15 Apr 12 20:10:22.549986 kernel: smp: Brought up 1 node, 16 CPUs Apr 12 20:10:22.549991 kernel: smpboot: Max logical packages: 1 Apr 12 20:10:22.549996 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Apr 12 20:10:22.550001 kernel: devtmpfs: initialized Apr 12 20:10:22.550006 kernel: x86/mm: Memory block size: 128MB Apr 12 20:10:22.550011 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x61f6e000-0x61f6efff] (4096 bytes) Apr 12 20:10:22.550016 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6d331000-0x6d762fff] (4399104 bytes) Apr 12 20:10:22.550021 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 20:10:22.550026 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Apr 12 20:10:22.550031 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 20:10:22.550036 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 20:10:22.550041 kernel: audit: initializing netlink subsys (disabled) Apr 12 20:10:22.550047 kernel: audit: type=2000 audit(1712952616.113:1): state=initialized audit_enabled=0 res=1 Apr 12 20:10:22.550052 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 20:10:22.550056 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 20:10:22.550061 kernel: cpuidle: using governor menu Apr 12 20:10:22.550066 kernel: ACPI: bus type PCI registered Apr 12 20:10:22.550071 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 20:10:22.550076 kernel: dca service started, version 1.12.1 Apr 12 20:10:22.550081 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Apr 12 20:10:22.550086 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Apr 12 20:10:22.550092 kernel: PCI: Using configuration type 1 for base access Apr 12 20:10:22.550097 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Apr 12 20:10:22.550101 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 20:10:22.550106 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 20:10:22.550111 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 20:10:22.550116 kernel: ACPI: Added _OSI(Module Device) Apr 12 20:10:22.550121 kernel: ACPI: Added _OSI(Processor Device) Apr 12 20:10:22.550126 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 20:10:22.550131 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 20:10:22.550136 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 20:10:22.550141 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 20:10:22.550146 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 20:10:22.550151 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Apr 12 20:10:22.550156 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:10:22.550161 kernel: ACPI: SSDT 0xFFFF8A87C0223B00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Apr 12 20:10:22.550166 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Apr 12 20:10:22.550171 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:10:22.550176 kernel: ACPI: SSDT 0xFFFF8A87C1CF4C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Apr 12 20:10:22.550181 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:10:22.550186 kernel: ACPI: SSDT 0xFFFF8A87C1C61000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Apr 12 20:10:22.550191 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:10:22.550196 kernel: ACPI: SSDT 0xFFFF8A87C1D56000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Apr 12 20:10:22.550201 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:10:22.550205 kernel: ACPI: SSDT 0xFFFF8A87C0154000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Apr 12 20:10:22.550210 kernel: ACPI: Dynamic OEM Table Load: Apr 12 20:10:22.550215 kernel: ACPI: SSDT 0xFFFF8A87C1CF0C00 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Apr 12 20:10:22.550220 kernel: ACPI: Interpreter enabled Apr 12 20:10:22.550225 kernel: ACPI: PM: (supports S0 S5) Apr 12 20:10:22.550231 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 20:10:22.550235 kernel: HEST: Enabling Firmware First mode for corrected errors. Apr 12 20:10:22.550240 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Apr 12 20:10:22.550245 kernel: HEST: Table parsing has been initialized. Apr 12 20:10:22.550250 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Apr 12 20:10:22.550255 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 20:10:22.550260 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Apr 12 20:10:22.550265 kernel: ACPI: PM: Power Resource [USBC] Apr 12 20:10:22.550270 kernel: ACPI: PM: Power Resource [V0PR] Apr 12 20:10:22.550275 kernel: ACPI: PM: Power Resource [V1PR] Apr 12 20:10:22.550280 kernel: ACPI: PM: Power Resource [V2PR] Apr 12 20:10:22.550285 kernel: ACPI: PM: Power Resource [WRST] Apr 12 20:10:22.550290 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Apr 12 20:10:22.550295 kernel: ACPI: PM: Power Resource [FN00] Apr 12 20:10:22.550300 kernel: ACPI: PM: Power Resource [FN01] Apr 12 20:10:22.550305 kernel: ACPI: PM: Power Resource [FN02] Apr 12 20:10:22.550310 kernel: ACPI: PM: Power Resource [FN03] Apr 12 20:10:22.550314 kernel: ACPI: PM: Power Resource [FN04] Apr 12 20:10:22.550320 kernel: ACPI: PM: Power Resource [PIN] Apr 12 20:10:22.550325 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Apr 12 20:10:22.550388 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 20:10:22.550433 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Apr 12 20:10:22.550495 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Apr 12 20:10:22.550518 kernel: PCI host bridge to bus 0000:00 Apr 12 20:10:22.550562 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 20:10:22.550601 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 20:10:22.550639 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 20:10:22.550676 kernel: pci_bus 0000:00: root bus resource [mem 0x7b800000-0xdfffffff window] Apr 12 20:10:22.550713 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Apr 12 20:10:22.550749 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Apr 12 20:10:22.550798 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Apr 12 20:10:22.550849 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Apr 12 20:10:22.550894 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.550941 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Apr 12 20:10:22.550984 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.551029 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Apr 12 20:10:22.551072 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x7c000000-0x7cffffff 64bit] Apr 12 20:10:22.551114 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Apr 12 20:10:22.551157 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Apr 12 20:10:22.551203 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Apr 12 20:10:22.551246 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x7e51f000-0x7e51ffff 64bit] Apr 12 20:10:22.551291 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Apr 12 20:10:22.551333 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x7e51e000-0x7e51efff 64bit] Apr 12 20:10:22.551378 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Apr 12 20:10:22.551422 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x7e500000-0x7e50ffff 64bit] Apr 12 20:10:22.551484 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Apr 12 20:10:22.551547 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Apr 12 20:10:22.551588 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x7e512000-0x7e513fff 64bit] Apr 12 20:10:22.551629 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x7e51d000-0x7e51dfff 64bit] Apr 12 20:10:22.551673 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Apr 12 20:10:22.551717 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:10:22.551761 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Apr 12 20:10:22.551803 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:10:22.551849 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Apr 12 20:10:22.551897 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x7e51a000-0x7e51afff 64bit] Apr 12 20:10:22.551940 kernel: pci 0000:00:16.0: PME# supported from D3hot Apr 12 20:10:22.551985 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Apr 12 20:10:22.552029 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x7e519000-0x7e519fff 64bit] Apr 12 20:10:22.552069 kernel: pci 0000:00:16.1: PME# supported from D3hot Apr 12 20:10:22.552114 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Apr 12 20:10:22.552156 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x7e518000-0x7e518fff 64bit] Apr 12 20:10:22.552197 kernel: pci 0000:00:16.4: PME# supported from D3hot Apr 12 20:10:22.552241 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Apr 12 20:10:22.552284 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x7e510000-0x7e511fff] Apr 12 20:10:22.552325 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x7e517000-0x7e5170ff] Apr 12 20:10:22.552366 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Apr 12 20:10:22.552408 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Apr 12 20:10:22.552453 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Apr 12 20:10:22.552532 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x7e516000-0x7e5167ff] Apr 12 20:10:22.552575 kernel: pci 0000:00:17.0: PME# supported from D3hot Apr 12 20:10:22.552625 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Apr 12 20:10:22.552668 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.552713 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Apr 12 20:10:22.552755 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.552803 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Apr 12 20:10:22.552845 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.552892 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Apr 12 20:10:22.552934 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.552980 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Apr 12 20:10:22.553022 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.553070 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Apr 12 20:10:22.553111 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Apr 12 20:10:22.553158 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Apr 12 20:10:22.553204 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Apr 12 20:10:22.553245 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x7e514000-0x7e5140ff 64bit] Apr 12 20:10:22.553287 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Apr 12 20:10:22.553333 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Apr 12 20:10:22.553376 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Apr 12 20:10:22.553418 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:10:22.553492 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Apr 12 20:10:22.553558 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Apr 12 20:10:22.553601 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x7e200000-0x7e2fffff pref] Apr 12 20:10:22.553645 kernel: pci 0000:02:00.0: PME# supported from D3cold Apr 12 20:10:22.553689 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:10:22.553733 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:10:22.553780 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Apr 12 20:10:22.553824 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Apr 12 20:10:22.553867 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x7e100000-0x7e1fffff pref] Apr 12 20:10:22.553911 kernel: pci 0000:02:00.1: PME# supported from D3cold Apr 12 20:10:22.553954 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Apr 12 20:10:22.553999 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Apr 12 20:10:22.554042 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 20:10:22.554084 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Apr 12 20:10:22.554126 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:10:22.554167 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 20:10:22.554214 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Apr 12 20:10:22.554335 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:10:22.554379 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x7e400000-0x7e47ffff] Apr 12 20:10:22.554424 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Apr 12 20:10:22.554491 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x7e480000-0x7e483fff] Apr 12 20:10:22.554553 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.554596 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 20:10:22.554638 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:10:22.554680 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Apr 12 20:10:22.554729 kernel: pci 0000:05:00.0: working around ROM BAR overlap defect Apr 12 20:10:22.554775 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Apr 12 20:10:22.554819 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x7e300000-0x7e37ffff] Apr 12 20:10:22.554862 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Apr 12 20:10:22.554905 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x7e380000-0x7e383fff] Apr 12 20:10:22.554949 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Apr 12 20:10:22.554992 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 20:10:22.555033 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:10:22.555076 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Apr 12 20:10:22.555120 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 20:10:22.555168 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Apr 12 20:10:22.555212 kernel: pci 0000:07:00.0: enabling Extended Tags Apr 12 20:10:22.555255 kernel: pci 0000:07:00.0: supports D1 D2 Apr 12 20:10:22.555298 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:10:22.555340 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 20:10:22.555382 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 20:10:22.555427 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:10:22.555518 kernel: pci_bus 0000:08: extended config space not accessible Apr 12 20:10:22.555567 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Apr 12 20:10:22.555615 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x7d000000-0x7dffffff] Apr 12 20:10:22.555660 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x7e000000-0x7e01ffff] Apr 12 20:10:22.555706 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Apr 12 20:10:22.555752 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 20:10:22.555800 kernel: pci 0000:08:00.0: supports D1 D2 Apr 12 20:10:22.555844 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Apr 12 20:10:22.555888 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 20:10:22.555932 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:10:22.555976 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:10:22.555984 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Apr 12 20:10:22.555989 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Apr 12 20:10:22.555994 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Apr 12 20:10:22.556001 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Apr 12 20:10:22.556006 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Apr 12 20:10:22.556011 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Apr 12 20:10:22.556017 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Apr 12 20:10:22.556022 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Apr 12 20:10:22.556027 kernel: iommu: Default domain type: Translated Apr 12 20:10:22.556032 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 20:10:22.556077 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Apr 12 20:10:22.556122 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 20:10:22.556169 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Apr 12 20:10:22.556177 kernel: vgaarb: loaded Apr 12 20:10:22.556182 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 20:10:22.556189 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 20:10:22.556194 kernel: PTP clock support registered Apr 12 20:10:22.556200 kernel: PCI: Using ACPI for IRQ routing Apr 12 20:10:22.556205 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 20:10:22.556210 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Apr 12 20:10:22.556215 kernel: e820: reserve RAM buffer [mem 0x61f6e000-0x63ffffff] Apr 12 20:10:22.556221 kernel: e820: reserve RAM buffer [mem 0x6c0c5000-0x6fffffff] Apr 12 20:10:22.556226 kernel: e820: reserve RAM buffer [mem 0x6d331000-0x6fffffff] Apr 12 20:10:22.556231 kernel: e820: reserve RAM buffer [mem 0x883800000-0x883ffffff] Apr 12 20:10:22.556236 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Apr 12 20:10:22.556242 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Apr 12 20:10:22.556247 kernel: clocksource: Switched to clocksource tsc-early Apr 12 20:10:22.556253 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 20:10:22.556258 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 20:10:22.556263 kernel: pnp: PnP ACPI init Apr 12 20:10:22.556308 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Apr 12 20:10:22.556352 kernel: pnp 00:02: [dma 0 disabled] Apr 12 20:10:22.556394 kernel: pnp 00:03: [dma 0 disabled] Apr 12 20:10:22.556436 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Apr 12 20:10:22.556498 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Apr 12 20:10:22.556561 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Apr 12 20:10:22.556604 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Apr 12 20:10:22.556644 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Apr 12 20:10:22.556681 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Apr 12 20:10:22.556719 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Apr 12 20:10:22.556757 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Apr 12 20:10:22.556794 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Apr 12 20:10:22.556832 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Apr 12 20:10:22.556871 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Apr 12 20:10:22.556912 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Apr 12 20:10:22.556950 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Apr 12 20:10:22.556989 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Apr 12 20:10:22.557026 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Apr 12 20:10:22.557063 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Apr 12 20:10:22.557101 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Apr 12 20:10:22.557140 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Apr 12 20:10:22.557181 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Apr 12 20:10:22.557188 kernel: pnp: PnP ACPI: found 10 devices Apr 12 20:10:22.557194 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 20:10:22.557199 kernel: NET: Registered PF_INET protocol family Apr 12 20:10:22.557205 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:10:22.557210 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Apr 12 20:10:22.557216 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 20:10:22.557222 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 20:10:22.557227 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 20:10:22.557232 kernel: TCP: Hash tables configured (established 262144 bind 65536) Apr 12 20:10:22.557237 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:10:22.557243 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Apr 12 20:10:22.557248 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 20:10:22.557253 kernel: NET: Registered PF_XDP protocol family Apr 12 20:10:22.557295 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7b800000-0x7b800fff 64bit] Apr 12 20:10:22.557340 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7b801000-0x7b801fff 64bit] Apr 12 20:10:22.557382 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7b802000-0x7b802fff 64bit] Apr 12 20:10:22.557425 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Apr 12 20:10:22.557497 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:10:22.557561 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:10:22.557607 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Apr 12 20:10:22.557650 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Apr 12 20:10:22.557692 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Apr 12 20:10:22.557735 kernel: pci 0000:00:01.1: bridge window [mem 0x7e100000-0x7e2fffff] Apr 12 20:10:22.557777 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:10:22.557820 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Apr 12 20:10:22.557863 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Apr 12 20:10:22.557906 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Apr 12 20:10:22.557949 kernel: pci 0000:00:1b.4: bridge window [mem 0x7e400000-0x7e4fffff] Apr 12 20:10:22.557992 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Apr 12 20:10:22.558035 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Apr 12 20:10:22.558078 kernel: pci 0000:00:1b.5: bridge window [mem 0x7e300000-0x7e3fffff] Apr 12 20:10:22.558119 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Apr 12 20:10:22.558163 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Apr 12 20:10:22.558207 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Apr 12 20:10:22.558251 kernel: pci 0000:07:00.0: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:10:22.558293 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Apr 12 20:10:22.558337 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Apr 12 20:10:22.558380 kernel: pci 0000:00:1c.1: bridge window [mem 0x7d000000-0x7e0fffff] Apr 12 20:10:22.558418 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Apr 12 20:10:22.558481 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 20:10:22.558538 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 20:10:22.558575 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 20:10:22.558612 kernel: pci_bus 0000:00: resource 7 [mem 0x7b800000-0xdfffffff window] Apr 12 20:10:22.558648 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Apr 12 20:10:22.558696 kernel: pci_bus 0000:02: resource 1 [mem 0x7e100000-0x7e2fffff] Apr 12 20:10:22.558736 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Apr 12 20:10:22.558780 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Apr 12 20:10:22.558819 kernel: pci_bus 0000:04: resource 1 [mem 0x7e400000-0x7e4fffff] Apr 12 20:10:22.558861 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Apr 12 20:10:22.558900 kernel: pci_bus 0000:05: resource 1 [mem 0x7e300000-0x7e3fffff] Apr 12 20:10:22.558944 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Apr 12 20:10:22.558984 kernel: pci_bus 0000:07: resource 1 [mem 0x7d000000-0x7e0fffff] Apr 12 20:10:22.559026 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Apr 12 20:10:22.559067 kernel: pci_bus 0000:08: resource 1 [mem 0x7d000000-0x7e0fffff] Apr 12 20:10:22.559075 kernel: PCI: CLS 64 bytes, default 64 Apr 12 20:10:22.559080 kernel: DMAR: No ATSR found Apr 12 20:10:22.559085 kernel: DMAR: No SATC found Apr 12 20:10:22.559092 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Apr 12 20:10:22.559097 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Apr 12 20:10:22.559103 kernel: DMAR: IOMMU feature nwfs inconsistent Apr 12 20:10:22.559108 kernel: DMAR: IOMMU feature pasid inconsistent Apr 12 20:10:22.559113 kernel: DMAR: IOMMU feature eafs inconsistent Apr 12 20:10:22.559118 kernel: DMAR: IOMMU feature prs inconsistent Apr 12 20:10:22.559124 kernel: DMAR: IOMMU feature nest inconsistent Apr 12 20:10:22.559129 kernel: DMAR: IOMMU feature mts inconsistent Apr 12 20:10:22.559134 kernel: DMAR: IOMMU feature sc_support inconsistent Apr 12 20:10:22.559140 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Apr 12 20:10:22.559146 kernel: DMAR: dmar0: Using Queued invalidation Apr 12 20:10:22.559151 kernel: DMAR: dmar1: Using Queued invalidation Apr 12 20:10:22.559194 kernel: pci 0000:00:00.0: Adding to iommu group 0 Apr 12 20:10:22.559237 kernel: pci 0000:00:01.0: Adding to iommu group 1 Apr 12 20:10:22.559280 kernel: pci 0000:00:01.1: Adding to iommu group 1 Apr 12 20:10:22.559322 kernel: pci 0000:00:02.0: Adding to iommu group 2 Apr 12 20:10:22.559364 kernel: pci 0000:00:08.0: Adding to iommu group 3 Apr 12 20:10:22.559405 kernel: pci 0000:00:12.0: Adding to iommu group 4 Apr 12 20:10:22.559473 kernel: pci 0000:00:14.0: Adding to iommu group 5 Apr 12 20:10:22.559533 kernel: pci 0000:00:14.2: Adding to iommu group 5 Apr 12 20:10:22.559575 kernel: pci 0000:00:15.0: Adding to iommu group 6 Apr 12 20:10:22.559617 kernel: pci 0000:00:15.1: Adding to iommu group 6 Apr 12 20:10:22.559658 kernel: pci 0000:00:16.0: Adding to iommu group 7 Apr 12 20:10:22.559699 kernel: pci 0000:00:16.1: Adding to iommu group 7 Apr 12 20:10:22.559741 kernel: pci 0000:00:16.4: Adding to iommu group 7 Apr 12 20:10:22.559782 kernel: pci 0000:00:17.0: Adding to iommu group 8 Apr 12 20:10:22.559825 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Apr 12 20:10:22.559868 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Apr 12 20:10:22.559909 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Apr 12 20:10:22.559951 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Apr 12 20:10:22.559992 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Apr 12 20:10:22.560034 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Apr 12 20:10:22.560075 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Apr 12 20:10:22.560117 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Apr 12 20:10:22.560160 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Apr 12 20:10:22.560204 kernel: pci 0000:02:00.0: Adding to iommu group 1 Apr 12 20:10:22.560248 kernel: pci 0000:02:00.1: Adding to iommu group 1 Apr 12 20:10:22.560291 kernel: pci 0000:04:00.0: Adding to iommu group 16 Apr 12 20:10:22.560335 kernel: pci 0000:05:00.0: Adding to iommu group 17 Apr 12 20:10:22.560377 kernel: pci 0000:07:00.0: Adding to iommu group 18 Apr 12 20:10:22.560423 kernel: pci 0000:08:00.0: Adding to iommu group 18 Apr 12 20:10:22.560431 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Apr 12 20:10:22.560436 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 20:10:22.560443 kernel: software IO TLB: mapped [mem 0x00000000680c5000-0x000000006c0c5000] (64MB) Apr 12 20:10:22.560472 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Apr 12 20:10:22.560477 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Apr 12 20:10:22.560483 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Apr 12 20:10:22.560488 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Apr 12 20:10:22.560494 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Apr 12 20:10:22.560541 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Apr 12 20:10:22.560549 kernel: Initialise system trusted keyrings Apr 12 20:10:22.560555 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Apr 12 20:10:22.560561 kernel: Key type asymmetric registered Apr 12 20:10:22.560566 kernel: Asymmetric key parser 'x509' registered Apr 12 20:10:22.560571 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 20:10:22.560576 kernel: io scheduler mq-deadline registered Apr 12 20:10:22.560582 kernel: io scheduler kyber registered Apr 12 20:10:22.560587 kernel: io scheduler bfq registered Apr 12 20:10:22.560631 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Apr 12 20:10:22.560674 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Apr 12 20:10:22.560719 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Apr 12 20:10:22.560762 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Apr 12 20:10:22.560805 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Apr 12 20:10:22.560848 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Apr 12 20:10:22.560890 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Apr 12 20:10:22.560937 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Apr 12 20:10:22.560945 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Apr 12 20:10:22.560952 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Apr 12 20:10:22.560958 kernel: pstore: Registered erst as persistent store backend Apr 12 20:10:22.560963 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 20:10:22.560968 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 20:10:22.560974 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 20:10:22.560979 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 20:10:22.561022 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Apr 12 20:10:22.561030 kernel: i8042: PNP: No PS/2 controller found. Apr 12 20:10:22.561070 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Apr 12 20:10:22.561110 kernel: rtc_cmos rtc_cmos: registered as rtc0 Apr 12 20:10:22.561149 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-04-12T20:10:21 UTC (1712952621) Apr 12 20:10:22.561189 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Apr 12 20:10:22.561196 kernel: fail to initialize ptp_kvm Apr 12 20:10:22.561202 kernel: intel_pstate: Intel P-state driver initializing Apr 12 20:10:22.561207 kernel: intel_pstate: Disabling energy efficiency optimization Apr 12 20:10:22.561212 kernel: intel_pstate: HWP enabled Apr 12 20:10:22.561219 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Apr 12 20:10:22.561224 kernel: vesafb: scrolling: redraw Apr 12 20:10:22.561230 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Apr 12 20:10:22.561235 kernel: vesafb: framebuffer at 0x7d000000, mapped to 0x00000000baf30acc, using 768k, total 768k Apr 12 20:10:22.561241 kernel: Console: switching to colour frame buffer device 128x48 Apr 12 20:10:22.561246 kernel: fb0: VESA VGA frame buffer device Apr 12 20:10:22.561251 kernel: NET: Registered PF_INET6 protocol family Apr 12 20:10:22.561257 kernel: Segment Routing with IPv6 Apr 12 20:10:22.561262 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 20:10:22.561268 kernel: NET: Registered PF_PACKET protocol family Apr 12 20:10:22.561273 kernel: Key type dns_resolver registered Apr 12 20:10:22.561279 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Apr 12 20:10:22.561284 kernel: microcode: Microcode Update Driver: v2.2. Apr 12 20:10:22.561289 kernel: IPI shorthand broadcast: enabled Apr 12 20:10:22.561295 kernel: sched_clock: Marking stable (1846558178, 1353825796)->(4645791203, -1445407229) Apr 12 20:10:22.561300 kernel: registered taskstats version 1 Apr 12 20:10:22.561305 kernel: Loading compiled-in X.509 certificates Apr 12 20:10:22.561311 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 20:10:22.561317 kernel: Key type .fscrypt registered Apr 12 20:10:22.561322 kernel: Key type fscrypt-provisioning registered Apr 12 20:10:22.561328 kernel: pstore: Using crash dump compression: deflate Apr 12 20:10:22.561333 kernel: ima: Allocated hash algorithm: sha1 Apr 12 20:10:22.561338 kernel: ima: No architecture policies found Apr 12 20:10:22.561344 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 20:10:22.561349 kernel: Write protecting the kernel read-only data: 28672k Apr 12 20:10:22.561354 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 20:10:22.561360 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 20:10:22.561366 kernel: Run /init as init process Apr 12 20:10:22.561371 kernel: with arguments: Apr 12 20:10:22.561376 kernel: /init Apr 12 20:10:22.561382 kernel: with environment: Apr 12 20:10:22.561387 kernel: HOME=/ Apr 12 20:10:22.561392 kernel: TERM=linux Apr 12 20:10:22.561397 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 20:10:22.561404 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:10:22.561411 systemd[1]: Detected architecture x86-64. Apr 12 20:10:22.561417 systemd[1]: Running in initrd. Apr 12 20:10:22.561422 systemd[1]: No hostname configured, using default hostname. Apr 12 20:10:22.561428 systemd[1]: Hostname set to . Apr 12 20:10:22.561433 systemd[1]: Initializing machine ID from random generator. Apr 12 20:10:22.561439 systemd[1]: Queued start job for default target initrd.target. Apr 12 20:10:22.561446 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:10:22.561452 systemd[1]: Reached target cryptsetup.target. Apr 12 20:10:22.561458 systemd[1]: Reached target paths.target. Apr 12 20:10:22.561464 systemd[1]: Reached target slices.target. Apr 12 20:10:22.561469 systemd[1]: Reached target swap.target. Apr 12 20:10:22.561474 systemd[1]: Reached target timers.target. Apr 12 20:10:22.561480 systemd[1]: Listening on iscsid.socket. Apr 12 20:10:22.561486 systemd[1]: Listening on iscsiuio.socket. Apr 12 20:10:22.561491 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 20:10:22.561498 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 20:10:22.561503 systemd[1]: Listening on systemd-journald.socket. Apr 12 20:10:22.561509 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:10:22.561514 kernel: tsc: Refined TSC clocksource calibration: 3408.013 MHz Apr 12 20:10:22.561520 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:10:22.561525 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fe02c9f5, max_idle_ns: 440795207564 ns Apr 12 20:10:22.561531 kernel: clocksource: Switched to clocksource tsc Apr 12 20:10:22.561536 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:10:22.561542 systemd[1]: Reached target sockets.target. Apr 12 20:10:22.561548 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:10:22.561554 systemd[1]: Finished network-cleanup.service. Apr 12 20:10:22.561559 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 20:10:22.561565 systemd[1]: Starting systemd-journald.service... Apr 12 20:10:22.561570 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:10:22.561578 systemd-journald[268]: Journal started Apr 12 20:10:22.561604 systemd-journald[268]: Runtime Journal (/run/log/journal/3002188e67a64c23b7e9878c50228653) is 8.0M, max 636.8M, 628.8M free. Apr 12 20:10:22.563114 systemd-modules-load[269]: Inserted module 'overlay' Apr 12 20:10:22.593131 kernel: audit: type=1334 audit(1712952622.569:2): prog-id=6 op=LOAD Apr 12 20:10:22.593144 systemd[1]: Starting systemd-resolved.service... Apr 12 20:10:22.569000 audit: BPF prog-id=6 op=LOAD Apr 12 20:10:22.638494 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 20:10:22.638540 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 20:10:22.672493 kernel: Bridge firewalling registered Apr 12 20:10:22.672510 systemd[1]: Started systemd-journald.service. Apr 12 20:10:22.686501 systemd-modules-load[269]: Inserted module 'br_netfilter' Apr 12 20:10:22.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.689088 systemd-resolved[271]: Positive Trust Anchors: Apr 12 20:10:22.798492 kernel: audit: type=1130 audit(1712952622.694:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.798503 kernel: SCSI subsystem initialized Apr 12 20:10:22.798512 kernel: audit: type=1130 audit(1712952622.747:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.689093 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:10:22.914524 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 20:10:22.914537 kernel: audit: type=1130 audit(1712952622.818:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.914544 kernel: device-mapper: uevent: version 1.0.3 Apr 12 20:10:22.914551 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 20:10:22.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.689112 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:10:22.987690 kernel: audit: type=1130 audit(1712952622.922:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.690631 systemd-resolved[271]: Defaulting to hostname 'linux'. Apr 12 20:10:23.041540 kernel: audit: type=1130 audit(1712952622.996:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.694667 systemd[1]: Started systemd-resolved.service. Apr 12 20:10:23.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.747618 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:10:23.111664 kernel: audit: type=1130 audit(1712952623.049:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:22.818599 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 20:10:22.916268 systemd-modules-load[269]: Inserted module 'dm_multipath' Apr 12 20:10:22.922742 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:10:22.996803 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 20:10:23.049819 systemd[1]: Reached target nss-lookup.target. Apr 12 20:10:23.105054 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 20:10:23.118950 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:10:23.126090 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 20:10:23.126807 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:10:23.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:23.128859 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 20:10:23.175654 kernel: audit: type=1130 audit(1712952623.126:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:23.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:23.190781 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 20:10:23.257546 kernel: audit: type=1130 audit(1712952623.190:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:23.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:23.250015 systemd[1]: Starting dracut-cmdline.service... Apr 12 20:10:23.269555 dracut-cmdline[294]: dracut-dracut-053 Apr 12 20:10:23.269555 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 20:10:23.269555 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 20:10:23.344486 kernel: Loading iSCSI transport class v2.0-870. Apr 12 20:10:23.344499 kernel: iscsi: registered transport (tcp) Apr 12 20:10:23.400892 kernel: iscsi: registered transport (qla4xxx) Apr 12 20:10:23.400910 kernel: QLogic iSCSI HBA Driver Apr 12 20:10:23.417056 systemd[1]: Finished dracut-cmdline.service. Apr 12 20:10:23.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:23.427153 systemd[1]: Starting dracut-pre-udev.service... Apr 12 20:10:23.483451 kernel: raid6: avx2x4 gen() 49955 MB/s Apr 12 20:10:23.518508 kernel: raid6: avx2x4 xor() 20967 MB/s Apr 12 20:10:23.553504 kernel: raid6: avx2x2 gen() 52719 MB/s Apr 12 20:10:23.588478 kernel: raid6: avx2x2 xor() 31500 MB/s Apr 12 20:10:23.623504 kernel: raid6: avx2x1 gen() 44340 MB/s Apr 12 20:10:23.658478 kernel: raid6: avx2x1 xor() 27317 MB/s Apr 12 20:10:23.693478 kernel: raid6: sse2x4 gen() 20838 MB/s Apr 12 20:10:23.728513 kernel: raid6: sse2x4 xor() 11485 MB/s Apr 12 20:10:23.761482 kernel: raid6: sse2x2 gen() 21253 MB/s Apr 12 20:10:23.795489 kernel: raid6: sse2x2 xor() 13054 MB/s Apr 12 20:10:23.829512 kernel: raid6: sse2x1 gen() 17875 MB/s Apr 12 20:10:23.881447 kernel: raid6: sse2x1 xor() 8733 MB/s Apr 12 20:10:23.881462 kernel: raid6: using algorithm avx2x2 gen() 52719 MB/s Apr 12 20:10:23.881496 kernel: raid6: .... xor() 31500 MB/s, rmw enabled Apr 12 20:10:23.899690 kernel: raid6: using avx2x2 recovery algorithm Apr 12 20:10:23.946520 kernel: xor: automatically using best checksumming function avx Apr 12 20:10:24.024455 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 20:10:24.029228 systemd[1]: Finished dracut-pre-udev.service. Apr 12 20:10:24.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:24.037000 audit: BPF prog-id=7 op=LOAD Apr 12 20:10:24.037000 audit: BPF prog-id=8 op=LOAD Apr 12 20:10:24.038370 systemd[1]: Starting systemd-udevd.service... Apr 12 20:10:24.046990 systemd-udevd[472]: Using default interface naming scheme 'v252'. Apr 12 20:10:24.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:24.051584 systemd[1]: Started systemd-udevd.service. Apr 12 20:10:24.070358 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 20:10:24.100819 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Apr 12 20:10:24.117121 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 20:10:24.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:24.127128 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:10:24.176158 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:10:24.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:24.203456 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 20:10:24.246372 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 20:10:24.246421 kernel: AES CTR mode by8 optimization enabled Apr 12 20:10:24.246453 kernel: ACPI: bus type USB registered Apr 12 20:10:24.263453 kernel: usbcore: registered new interface driver usbfs Apr 12 20:10:24.263480 kernel: usbcore: registered new interface driver hub Apr 12 20:10:24.263492 kernel: usbcore: registered new device driver usb Apr 12 20:10:24.350515 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Apr 12 20:10:24.350546 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Apr 12 20:10:24.351453 kernel: libata version 3.00 loaded. Apr 12 20:10:24.351478 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Apr 12 20:10:24.388338 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:10:24.407449 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:10:24.407539 kernel: pps pps0: new PPS source ptp0 Apr 12 20:10:24.407609 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Apr 12 20:10:24.421450 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Apr 12 20:10:24.421522 kernel: igb 0000:04:00.0: added PHC on eth0 Apr 12 20:10:24.473503 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Apr 12 20:10:24.473573 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:10:24.473635 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Apr 12 20:10:24.488736 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:08:1a Apr 12 20:10:24.506501 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Apr 12 20:10:24.506567 kernel: ahci 0000:00:17.0: version 3.0 Apr 12 20:10:24.506628 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Apr 12 20:10:24.506688 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Apr 12 20:10:24.527448 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Apr 12 20:10:24.527522 kernel: scsi host0: ahci Apr 12 20:10:24.527597 kernel: scsi host1: ahci Apr 12 20:10:24.527670 kernel: scsi host2: ahci Apr 12 20:10:24.527734 kernel: scsi host3: ahci Apr 12 20:10:24.527796 kernel: scsi host4: ahci Apr 12 20:10:24.527859 kernel: scsi host5: ahci Apr 12 20:10:24.527924 kernel: scsi host6: ahci Apr 12 20:10:24.527985 kernel: scsi host7: ahci Apr 12 20:10:24.528045 kernel: ata1: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516100 irq 135 Apr 12 20:10:24.528055 kernel: ata2: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516180 irq 135 Apr 12 20:10:24.528063 kernel: ata3: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516200 irq 135 Apr 12 20:10:24.528071 kernel: ata4: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516280 irq 135 Apr 12 20:10:24.528080 kernel: ata5: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516300 irq 135 Apr 12 20:10:24.528088 kernel: ata6: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516380 irq 135 Apr 12 20:10:24.528096 kernel: ata7: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516400 irq 135 Apr 12 20:10:24.528104 kernel: ata8: SATA max UDMA/133 abar m2048@0x7e516000 port 0x7e516480 irq 135 Apr 12 20:10:24.555273 kernel: hub 1-0:1.0: USB hub found Apr 12 20:10:24.555355 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:10:24.615146 kernel: pps pps1: new PPS source ptp1 Apr 12 20:10:24.615222 kernel: hub 1-0:1.0: 16 ports detected Apr 12 20:10:24.615283 kernel: igb 0000:05:00.0: added PHC on eth1 Apr 12 20:10:24.635841 kernel: hub 2-0:1.0: USB hub found Apr 12 20:10:24.635924 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Apr 12 20:10:24.650482 kernel: hub 2-0:1.0: 10 ports detected Apr 12 20:10:24.650558 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:10:24.655876 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:08:1b Apr 12 20:10:24.850361 kernel: ata3: SATA link down (SStatus 0 SControl 300) Apr 12 20:10:24.850379 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Apr 12 20:10:24.850460 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:10:24.873155 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Apr 12 20:10:24.873227 kernel: ata5: SATA link down (SStatus 0 SControl 300) Apr 12 20:10:24.886482 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Apr 12 20:10:24.899451 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:10:24.899530 kernel: ata6: SATA link down (SStatus 0 SControl 300) Apr 12 20:10:25.014529 kernel: hub 1-14:1.0: USB hub found Apr 12 20:10:25.014613 kernel: ata7: SATA link down (SStatus 0 SControl 300) Apr 12 20:10:25.044741 kernel: hub 1-14:1.0: 4 ports detected Apr 12 20:10:25.044818 kernel: ata8: SATA link down (SStatus 0 SControl 300) Apr 12 20:10:25.096504 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Apr 12 20:10:25.124494 kernel: ata4: SATA link down (SStatus 0 SControl 300) Apr 12 20:10:25.124509 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:10:25.124576 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 20:10:25.157490 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Apr 12 20:10:25.157562 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Apr 12 20:10:25.187038 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Apr 12 20:10:25.204492 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:10:25.231499 kernel: ata1.00: Features: NCQ-prio Apr 12 20:10:25.231548 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Apr 12 20:10:25.259067 kernel: ata2.00: Features: NCQ-prio Apr 12 20:10:25.276450 kernel: ata1.00: configured for UDMA/133 Apr 12 20:10:25.276468 kernel: ata2.00: configured for UDMA/133 Apr 12 20:10:25.276476 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 20:10:25.306484 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Apr 12 20:10:25.341452 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Apr 12 20:10:25.359932 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:25.359948 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Apr 12 20:10:25.359967 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:10:25.390255 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:10:25.390334 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Apr 12 20:10:25.440262 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Apr 12 20:10:25.440357 kernel: sd 0:0:0:0: [sda] Write Protect is off Apr 12 20:10:25.440417 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Apr 12 20:10:25.440505 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:10:25.440560 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:25.440568 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Apr 12 20:10:25.474063 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 20:10:25.474081 kernel: sd 1:0:0:0: [sdb] Write Protect is off Apr 12 20:10:25.474158 kernel: GPT:9289727 != 937703087 Apr 12 20:10:25.474166 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 20:10:25.474173 kernel: GPT:9289727 != 937703087 Apr 12 20:10:25.474179 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 20:10:25.474185 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:10:25.488497 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:25.488513 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Apr 12 20:10:25.492491 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Apr 12 20:10:25.492569 kernel: port_module: 9 callbacks suppressed Apr 12 20:10:25.492578 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Apr 12 20:10:25.504439 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Apr 12 20:10:25.537084 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 20:10:25.567509 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Apr 12 20:10:25.567584 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:10:25.580930 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Apr 12 20:10:25.596496 kernel: ata2.00: Enabling discard_zeroes_data Apr 12 20:10:25.789451 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Apr 12 20:10:25.811452 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Apr 12 20:10:25.811551 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 20:10:25.818461 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 20:10:25.888614 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (516) Apr 12 20:10:25.888630 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Apr 12 20:10:25.888701 kernel: usbcore: registered new interface driver usbhid Apr 12 20:10:25.888709 kernel: usbhid: USB HID core driver Apr 12 20:10:25.848513 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 20:10:25.942510 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Apr 12 20:10:25.942615 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Apr 12 20:10:25.914558 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 20:10:25.956684 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 20:10:25.983362 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:10:26.000399 systemd[1]: Starting disk-uuid.service... Apr 12 20:10:26.175588 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Apr 12 20:10:26.175683 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:26.175692 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Apr 12 20:10:26.175699 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:10:26.175705 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Apr 12 20:10:26.175771 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:26.175778 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:10:26.175830 disk-uuid[692]: Primary Header is updated. Apr 12 20:10:26.175830 disk-uuid[692]: Secondary Entries is updated. Apr 12 20:10:26.175830 disk-uuid[692]: Secondary Header is updated. Apr 12 20:10:26.226496 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:26.226522 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:10:27.198460 kernel: ata1.00: Enabling discard_zeroes_data Apr 12 20:10:27.218394 disk-uuid[693]: The operation has completed successfully. Apr 12 20:10:27.226577 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 20:10:27.256058 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 20:10:27.357135 kernel: audit: type=1130 audit(1712952627.264:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.357151 kernel: audit: type=1131 audit(1712952627.264:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.256101 systemd[1]: Finished disk-uuid.service. Apr 12 20:10:27.387533 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 20:10:27.267920 systemd[1]: Starting verity-setup.service... Apr 12 20:10:27.423570 systemd[1]: Found device dev-mapper-usr.device. Apr 12 20:10:27.433687 systemd[1]: Mounting sysusr-usr.mount... Apr 12 20:10:27.447761 systemd[1]: Finished verity-setup.service. Apr 12 20:10:27.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.512452 kernel: audit: type=1130 audit(1712952627.462:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.569281 systemd[1]: Mounted sysusr-usr.mount. Apr 12 20:10:27.583572 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 20:10:27.576738 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 20:10:27.669225 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:10:27.669239 kernel: BTRFS info (device sda6): using free space tree Apr 12 20:10:27.669247 kernel: BTRFS info (device sda6): has skinny extents Apr 12 20:10:27.669254 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 20:10:27.577136 systemd[1]: Starting ignition-setup.service... Apr 12 20:10:27.598915 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 20:10:27.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.677920 systemd[1]: Finished ignition-setup.service. Apr 12 20:10:27.802268 kernel: audit: type=1130 audit(1712952627.693:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.802284 kernel: audit: type=1130 audit(1712952627.751:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.693784 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 20:10:27.834864 kernel: audit: type=1334 audit(1712952627.811:24): prog-id=9 op=LOAD Apr 12 20:10:27.811000 audit: BPF prog-id=9 op=LOAD Apr 12 20:10:27.752095 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 20:10:27.812502 systemd[1]: Starting systemd-networkd.service... Apr 12 20:10:27.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.875208 ignition[871]: Ignition 2.14.0 Apr 12 20:10:27.915678 kernel: audit: type=1130 audit(1712952627.857:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.848628 systemd-networkd[882]: lo: Link UP Apr 12 20:10:27.875213 ignition[871]: Stage: fetch-offline Apr 12 20:10:27.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.848630 systemd-networkd[882]: lo: Gained carrier Apr 12 20:10:28.065164 kernel: audit: type=1130 audit(1712952627.929:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:28.065177 kernel: audit: type=1130 audit(1712952627.990:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:28.065186 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 20:10:27.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.875240 ignition[871]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:10:28.090518 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Apr 12 20:10:27.848925 systemd-networkd[882]: Enumeration completed Apr 12 20:10:27.875255 ignition[871]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:10:27.848966 systemd[1]: Started systemd-networkd.service. Apr 12 20:10:28.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.878348 ignition[871]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:10:27.849574 systemd-networkd[882]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:10:28.143740 iscsid[903]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:10:28.143740 iscsid[903]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 20:10:28.143740 iscsid[903]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 20:10:28.143740 iscsid[903]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 20:10:28.143740 iscsid[903]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 20:10:28.143740 iscsid[903]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 20:10:28.143740 iscsid[903]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 20:10:28.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.878528 ignition[871]: parsed url from cmdline: "" Apr 12 20:10:27.858522 systemd[1]: Reached target network.target. Apr 12 20:10:28.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:27.878562 ignition[871]: no config URL provided Apr 12 20:10:27.888543 unknown[871]: fetched base config from "system" Apr 12 20:10:28.334562 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 20:10:27.878619 ignition[871]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 20:10:27.888547 unknown[871]: fetched user config from "system" Apr 12 20:10:27.878665 ignition[871]: parsing config with SHA512: af62cb5be496072c6c1b760c00d41ef31f146536287344f469fda7a6c051edc81079d150d521dee60897f3dd67db0db40f3ac054986b15b04eff634eb439e915 Apr 12 20:10:27.910903 systemd[1]: Starting iscsiuio.service... Apr 12 20:10:27.888694 ignition[871]: fetch-offline: fetch-offline passed Apr 12 20:10:27.922756 systemd[1]: Started iscsiuio.service. Apr 12 20:10:27.888696 ignition[871]: POST message to Packet Timeline Apr 12 20:10:27.929813 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 20:10:27.888701 ignition[871]: POST Status error: resource requires networking Apr 12 20:10:27.990570 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 20:10:27.888728 ignition[871]: Ignition finished successfully Apr 12 20:10:27.991014 systemd[1]: Starting ignition-kargs.service... Apr 12 20:10:28.069720 ignition[891]: Ignition 2.14.0 Apr 12 20:10:28.066601 systemd-networkd[882]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:10:28.069724 ignition[891]: Stage: kargs Apr 12 20:10:28.079028 systemd[1]: Starting iscsid.service... Apr 12 20:10:28.069781 ignition[891]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:10:28.104809 systemd[1]: Started iscsid.service. Apr 12 20:10:28.069790 ignition[891]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:10:28.119036 systemd[1]: Starting dracut-initqueue.service... Apr 12 20:10:28.071078 ignition[891]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:10:28.133642 systemd[1]: Finished dracut-initqueue.service. Apr 12 20:10:28.072251 ignition[891]: kargs: kargs passed Apr 12 20:10:28.161549 systemd[1]: Reached target remote-fs-pre.target. Apr 12 20:10:28.072255 ignition[891]: POST message to Packet Timeline Apr 12 20:10:28.206631 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:10:28.072266 ignition[891]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:10:28.227747 systemd[1]: Reached target remote-fs.target. Apr 12 20:10:28.073691 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:39800->[::1]:53: read: connection refused Apr 12 20:10:28.244440 systemd[1]: Starting dracut-pre-mount.service... Apr 12 20:10:28.274185 ignition[891]: GET https://metadata.packet.net/metadata: attempt #2 Apr 12 20:10:28.277722 systemd[1]: Finished dracut-pre-mount.service. Apr 12 20:10:28.274541 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53197->[::1]:53: read: connection refused Apr 12 20:10:28.329551 systemd-networkd[882]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:10:28.357532 systemd-networkd[882]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 20:10:28.387936 systemd-networkd[882]: enp2s0f1np1: Link UP Apr 12 20:10:28.388400 systemd-networkd[882]: enp2s0f1np1: Gained carrier Apr 12 20:10:28.401870 systemd-networkd[882]: enp2s0f0np0: Link UP Apr 12 20:10:28.402231 systemd-networkd[882]: eno2: Link UP Apr 12 20:10:28.402670 systemd-networkd[882]: eno1: Link UP Apr 12 20:10:28.675179 ignition[891]: GET https://metadata.packet.net/metadata: attempt #3 Apr 12 20:10:28.676274 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:37015->[::1]:53: read: connection refused Apr 12 20:10:29.146004 systemd-networkd[882]: enp2s0f0np0: Gained carrier Apr 12 20:10:29.154564 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Apr 12 20:10:29.189646 systemd-networkd[882]: enp2s0f0np0: DHCPv4 address 145.40.90.201/31, gateway 145.40.90.200 acquired from 145.40.83.140 Apr 12 20:10:29.476736 ignition[891]: GET https://metadata.packet.net/metadata: attempt #4 Apr 12 20:10:29.478087 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56860->[::1]:53: read: connection refused Apr 12 20:10:29.954943 systemd-networkd[882]: enp2s0f1np1: Gained IPv6LL Apr 12 20:10:30.978942 systemd-networkd[882]: enp2s0f0np0: Gained IPv6LL Apr 12 20:10:31.079625 ignition[891]: GET https://metadata.packet.net/metadata: attempt #5 Apr 12 20:10:31.080976 ignition[891]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53527->[::1]:53: read: connection refused Apr 12 20:10:34.284394 ignition[891]: GET https://metadata.packet.net/metadata: attempt #6 Apr 12 20:10:34.325572 ignition[891]: GET result: OK Apr 12 20:10:34.539154 ignition[891]: Ignition finished successfully Apr 12 20:10:34.543518 systemd[1]: Finished ignition-kargs.service. Apr 12 20:10:34.632143 kernel: kauditd_printk_skb: 3 callbacks suppressed Apr 12 20:10:34.632159 kernel: audit: type=1130 audit(1712952634.554:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:34.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:34.563245 ignition[919]: Ignition 2.14.0 Apr 12 20:10:34.557049 systemd[1]: Starting ignition-disks.service... Apr 12 20:10:34.563248 ignition[919]: Stage: disks Apr 12 20:10:34.563304 ignition[919]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:10:34.563314 ignition[919]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:10:34.564627 ignition[919]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:10:34.565856 ignition[919]: disks: disks passed Apr 12 20:10:34.565859 ignition[919]: POST message to Packet Timeline Apr 12 20:10:34.565869 ignition[919]: GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:10:34.591607 ignition[919]: GET result: OK Apr 12 20:10:34.773189 ignition[919]: Ignition finished successfully Apr 12 20:10:34.776311 systemd[1]: Finished ignition-disks.service. Apr 12 20:10:34.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:34.788988 systemd[1]: Reached target initrd-root-device.target. Apr 12 20:10:34.867715 kernel: audit: type=1130 audit(1712952634.788:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:34.853659 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:10:34.853695 systemd[1]: Reached target local-fs.target. Apr 12 20:10:34.876660 systemd[1]: Reached target sysinit.target. Apr 12 20:10:34.890606 systemd[1]: Reached target basic.target. Apr 12 20:10:34.891225 systemd[1]: Starting systemd-fsck-root.service... Apr 12 20:10:34.916951 systemd-fsck[933]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 20:10:34.935435 systemd[1]: Finished systemd-fsck-root.service. Apr 12 20:10:35.026555 kernel: audit: type=1130 audit(1712952634.943:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.026569 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 20:10:34.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:34.945903 systemd[1]: Mounting sysroot.mount... Apr 12 20:10:35.035102 systemd[1]: Mounted sysroot.mount. Apr 12 20:10:35.048799 systemd[1]: Reached target initrd-root-fs.target. Apr 12 20:10:35.056438 systemd[1]: Mounting sysroot-usr.mount... Apr 12 20:10:35.077264 systemd[1]: Starting flatcar-metadata-hostname.service... Apr 12 20:10:35.091981 systemd[1]: Starting flatcar-static-network.service... Apr 12 20:10:35.107600 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 20:10:35.107636 systemd[1]: Reached target ignition-diskful.target. Apr 12 20:10:35.125849 systemd[1]: Mounted sysroot-usr.mount. Apr 12 20:10:35.150564 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:10:35.226560 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (947) Apr 12 20:10:35.226578 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:10:35.162324 systemd[1]: Starting initrd-setup-root.service... Apr 12 20:10:35.297400 kernel: BTRFS info (device sda6): using free space tree Apr 12 20:10:35.297420 kernel: BTRFS info (device sda6): has skinny extents Apr 12 20:10:35.297433 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 20:10:35.231189 systemd[1]: Finished initrd-setup-root.service. Apr 12 20:10:35.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.358604 coreos-metadata[941]: Apr 12 20:10:35.235 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:10:35.358604 coreos-metadata[941]: Apr 12 20:10:35.273 INFO Fetch successful Apr 12 20:10:35.358604 coreos-metadata[941]: Apr 12 20:10:35.305 INFO wrote hostname ci-3510.3.3-a-72a15a104f to /sysroot/etc/hostname Apr 12 20:10:35.563696 kernel: audit: type=1130 audit(1712952635.305:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.563710 kernel: audit: type=1130 audit(1712952635.366:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.563718 kernel: audit: type=1130 audit(1712952635.429:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.563725 kernel: audit: type=1131 audit(1712952635.429:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.563783 coreos-metadata[942]: Apr 12 20:10:35.235 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:10:35.563783 coreos-metadata[942]: Apr 12 20:10:35.261 INFO Fetch successful Apr 12 20:10:35.583594 initrd-setup-root[952]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 20:10:35.306684 systemd[1]: Finished flatcar-metadata-hostname.service. Apr 12 20:10:35.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.644664 initrd-setup-root[960]: cut: /sysroot/etc/group: No such file or directory Apr 12 20:10:35.683662 kernel: audit: type=1130 audit(1712952635.616:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.366772 systemd[1]: flatcar-static-network.service: Deactivated successfully. Apr 12 20:10:35.693698 initrd-setup-root[968]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 20:10:35.366811 systemd[1]: Finished flatcar-static-network.service. Apr 12 20:10:35.712682 initrd-setup-root[976]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 20:10:35.429703 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:10:35.730612 ignition[1017]: INFO : Ignition 2.14.0 Apr 12 20:10:35.730612 ignition[1017]: INFO : Stage: mount Apr 12 20:10:35.730612 ignition[1017]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:10:35.730612 ignition[1017]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:10:35.730612 ignition[1017]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:10:35.730612 ignition[1017]: INFO : mount: mount passed Apr 12 20:10:35.730612 ignition[1017]: INFO : POST message to Packet Timeline Apr 12 20:10:35.730612 ignition[1017]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:10:35.730612 ignition[1017]: INFO : GET result: OK Apr 12 20:10:35.551041 systemd[1]: Starting ignition-mount.service... Apr 12 20:10:35.571007 systemd[1]: Starting sysroot-boot.service... Apr 12 20:10:35.598433 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 20:10:35.598488 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 20:10:35.599216 systemd[1]: Finished sysroot-boot.service. Apr 12 20:10:35.882481 ignition[1017]: INFO : Ignition finished successfully Apr 12 20:10:35.884938 systemd[1]: Finished ignition-mount.service. Apr 12 20:10:35.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.900622 systemd[1]: Starting ignition-files.service... Apr 12 20:10:35.970558 kernel: audit: type=1130 audit(1712952635.898:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:35.965230 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 20:10:36.029105 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1032) Apr 12 20:10:36.029128 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 20:10:36.029146 kernel: BTRFS info (device sda6): using free space tree Apr 12 20:10:36.075171 kernel: BTRFS info (device sda6): has skinny extents Apr 12 20:10:36.101450 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 20:10:36.103181 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 20:10:36.119552 ignition[1051]: INFO : Ignition 2.14.0 Apr 12 20:10:36.119552 ignition[1051]: INFO : Stage: files Apr 12 20:10:36.119552 ignition[1051]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:10:36.119552 ignition[1051]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:10:36.119552 ignition[1051]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:10:36.119552 ignition[1051]: DEBUG : files: compiled without relabeling support, skipping Apr 12 20:10:36.208618 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1058) Apr 12 20:10:36.123351 unknown[1051]: wrote ssh authorized keys file for user: core Apr 12 20:10:36.217598 ignition[1051]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 20:10:36.217598 ignition[1051]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1474032292" Apr 12 20:10:36.217598 ignition[1051]: CRITICAL : files: createFilesystemsFiles: createFiles: op(4): op(5): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1474032292": device or resource busy Apr 12 20:10:36.217598 ignition[1051]: ERROR : files: createFilesystemsFiles: createFiles: op(4): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1474032292", trying btrfs: device or resource busy Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1474032292" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(6): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1474032292" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [started] unmounting "/mnt/oem1474032292" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): op(7): [finished] unmounting "/mnt/oem1474032292" Apr 12 20:10:36.217598 ignition[1051]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(8): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(8): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(9): [started] processing unit "packet-phone-home.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(9): [finished] processing unit "packet-phone-home.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(a): [started] processing unit "etcd-member.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-etcd-member.conf" at "/sysroot/etc/systemd/system/etcd-member.service.d/20-clct-etcd-member.conf" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(a): [finished] processing unit "etcd-member.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(c): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(c): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(d): [started] setting preset to enabled for "packet-phone-home.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(d): [finished] setting preset to enabled for "packet-phone-home.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(e): [started] setting preset to enabled for "etcd-member.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: op(e): [finished] setting preset to enabled for "etcd-member.service" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: createResultFile: createFiles: op(f): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: createResultFile: createFiles: op(f): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 20:10:36.486783 ignition[1051]: INFO : files: files passed Apr 12 20:10:36.486783 ignition[1051]: INFO : POST message to Packet Timeline Apr 12 20:10:36.486783 ignition[1051]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:10:36.486783 ignition[1051]: INFO : GET result: OK Apr 12 20:10:36.746768 ignition[1051]: INFO : Ignition finished successfully Apr 12 20:10:36.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.743086 systemd[1]: Finished ignition-files.service. Apr 12 20:10:36.829715 kernel: audit: type=1130 audit(1712952636.755:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.761399 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 20:10:36.822705 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 20:10:36.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.874714 initrd-setup-root-after-ignition[1082]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 20:10:36.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.823012 systemd[1]: Starting ignition-quench.service... Apr 12 20:10:36.836787 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 20:10:36.856741 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 20:10:36.856789 systemd[1]: Finished ignition-quench.service. Apr 12 20:10:36.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.882758 systemd[1]: Reached target ignition-complete.target. Apr 12 20:10:36.906376 systemd[1]: Starting initrd-parse-etc.service... Apr 12 20:10:36.933847 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 20:10:36.933913 systemd[1]: Finished initrd-parse-etc.service. Apr 12 20:10:36.943812 systemd[1]: Reached target initrd-fs.target. Apr 12 20:10:37.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:36.958622 systemd[1]: Reached target initrd.target. Apr 12 20:10:36.973798 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 20:10:36.975459 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 20:10:37.005713 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 20:10:37.017505 systemd[1]: Starting initrd-cleanup.service... Apr 12 20:10:37.045892 systemd[1]: Stopped target nss-lookup.target. Apr 12 20:10:37.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.057995 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 20:10:37.075225 systemd[1]: Stopped target timers.target. Apr 12 20:10:37.089181 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 20:10:37.089563 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 20:10:37.104326 systemd[1]: Stopped target initrd.target. Apr 12 20:10:37.118037 systemd[1]: Stopped target basic.target. Apr 12 20:10:37.134044 systemd[1]: Stopped target ignition-complete.target. Apr 12 20:10:37.150036 systemd[1]: Stopped target ignition-diskful.target. Apr 12 20:10:37.168035 systemd[1]: Stopped target initrd-root-device.target. Apr 12 20:10:37.184035 systemd[1]: Stopped target remote-fs.target. Apr 12 20:10:37.199049 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 20:10:37.214060 systemd[1]: Stopped target sysinit.target. Apr 12 20:10:37.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.232064 systemd[1]: Stopped target local-fs.target. Apr 12 20:10:37.250027 systemd[1]: Stopped target local-fs-pre.target. Apr 12 20:10:37.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.268036 systemd[1]: Stopped target swap.target. Apr 12 20:10:37.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.282074 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 20:10:37.282439 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 20:10:37.300399 systemd[1]: Stopped target cryptsetup.target. Apr 12 20:10:37.315947 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 20:10:37.316308 systemd[1]: Stopped dracut-initqueue.service. Apr 12 20:10:37.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.332199 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 20:10:37.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.332576 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 20:10:37.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.347377 systemd[1]: Stopped target paths.target. Apr 12 20:10:37.485584 ignition[1097]: INFO : Ignition 2.14.0 Apr 12 20:10:37.485584 ignition[1097]: INFO : Stage: umount Apr 12 20:10:37.485584 ignition[1097]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 20:10:37.485584 ignition[1097]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Apr 12 20:10:37.485584 ignition[1097]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Apr 12 20:10:37.485584 ignition[1097]: INFO : umount: umount passed Apr 12 20:10:37.485584 ignition[1097]: INFO : POST message to Packet Timeline Apr 12 20:10:37.485584 ignition[1097]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Apr 12 20:10:37.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.624267 iscsid[903]: iscsid shutting down. Apr 12 20:10:37.360917 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 20:10:37.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.655070 ignition[1097]: INFO : GET result: OK Apr 12 20:10:37.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.364705 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 20:10:37.379043 systemd[1]: Stopped target slices.target. Apr 12 20:10:37.393045 systemd[1]: Stopped target sockets.target. Apr 12 20:10:37.408198 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 20:10:37.408602 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 20:10:37.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.746908 ignition[1097]: INFO : Ignition finished successfully Apr 12 20:10:37.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.428136 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 20:10:37.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.771000 audit: BPF prog-id=6 op=UNLOAD Apr 12 20:10:37.428497 systemd[1]: Stopped ignition-files.service. Apr 12 20:10:37.444157 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Apr 12 20:10:37.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.444542 systemd[1]: Stopped flatcar-metadata-hostname.service. Apr 12 20:10:37.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.464304 systemd[1]: Stopping ignition-mount.service... Apr 12 20:10:37.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.477834 systemd[1]: Stopping iscsid.service... Apr 12 20:10:37.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.492608 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 20:10:37.492783 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 20:10:37.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.500411 systemd[1]: Stopping sysroot-boot.service... Apr 12 20:10:37.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.511681 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 20:10:37.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.511859 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 20:10:37.537103 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 20:10:37.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.537420 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 20:10:37.573900 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 20:10:37.575592 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 20:10:37.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.575829 systemd[1]: Stopped iscsid.service. Apr 12 20:10:38.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.584841 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 20:10:38.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.585056 systemd[1]: Stopped sysroot-boot.service. Apr 12 20:10:37.599786 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 20:10:38.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.600043 systemd[1]: Closed iscsid.socket. Apr 12 20:10:38.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:38.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.613969 systemd[1]: Stopping iscsiuio.service... Apr 12 20:10:37.631270 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 20:10:37.631514 systemd[1]: Stopped iscsiuio.service. Apr 12 20:10:37.645349 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 20:10:37.645594 systemd[1]: Finished initrd-cleanup.service. Apr 12 20:10:37.664850 systemd[1]: Stopped target network.target. Apr 12 20:10:37.677831 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 20:10:37.677941 systemd[1]: Closed iscsiuio.socket. Apr 12 20:10:37.693205 systemd[1]: Stopping systemd-networkd.service... Apr 12 20:10:37.701616 systemd-networkd[882]: enp2s0f0np0: DHCPv6 lease lost Apr 12 20:10:37.707036 systemd[1]: Stopping systemd-resolved.service... Apr 12 20:10:37.709644 systemd-networkd[882]: enp2s0f1np1: DHCPv6 lease lost Apr 12 20:10:38.170000 audit: BPF prog-id=9 op=UNLOAD Apr 12 20:10:37.721376 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 20:10:37.721774 systemd[1]: Stopped systemd-resolved.service. Apr 12 20:10:37.740201 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 20:10:37.740468 systemd[1]: Stopped systemd-networkd.service. Apr 12 20:10:37.755253 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 20:10:37.755470 systemd[1]: Stopped ignition-mount.service. Apr 12 20:10:38.229000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:37.772121 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 20:10:37.772208 systemd[1]: Closed systemd-networkd.socket. Apr 12 20:10:37.787704 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 20:10:37.787909 systemd[1]: Stopped ignition-disks.service. Apr 12 20:10:37.803944 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 20:10:37.804079 systemd[1]: Stopped ignition-kargs.service. Apr 12 20:10:37.822966 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 20:10:37.823095 systemd[1]: Stopped ignition-setup.service. Apr 12 20:10:37.838935 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 20:10:37.839072 systemd[1]: Stopped initrd-setup-root.service. Apr 12 20:10:37.856749 systemd[1]: Stopping network-cleanup.service... Apr 12 20:10:37.868664 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 20:10:37.868899 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 20:10:37.886994 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 20:10:37.887134 systemd[1]: Stopped systemd-sysctl.service. Apr 12 20:10:37.902133 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 20:10:37.902275 systemd[1]: Stopped systemd-modules-load.service. Apr 12 20:10:37.918164 systemd[1]: Stopping systemd-udevd.service... Apr 12 20:10:37.938712 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 20:10:37.940283 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 20:10:37.940622 systemd[1]: Stopped systemd-udevd.service. Apr 12 20:10:37.953256 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 20:10:37.953370 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 20:10:37.969836 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 20:10:37.969933 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 20:10:38.327468 systemd-journald[268]: Received SIGTERM from PID 1 (systemd). Apr 12 20:10:37.985531 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 20:10:37.985567 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 20:10:37.999795 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 20:10:37.999838 systemd[1]: Stopped dracut-cmdline.service. Apr 12 20:10:38.016595 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 20:10:38.016712 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 20:10:38.032589 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 20:10:38.047607 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 20:10:38.047636 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 20:10:38.061924 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 20:10:38.061980 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 20:10:38.211625 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 20:10:38.211841 systemd[1]: Stopped network-cleanup.service. Apr 12 20:10:38.230264 systemd[1]: Reached target initrd-switch-root.target. Apr 12 20:10:38.247506 systemd[1]: Starting initrd-switch-root.service... Apr 12 20:10:38.283341 systemd[1]: Switching root. Apr 12 20:10:38.327886 systemd-journald[268]: Journal stopped Apr 12 20:10:42.264039 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 20:10:42.264053 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 20:10:42.264062 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 20:10:42.264067 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 20:10:42.264072 kernel: SELinux: policy capability open_perms=1 Apr 12 20:10:42.264078 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 20:10:42.264084 kernel: SELinux: policy capability always_check_network=0 Apr 12 20:10:42.264089 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 20:10:42.264095 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 20:10:42.264101 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 20:10:42.264107 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 20:10:42.264113 systemd[1]: Successfully loaded SELinux policy in 286.726ms. Apr 12 20:10:42.264120 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.118ms. Apr 12 20:10:42.264126 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 20:10:42.264134 systemd[1]: Detected architecture x86-64. Apr 12 20:10:42.264141 systemd[1]: Detected first boot. Apr 12 20:10:42.264147 systemd[1]: Hostname set to . Apr 12 20:10:42.264153 systemd[1]: Initializing machine ID from random generator. Apr 12 20:10:42.264159 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 20:10:42.264165 systemd[1]: Populated /etc with preset unit settings. Apr 12 20:10:42.264171 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 20:10:42.264178 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 20:10:42.264186 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 20:10:42.264192 kernel: kauditd_printk_skb: 58 callbacks suppressed Apr 12 20:10:42.264197 kernel: audit: type=1334 audit(1712952640.589:92): prog-id=12 op=LOAD Apr 12 20:10:42.264203 kernel: audit: type=1334 audit(1712952640.589:93): prog-id=3 op=UNLOAD Apr 12 20:10:42.264209 kernel: audit: type=1334 audit(1712952640.631:94): prog-id=13 op=LOAD Apr 12 20:10:42.264216 kernel: audit: type=1334 audit(1712952640.673:95): prog-id=14 op=LOAD Apr 12 20:10:42.264222 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 20:10:42.264228 kernel: audit: type=1334 audit(1712952640.673:96): prog-id=4 op=UNLOAD Apr 12 20:10:42.264234 systemd[1]: Stopped initrd-switch-root.service. Apr 12 20:10:42.264240 kernel: audit: type=1334 audit(1712952640.673:97): prog-id=5 op=UNLOAD Apr 12 20:10:42.264245 kernel: audit: type=1131 audit(1712952640.673:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.264251 kernel: audit: type=1334 audit(1712952640.827:99): prog-id=12 op=UNLOAD Apr 12 20:10:42.264257 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 20:10:42.264265 kernel: audit: type=1130 audit(1712952640.834:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.264271 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 20:10:42.264277 kernel: audit: type=1131 audit(1712952640.834:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.264283 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 20:10:42.264290 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 20:10:42.264298 systemd[1]: Created slice system-getty.slice. Apr 12 20:10:42.264304 systemd[1]: Created slice system-modprobe.slice. Apr 12 20:10:42.264311 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 20:10:42.264318 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 20:10:42.264325 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 20:10:42.264331 systemd[1]: Created slice user.slice. Apr 12 20:10:42.264337 systemd[1]: Started systemd-ask-password-console.path. Apr 12 20:10:42.264344 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 20:10:42.264350 systemd[1]: Set up automount boot.automount. Apr 12 20:10:42.264356 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 20:10:42.264363 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 20:10:42.264370 systemd[1]: Stopped target initrd-fs.target. Apr 12 20:10:42.264378 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 20:10:42.264384 systemd[1]: Reached target integritysetup.target. Apr 12 20:10:42.264391 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 20:10:42.264397 systemd[1]: Reached target remote-fs.target. Apr 12 20:10:42.264403 systemd[1]: Reached target slices.target. Apr 12 20:10:42.264410 systemd[1]: Reached target swap.target. Apr 12 20:10:42.264416 systemd[1]: Reached target torcx.target. Apr 12 20:10:42.264424 systemd[1]: Reached target veritysetup.target. Apr 12 20:10:42.264430 systemd[1]: Listening on systemd-coredump.socket. Apr 12 20:10:42.264437 systemd[1]: Listening on systemd-initctl.socket. Apr 12 20:10:42.264443 systemd[1]: Listening on systemd-networkd.socket. Apr 12 20:10:42.264461 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 20:10:42.264474 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 20:10:42.264483 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 20:10:42.264489 systemd[1]: Mounting dev-hugepages.mount... Apr 12 20:10:42.264496 systemd[1]: Mounting dev-mqueue.mount... Apr 12 20:10:42.264503 systemd[1]: Mounting media.mount... Apr 12 20:10:42.264509 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:10:42.264516 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 20:10:42.264523 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 20:10:42.264530 systemd[1]: Mounting tmp.mount... Apr 12 20:10:42.264543 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 20:10:42.264554 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 20:10:42.264566 systemd[1]: Starting kmod-static-nodes.service... Apr 12 20:10:42.264579 systemd[1]: Starting modprobe@configfs.service... Apr 12 20:10:42.264591 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 20:10:42.264602 systemd[1]: Starting modprobe@drm.service... Apr 12 20:10:42.264614 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 20:10:42.264624 systemd[1]: Starting modprobe@fuse.service... Apr 12 20:10:42.264635 kernel: fuse: init (API version 7.34) Apr 12 20:10:42.264645 systemd[1]: Starting modprobe@loop.service... Apr 12 20:10:42.264652 kernel: loop: module loaded Apr 12 20:10:42.264658 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 20:10:42.264665 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 20:10:42.264672 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 20:10:42.264687 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 20:10:42.264694 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 20:10:42.264701 systemd[1]: Stopped systemd-journald.service. Apr 12 20:10:42.264707 systemd[1]: Starting systemd-journald.service... Apr 12 20:10:42.264715 systemd[1]: Starting systemd-modules-load.service... Apr 12 20:10:42.264724 systemd-journald[1250]: Journal started Apr 12 20:10:42.264749 systemd-journald[1250]: Runtime Journal (/run/log/journal/8fe8443f9bc54b1da2aa8e107c3a401f) is 8.0M, max 636.8M, 628.8M free. Apr 12 20:10:38.699000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 20:10:38.956000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:10:38.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:10:38.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 20:10:38.959000 audit: BPF prog-id=10 op=LOAD Apr 12 20:10:38.959000 audit: BPF prog-id=10 op=UNLOAD Apr 12 20:10:38.959000 audit: BPF prog-id=11 op=LOAD Apr 12 20:10:38.959000 audit: BPF prog-id=11 op=UNLOAD Apr 12 20:10:39.031000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 20:10:39.031000 audit[1139]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001258e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:10:39.031000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:10:39.055000 audit[1139]: AVC avc: denied { associate } for pid=1139 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 20:10:39.055000 audit[1139]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001259b9 a2=1ed a3=0 items=2 ppid=1122 pid=1139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:10:39.055000 audit: CWD cwd="/" Apr 12 20:10:39.055000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:39.055000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:39.055000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 20:10:40.589000 audit: BPF prog-id=12 op=LOAD Apr 12 20:10:40.589000 audit: BPF prog-id=3 op=UNLOAD Apr 12 20:10:40.631000 audit: BPF prog-id=13 op=LOAD Apr 12 20:10:40.673000 audit: BPF prog-id=14 op=LOAD Apr 12 20:10:40.673000 audit: BPF prog-id=4 op=UNLOAD Apr 12 20:10:40.673000 audit: BPF prog-id=5 op=UNLOAD Apr 12 20:10:40.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:40.827000 audit: BPF prog-id=12 op=UNLOAD Apr 12 20:10:40.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:40.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.237000 audit: BPF prog-id=15 op=LOAD Apr 12 20:10:42.237000 audit: BPF prog-id=16 op=LOAD Apr 12 20:10:42.237000 audit: BPF prog-id=17 op=LOAD Apr 12 20:10:42.237000 audit: BPF prog-id=13 op=UNLOAD Apr 12 20:10:42.237000 audit: BPF prog-id=14 op=UNLOAD Apr 12 20:10:42.261000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 20:10:42.261000 audit[1250]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdd95982c0 a2=4000 a3=7ffdd959835c items=0 ppid=1 pid=1250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:10:42.261000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 20:10:40.587751 systemd[1]: Queued start job for default target multi-user.target. Apr 12 20:10:39.028595 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 20:10:40.673966 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 20:10:39.029096 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:10:39.029112 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:10:39.029136 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 20:10:39.029145 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 20:10:39.029173 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 20:10:39.029183 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 20:10:39.029335 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 20:10:39.029367 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 20:10:39.029378 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 20:10:39.030827 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 20:10:39.030856 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 20:10:39.030871 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 20:10:39.030882 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 20:10:39.030896 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 20:10:39.030907 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 20:10:40.239937 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:10:40.240380 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:10:40.240452 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:10:40.240576 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 20:10:40.240607 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 20:10:40.240642 /usr/lib/systemd/system-generators/torcx-generator[1139]: time="2024-04-12T20:10:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 20:10:42.295619 systemd[1]: Starting systemd-network-generator.service... Apr 12 20:10:42.318633 systemd[1]: Starting systemd-remount-fs.service... Apr 12 20:10:42.339497 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 20:10:42.372038 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 20:10:42.372059 systemd[1]: Stopped verity-setup.service. Apr 12 20:10:42.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.406494 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 20:10:42.421631 systemd[1]: Started systemd-journald.service. Apr 12 20:10:42.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.428982 systemd[1]: Mounted dev-hugepages.mount. Apr 12 20:10:42.436698 systemd[1]: Mounted dev-mqueue.mount. Apr 12 20:10:42.443689 systemd[1]: Mounted media.mount. Apr 12 20:10:42.450700 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 20:10:42.459677 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 20:10:42.468667 systemd[1]: Mounted tmp.mount. Apr 12 20:10:42.475756 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 20:10:42.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.483780 systemd[1]: Finished kmod-static-nodes.service. Apr 12 20:10:42.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.492828 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 20:10:42.492947 systemd[1]: Finished modprobe@configfs.service. Apr 12 20:10:42.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.501872 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 20:10:42.502010 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 20:10:42.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.511004 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 20:10:42.511193 systemd[1]: Finished modprobe@drm.service. Apr 12 20:10:42.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.520255 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 20:10:42.520581 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 20:10:42.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.529340 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 20:10:42.529660 systemd[1]: Finished modprobe@fuse.service. Apr 12 20:10:42.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.538335 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 20:10:42.538652 systemd[1]: Finished modprobe@loop.service. Apr 12 20:10:42.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.546000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.547292 systemd[1]: Finished systemd-modules-load.service. Apr 12 20:10:42.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.556261 systemd[1]: Finished systemd-network-generator.service. Apr 12 20:10:42.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.565244 systemd[1]: Finished systemd-remount-fs.service. Apr 12 20:10:42.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.574266 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 20:10:42.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.583735 systemd[1]: Reached target network-pre.target. Apr 12 20:10:42.594274 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 20:10:42.603193 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 20:10:42.610664 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 20:10:42.611617 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 20:10:42.619134 systemd[1]: Starting systemd-journal-flush.service... Apr 12 20:10:42.622973 systemd-journald[1250]: Time spent on flushing to /var/log/journal/8fe8443f9bc54b1da2aa8e107c3a401f is 14.514ms for 1584 entries. Apr 12 20:10:42.622973 systemd-journald[1250]: System Journal (/var/log/journal/8fe8443f9bc54b1da2aa8e107c3a401f) is 8.0M, max 195.6M, 187.6M free. Apr 12 20:10:42.657896 systemd-journald[1250]: Received client request to flush runtime journal. Apr 12 20:10:42.636588 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 20:10:42.637073 systemd[1]: Starting systemd-random-seed.service... Apr 12 20:10:42.646587 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 20:10:42.647086 systemd[1]: Starting systemd-sysctl.service... Apr 12 20:10:42.654105 systemd[1]: Starting systemd-sysusers.service... Apr 12 20:10:42.661056 systemd[1]: Starting systemd-udev-settle.service... Apr 12 20:10:42.668665 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 20:10:42.677638 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 20:10:42.685664 systemd[1]: Finished systemd-journal-flush.service. Apr 12 20:10:42.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.693660 systemd[1]: Finished systemd-random-seed.service. Apr 12 20:10:42.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.701631 systemd[1]: Finished systemd-sysctl.service. Apr 12 20:10:42.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.709641 systemd[1]: Finished systemd-sysusers.service. Apr 12 20:10:42.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.718591 systemd[1]: Reached target first-boot-complete.target. Apr 12 20:10:42.726817 udevadm[1266]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 20:10:42.912302 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 20:10:42.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.920000 audit: BPF prog-id=18 op=LOAD Apr 12 20:10:42.921000 audit: BPF prog-id=19 op=LOAD Apr 12 20:10:42.921000 audit: BPF prog-id=7 op=UNLOAD Apr 12 20:10:42.921000 audit: BPF prog-id=8 op=UNLOAD Apr 12 20:10:42.921862 systemd[1]: Starting systemd-udevd.service... Apr 12 20:10:42.933777 systemd-udevd[1267]: Using default interface naming scheme 'v252'. Apr 12 20:10:42.950310 systemd[1]: Started systemd-udevd.service. Apr 12 20:10:42.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:42.960537 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Apr 12 20:10:42.960000 audit: BPF prog-id=20 op=LOAD Apr 12 20:10:42.961696 systemd[1]: Starting systemd-networkd.service... Apr 12 20:10:42.985000 audit: BPF prog-id=21 op=LOAD Apr 12 20:10:42.985549 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Apr 12 20:10:42.985587 kernel: ACPI: button: Sleep Button [SLPB] Apr 12 20:10:42.985601 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 20:10:42.985000 audit: BPF prog-id=22 op=LOAD Apr 12 20:10:42.998456 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1292) Apr 12 20:10:42.998000 audit: BPF prog-id=23 op=LOAD Apr 12 20:10:43.014465 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Apr 12 20:10:43.013355 systemd[1]: Starting systemd-userdbd.service... Apr 12 20:10:43.050457 kernel: IPMI message handler: version 39.2 Apr 12 20:10:43.066487 kernel: ACPI: button: Power Button [PWRF] Apr 12 20:10:43.066827 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 20:10:43.001000 audit[1308]: AVC avc: denied { confidentiality } for pid=1308 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 20:10:43.001000 audit[1308]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fd581e84a0 a1=4d8bc a2=7feec0f47bc5 a3=5 items=42 ppid=1267 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:10:43.001000 audit: CWD cwd="/" Apr 12 20:10:43.001000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=1 name=(null) inode=17557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=2 name=(null) inode=17557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=3 name=(null) inode=17558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=4 name=(null) inode=17557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=5 name=(null) inode=17559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=6 name=(null) inode=17557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=7 name=(null) inode=17560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=8 name=(null) inode=17560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=9 name=(null) inode=17561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=10 name=(null) inode=17560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=11 name=(null) inode=17562 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=12 name=(null) inode=17560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=13 name=(null) inode=17563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=14 name=(null) inode=17560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=15 name=(null) inode=17564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=16 name=(null) inode=17560 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=17 name=(null) inode=17565 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=18 name=(null) inode=17557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=19 name=(null) inode=17566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=20 name=(null) inode=17566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=21 name=(null) inode=17567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=22 name=(null) inode=17566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=23 name=(null) inode=17568 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=24 name=(null) inode=17566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=25 name=(null) inode=17569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=26 name=(null) inode=17566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=27 name=(null) inode=17570 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=28 name=(null) inode=17566 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=29 name=(null) inode=17571 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=30 name=(null) inode=17557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=31 name=(null) inode=17572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=32 name=(null) inode=17572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=33 name=(null) inode=17573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=34 name=(null) inode=17572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=35 name=(null) inode=17574 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=36 name=(null) inode=17572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=37 name=(null) inode=17575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=38 name=(null) inode=17572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=39 name=(null) inode=17576 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=40 name=(null) inode=17572 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PATH item=41 name=(null) inode=17577 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 20:10:43.001000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 20:10:43.095508 kernel: ipmi device interface Apr 12 20:10:43.132011 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Apr 12 20:10:43.132261 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Apr 12 20:10:43.133455 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Apr 12 20:10:43.133558 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Apr 12 20:10:43.133644 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Apr 12 20:10:43.199487 systemd[1]: Started systemd-userdbd.service. Apr 12 20:10:43.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.237089 kernel: ipmi_si: IPMI System Interface driver Apr 12 20:10:43.237127 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Apr 12 20:10:43.237227 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Apr 12 20:10:43.254207 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Apr 12 20:10:43.286012 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Apr 12 20:10:43.286209 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Apr 12 20:10:43.286409 kernel: iTCO_vendor_support: vendor-support=0 Apr 12 20:10:43.354590 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Apr 12 20:10:43.354683 kernel: ipmi_si: Adding ACPI-specified kcs state machine Apr 12 20:10:43.354696 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Apr 12 20:10:43.400456 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Apr 12 20:10:43.442453 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Apr 12 20:10:43.476509 kernel: intel_rapl_common: Found RAPL domain package Apr 12 20:10:43.476585 kernel: intel_rapl_common: Found RAPL domain core Apr 12 20:10:43.476626 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Apr 12 20:10:43.476767 kernel: intel_rapl_common: Found RAPL domain uncore Apr 12 20:10:43.476799 kernel: intel_rapl_common: Found RAPL domain dram Apr 12 20:10:43.481297 systemd-networkd[1298]: bond0: netdev ready Apr 12 20:10:43.483542 systemd-networkd[1298]: lo: Link UP Apr 12 20:10:43.483545 systemd-networkd[1298]: lo: Gained carrier Apr 12 20:10:43.484042 systemd-networkd[1298]: Enumeration completed Apr 12 20:10:43.484103 systemd[1]: Started systemd-networkd.service. Apr 12 20:10:43.484345 systemd-networkd[1298]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Apr 12 20:10:43.485198 systemd-networkd[1298]: enp2s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:af.network. Apr 12 20:10:43.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.540276 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 20:10:43.617451 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Apr 12 20:10:43.635456 kernel: ipmi_ssif: IPMI SSIF Interface driver Apr 12 20:10:43.638624 systemd[1]: Finished systemd-udev-settle.service. Apr 12 20:10:43.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.648176 systemd[1]: Starting lvm2-activation-early.service... Apr 12 20:10:43.663568 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:10:43.697904 systemd[1]: Finished lvm2-activation-early.service. Apr 12 20:10:43.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.706605 systemd[1]: Reached target cryptsetup.target. Apr 12 20:10:43.715102 systemd[1]: Starting lvm2-activation.service... Apr 12 20:10:43.717432 lvm[1373]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 20:10:43.748914 systemd[1]: Finished lvm2-activation.service. Apr 12 20:10:43.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.757582 systemd[1]: Reached target local-fs-pre.target. Apr 12 20:10:43.765531 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 20:10:43.765551 systemd[1]: Reached target local-fs.target. Apr 12 20:10:43.773527 systemd[1]: Reached target machines.target. Apr 12 20:10:43.782136 systemd[1]: Starting ldconfig.service... Apr 12 20:10:43.789053 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 20:10:43.789084 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:10:43.789637 systemd[1]: Starting systemd-boot-update.service... Apr 12 20:10:43.796913 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 20:10:43.807028 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 20:10:43.807125 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:10:43.807162 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 20:10:43.807696 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 20:10:43.807913 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1375 (bootctl) Apr 12 20:10:43.808506 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 20:10:43.823531 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 20:10:43.823894 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 20:10:43.826550 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 20:10:43.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.829067 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 20:10:43.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.829980 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 20:10:43.835440 systemd-tmpfiles[1379]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 20:10:43.891443 systemd-fsck[1383]: fsck.fat 4.2 (2021-01-31) Apr 12 20:10:43.891443 systemd-fsck[1383]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 20:10:43.892139 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 20:10:43.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.903293 systemd[1]: Mounting boot.mount... Apr 12 20:10:43.915345 systemd[1]: Mounted boot.mount. Apr 12 20:10:43.933965 systemd[1]: Finished systemd-boot-update.service. Apr 12 20:10:43.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.963152 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 20:10:43.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:10:43.972280 systemd[1]: Starting audit-rules.service... Apr 12 20:10:43.980117 systemd[1]: Starting clean-ca-certificates.service... Apr 12 20:10:43.989108 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 20:10:43.994000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 20:10:43.994000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf520eb70 a2=420 a3=0 items=0 ppid=1386 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:10:43.994000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 20:10:43.995272 augenrules[1403]: No rules Apr 12 20:10:43.999526 systemd[1]: Starting systemd-resolved.service... Apr 12 20:10:44.007482 systemd[1]: Starting systemd-timesyncd.service... Apr 12 20:10:44.017155 systemd[1]: Starting systemd-update-utmp.service... Apr 12 20:10:44.024946 systemd[1]: Finished audit-rules.service. Apr 12 20:10:44.052523 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 20:10:44.065746 systemd[1]: Finished clean-ca-certificates.service. Apr 12 20:10:44.077492 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Apr 12 20:10:44.078579 systemd-networkd[1298]: enp2s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:65:fd:ae.network. Apr 12 20:10:44.085675 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 20:10:44.099054 systemd[1]: Finished systemd-update-utmp.service. Apr 12 20:10:44.115516 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 20:10:44.121518 ldconfig[1374]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 20:10:44.124466 systemd[1]: Finished ldconfig.service. Apr 12 20:10:44.127451 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:10:44.134219 systemd[1]: Starting systemd-update-done.service... Apr 12 20:10:44.137994 systemd-resolved[1408]: Positive Trust Anchors: Apr 12 20:10:44.137999 systemd-resolved[1408]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 20:10:44.138018 systemd-resolved[1408]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 20:10:44.140646 systemd[1]: Started systemd-timesyncd.service. Apr 12 20:10:44.141979 systemd-resolved[1408]: Using system hostname 'ci-3510.3.3-a-72a15a104f'. Apr 12 20:10:44.149441 systemd[1]: Finished systemd-update-done.service. Apr 12 20:10:44.158895 systemd[1]: Reached target time-set.target. Apr 12 20:10:44.254467 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:10:44.254568 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Apr 12 20:10:44.294499 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Apr 12 20:10:44.294541 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Apr 12 20:10:44.313556 systemd-networkd[1298]: bond0: Link UP Apr 12 20:10:44.313793 systemd-networkd[1298]: enp2s0f1np1: Link UP Apr 12 20:10:44.313945 systemd-networkd[1298]: enp2s0f1np1: Gained carrier Apr 12 20:10:44.314417 systemd[1]: Started systemd-resolved.service. Apr 12 20:10:44.315050 systemd-networkd[1298]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:65:fd:ae.network. Apr 12 20:10:44.330598 systemd[1]: Reached target network.target. Apr 12 20:10:44.337519 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:10:44.337549 kernel: bond0: active interface up! Apr 12 20:10:44.369542 systemd[1]: Reached target nss-lookup.target. Apr 12 20:10:44.378488 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Apr 12 20:10:44.385542 systemd[1]: Reached target sysinit.target. Apr 12 20:10:44.393577 systemd[1]: Started motdgen.path. Apr 12 20:10:44.400541 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 20:10:44.410591 systemd[1]: Started logrotate.timer. Apr 12 20:10:44.417600 systemd[1]: Started mdadm.timer. Apr 12 20:10:44.424519 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 20:10:44.432517 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 20:10:44.432534 systemd[1]: Reached target paths.target. Apr 12 20:10:44.436118 systemd-networkd[1298]: enp2s0f0np0: Link UP Apr 12 20:10:44.436381 systemd-networkd[1298]: bond0: Gained carrier Apr 12 20:10:44.436507 systemd-networkd[1298]: enp2s0f0np0: Gained carrier Apr 12 20:10:44.436582 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.440540 systemd[1]: Reached target timers.target. Apr 12 20:10:44.457620 systemd[1]: Listening on dbus.socket. Apr 12 20:10:44.465509 kernel: bond0: (slave enp2s0f1np1): link status down for interface, disabling it in 200 ms Apr 12 20:10:44.465534 kernel: bond0: (slave enp2s0f1np1): invalid new link 1 on slave Apr 12 20:10:44.465645 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.498100 systemd[1]: Starting docker.socket... Apr 12 20:10:44.502451 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Apr 12 20:10:44.502495 systemd-networkd[1298]: enp2s0f1np1: Link DOWN Apr 12 20:10:44.502497 systemd-networkd[1298]: enp2s0f1np1: Lost carrier Apr 12 20:10:44.511107 systemd[1]: Listening on sshd.socket. Apr 12 20:10:44.515648 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.515831 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.517613 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:10:44.518019 systemd[1]: Listening on docker.socket. Apr 12 20:10:44.524591 systemd[1]: Reached target sockets.target. Apr 12 20:10:44.532523 systemd[1]: Reached target basic.target. Apr 12 20:10:44.539544 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:10:44.539559 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 20:10:44.540045 systemd[1]: Starting containerd.service... Apr 12 20:10:44.546971 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 20:10:44.556016 systemd[1]: Starting coreos-metadata.service... Apr 12 20:10:44.563046 systemd[1]: Starting dbus.service... Apr 12 20:10:44.568995 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 20:10:44.573217 jq[1423]: false Apr 12 20:10:44.575131 coreos-metadata[1416]: Apr 12 20:10:44.575 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:10:44.576048 systemd[1]: Starting extend-filesystems.service... Apr 12 20:10:44.579609 dbus-daemon[1422]: [system] SELinux support is enabled Apr 12 20:10:44.582551 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 20:10:44.582983 extend-filesystems[1425]: Found sda Apr 12 20:10:44.582983 extend-filesystems[1425]: Found sda1 Apr 12 20:10:44.619544 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Apr 12 20:10:44.619578 coreos-metadata[1416]: Apr 12 20:10:44.594 INFO Fetch successful Apr 12 20:10:44.583158 systemd[1]: Starting motdgen.service... Apr 12 20:10:44.619643 coreos-metadata[1419]: Apr 12 20:10:44.583 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Apr 12 20:10:44.619643 coreos-metadata[1419]: Apr 12 20:10:44.604 INFO Fetch successful Apr 12 20:10:44.619770 extend-filesystems[1425]: Found sda2 Apr 12 20:10:44.619770 extend-filesystems[1425]: Found sda3 Apr 12 20:10:44.619770 extend-filesystems[1425]: Found usr Apr 12 20:10:44.619770 extend-filesystems[1425]: Found sda4 Apr 12 20:10:44.619770 extend-filesystems[1425]: Found sda6 Apr 12 20:10:44.619770 extend-filesystems[1425]: Found sda7 Apr 12 20:10:44.619770 extend-filesystems[1425]: Found sda9 Apr 12 20:10:44.619770 extend-filesystems[1425]: Checking size of /dev/sda9 Apr 12 20:10:44.619770 extend-filesystems[1425]: Resized partition /dev/sda9 Apr 12 20:10:44.756533 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Apr 12 20:10:44.756660 kernel: bond0: (slave enp2s0f1np1): speed changed to 0 on port 1 Apr 12 20:10:44.756679 kernel: bond0: (slave enp2s0f1np1): link status up again after 200 ms Apr 12 20:10:44.756691 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Apr 12 20:10:44.590212 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 20:10:44.756797 extend-filesystems[1440]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 20:10:44.627911 systemd[1]: Starting sshd-keygen.service... Apr 12 20:10:44.646847 systemd[1]: Starting systemd-logind.service... Apr 12 20:10:44.682495 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 20:10:44.776756 update_engine[1452]: I0412 20:10:44.744920 1452 main.cc:92] Flatcar Update Engine starting Apr 12 20:10:44.776756 update_engine[1452]: I0412 20:10:44.748281 1452 update_check_scheduler.cc:74] Next update check in 3m8s Apr 12 20:10:44.683085 systemd[1]: Starting tcsd.service... Apr 12 20:10:44.776934 jq[1453]: true Apr 12 20:10:44.687842 systemd-networkd[1298]: enp2s0f1np1: Link UP Apr 12 20:10:44.687999 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.688107 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.688120 systemd-networkd[1298]: enp2s0f1np1: Gained carrier Apr 12 20:10:44.697548 systemd-logind[1450]: Watching system buttons on /dev/input/event3 (Power Button) Apr 12 20:10:44.697558 systemd-logind[1450]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 20:10:44.697568 systemd-logind[1450]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Apr 12 20:10:44.697666 systemd-logind[1450]: New seat seat0. Apr 12 20:10:44.698731 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 20:10:44.699095 systemd[1]: Starting update-engine.service... Apr 12 20:10:44.703690 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.703744 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.703813 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:44.706087 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 20:10:44.742827 systemd[1]: Started dbus.service. Apr 12 20:10:44.770366 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 20:10:44.770454 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 20:10:44.770601 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 20:10:44.770673 systemd[1]: Finished motdgen.service. Apr 12 20:10:44.783748 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 20:10:44.783823 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 20:10:44.794051 jq[1455]: true Apr 12 20:10:44.794534 dbus-daemon[1422]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 20:10:44.798479 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Apr 12 20:10:44.798570 systemd[1]: Condition check resulted in tcsd.service being skipped. Apr 12 20:10:44.801202 systemd[1]: Started systemd-logind.service. Apr 12 20:10:44.803118 env[1456]: time="2024-04-12T20:10:44.803096392Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 20:10:44.811638 env[1456]: time="2024-04-12T20:10:44.811622372Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 20:10:44.811709 env[1456]: time="2024-04-12T20:10:44.811699431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812279 env[1456]: time="2024-04-12T20:10:44.812264403Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812301 env[1456]: time="2024-04-12T20:10:44.812279730Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812389 env[1456]: time="2024-04-12T20:10:44.812379518Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812414 env[1456]: time="2024-04-12T20:10:44.812389940Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812414 env[1456]: time="2024-04-12T20:10:44.812397443Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 20:10:44.812414 env[1456]: time="2024-04-12T20:10:44.812402920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812466 env[1456]: time="2024-04-12T20:10:44.812454683Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812586 env[1456]: time="2024-04-12T20:10:44.812577950Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812652 env[1456]: time="2024-04-12T20:10:44.812642992Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 20:10:44.812674 env[1456]: time="2024-04-12T20:10:44.812655531Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 20:10:44.812690 env[1456]: time="2024-04-12T20:10:44.812681846Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 20:10:44.812690 env[1456]: time="2024-04-12T20:10:44.812688724Z" level=info msg="metadata content store policy set" policy=shared Apr 12 20:10:44.813585 systemd[1]: Started update-engine.service. Apr 12 20:10:44.823073 systemd[1]: Started locksmithd.service. Apr 12 20:10:44.827662 env[1456]: time="2024-04-12T20:10:44.827649192Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 20:10:44.827703 env[1456]: time="2024-04-12T20:10:44.827667202Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 20:10:44.827703 env[1456]: time="2024-04-12T20:10:44.827681432Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827708895Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827723119Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827736135Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827748616Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827757960Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827765083Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827772690Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827779418Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.833751 env[1456]: time="2024-04-12T20:10:44.827786224Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 20:10:44.829606 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 20:10:44.829685 systemd[1]: Reached target system-config.target. Apr 12 20:10:44.834098 env[1456]: time="2024-04-12T20:10:44.834085147Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 20:10:44.834167 env[1456]: time="2024-04-12T20:10:44.834156066Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 20:10:44.834320 env[1456]: time="2024-04-12T20:10:44.834309290Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 20:10:44.834357 env[1456]: time="2024-04-12T20:10:44.834329458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834357 env[1456]: time="2024-04-12T20:10:44.834342567Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 20:10:44.834416 env[1456]: time="2024-04-12T20:10:44.834380537Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834416 env[1456]: time="2024-04-12T20:10:44.834393990Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834416 env[1456]: time="2024-04-12T20:10:44.834407179Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834505 env[1456]: time="2024-04-12T20:10:44.834417715Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834505 env[1456]: time="2024-04-12T20:10:44.834429699Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834505 env[1456]: time="2024-04-12T20:10:44.834442042Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834505 env[1456]: time="2024-04-12T20:10:44.834458231Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834505 env[1456]: time="2024-04-12T20:10:44.834470581Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834505 env[1456]: time="2024-04-12T20:10:44.834482604Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834578189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834592034Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834604775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834615866Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834628799Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834639807Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 20:10:44.834671 env[1456]: time="2024-04-12T20:10:44.834656189Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 20:10:44.834852 bash[1482]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:10:44.834913 env[1456]: time="2024-04-12T20:10:44.834687771Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 20:10:44.834961 env[1456]: time="2024-04-12T20:10:44.834854236Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 20:10:44.834961 env[1456]: time="2024-04-12T20:10:44.834903160Z" level=info msg="Connect containerd service" Apr 12 20:10:44.834961 env[1456]: time="2024-04-12T20:10:44.834927869Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835231324Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835316841Z" level=info msg="Start subscribing containerd event" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835349753Z" level=info msg="Start recovering state" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835364142Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835384481Z" level=info msg="Start event monitor" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835387145Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835397840Z" level=info msg="Start snapshots syncer" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835403559Z" level=info msg="Start cni network conf syncer for default" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835407901Z" level=info msg="Start streaming server" Apr 12 20:10:44.838589 env[1456]: time="2024-04-12T20:10:44.835410519Z" level=info msg="containerd successfully booted in 0.032650s" Apr 12 20:10:44.837582 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 20:10:44.837655 systemd[1]: Reached target user-config.target. Apr 12 20:10:44.847355 systemd[1]: Started containerd.service. Apr 12 20:10:44.854711 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 20:10:44.888215 locksmithd[1490]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 20:10:45.135457 sshd_keygen[1449]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 20:10:45.147293 systemd[1]: Finished sshd-keygen.service. Apr 12 20:10:45.156371 systemd[1]: Starting issuegen.service... Apr 12 20:10:45.164702 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 20:10:45.164775 systemd[1]: Finished issuegen.service. Apr 12 20:10:45.173213 systemd[1]: Starting systemd-user-sessions.service... Apr 12 20:10:45.182696 systemd[1]: Finished systemd-user-sessions.service. Apr 12 20:10:45.192265 systemd[1]: Started getty@tty1.service. Apr 12 20:10:45.200093 systemd[1]: Started serial-getty@ttyS1.service. Apr 12 20:10:45.209573 systemd[1]: Reached target getty.target. Apr 12 20:10:45.793509 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Apr 12 20:10:45.821684 extend-filesystems[1440]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 20:10:45.821684 extend-filesystems[1440]: old_desc_blocks = 1, new_desc_blocks = 56 Apr 12 20:10:45.821684 extend-filesystems[1440]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Apr 12 20:10:45.858542 extend-filesystems[1425]: Resized filesystem in /dev/sda9 Apr 12 20:10:45.858542 extend-filesystems[1425]: Found sdb Apr 12 20:10:45.822192 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 20:10:45.822285 systemd[1]: Finished extend-filesystems.service. Apr 12 20:10:45.826753 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:46.146559 systemd-networkd[1298]: bond0: Gained IPv6LL Apr 12 20:10:46.146746 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:46.147662 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 20:10:46.157776 systemd[1]: Reached target network-online.target. Apr 12 20:10:46.987606 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Apr 12 20:10:50.223303 login[1512]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:10:50.228895 login[1511]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Apr 12 20:10:50.230862 systemd-logind[1450]: New session 1 of user core. Apr 12 20:10:50.231359 systemd[1]: Created slice user-500.slice. Apr 12 20:10:50.231956 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 20:10:50.233248 systemd-logind[1450]: New session 2 of user core. Apr 12 20:10:50.237022 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 20:10:50.237689 systemd[1]: Starting user@500.service... Apr 12 20:10:50.239676 (systemd)[1517]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:10:50.306111 systemd[1517]: Queued start job for default target default.target. Apr 12 20:10:50.306338 systemd[1517]: Reached target paths.target. Apr 12 20:10:50.306350 systemd[1517]: Reached target sockets.target. Apr 12 20:10:50.306358 systemd[1517]: Reached target timers.target. Apr 12 20:10:50.306365 systemd[1517]: Reached target basic.target. Apr 12 20:10:50.306384 systemd[1517]: Reached target default.target. Apr 12 20:10:50.306398 systemd[1517]: Startup finished in 63ms. Apr 12 20:10:50.306442 systemd[1]: Started user@500.service. Apr 12 20:10:50.307013 systemd[1]: Started session-1.scope. Apr 12 20:10:50.307351 systemd[1]: Started session-2.scope. Apr 12 20:10:52.449498 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Apr 12 20:10:52.449663 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Apr 12 20:10:52.749901 systemd[1]: Created slice system-sshd.slice. Apr 12 20:10:52.752775 systemd[1]: Started sshd@0-145.40.90.201:22-147.75.109.163:47742.service. Apr 12 20:10:52.816970 sshd[1538]: Accepted publickey for core from 147.75.109.163 port 47742 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:10:52.817783 sshd[1538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:10:52.820740 systemd-logind[1450]: New session 3 of user core. Apr 12 20:10:52.821329 systemd[1]: Started session-3.scope. Apr 12 20:10:52.873541 systemd[1]: Started sshd@1-145.40.90.201:22-147.75.109.163:47750.service. Apr 12 20:10:52.908431 sshd[1543]: Accepted publickey for core from 147.75.109.163 port 47750 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:10:52.909158 sshd[1543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:10:52.911382 systemd-logind[1450]: New session 4 of user core. Apr 12 20:10:52.911915 systemd[1]: Started session-4.scope. Apr 12 20:10:52.961527 sshd[1543]: pam_unix(sshd:session): session closed for user core Apr 12 20:10:52.962925 systemd[1]: sshd@1-145.40.90.201:22-147.75.109.163:47750.service: Deactivated successfully. Apr 12 20:10:52.963242 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 20:10:52.963563 systemd-logind[1450]: Session 4 logged out. Waiting for processes to exit. Apr 12 20:10:52.964036 systemd[1]: Started sshd@2-145.40.90.201:22-147.75.109.163:47766.service. Apr 12 20:10:52.964403 systemd-logind[1450]: Removed session 4. Apr 12 20:10:53.000132 sshd[1549]: Accepted publickey for core from 147.75.109.163 port 47766 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:10:53.001283 sshd[1549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:10:53.005593 systemd-logind[1450]: New session 5 of user core. Apr 12 20:10:53.006580 systemd[1]: Started session-5.scope. Apr 12 20:10:53.065742 sshd[1549]: pam_unix(sshd:session): session closed for user core Apr 12 20:10:53.067060 systemd[1]: sshd@2-145.40.90.201:22-147.75.109.163:47766.service: Deactivated successfully. Apr 12 20:10:53.067420 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 20:10:53.067867 systemd-logind[1450]: Session 5 logged out. Waiting for processes to exit. Apr 12 20:10:53.068384 systemd-logind[1450]: Removed session 5. Apr 12 20:10:54.523005 systemd[1]: Started sshd@3-145.40.90.201:22-43.163.220.126:52842.service. Apr 12 20:10:55.400655 sshd[1556]: Invalid user kiu from 43.163.220.126 port 52842 Apr 12 20:10:55.406808 sshd[1556]: pam_faillock(sshd:auth): User unknown Apr 12 20:10:55.407939 sshd[1556]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:10:55.408040 sshd[1556]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:10:55.409081 sshd[1556]: pam_faillock(sshd:auth): User unknown Apr 12 20:10:57.006702 sshd[1556]: Failed password for invalid user kiu from 43.163.220.126 port 52842 ssh2 Apr 12 20:10:57.222716 sshd[1556]: Received disconnect from 43.163.220.126 port 52842:11: Bye Bye [preauth] Apr 12 20:10:57.222716 sshd[1556]: Disconnected from invalid user kiu 43.163.220.126 port 52842 [preauth] Apr 12 20:10:57.225247 systemd[1]: sshd@3-145.40.90.201:22-43.163.220.126:52842.service: Deactivated successfully. Apr 12 20:10:58.212672 unknown[1416]: wrote ssh authorized keys file for user: core Apr 12 20:10:58.231661 update-ssh-keys[1559]: Updated "/home/core/.ssh/authorized_keys" Apr 12 20:10:58.232845 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 20:10:58.653923 coreos-metadata[1419]: Apr 12 20:10:58.653 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Apr 12 20:10:58.678674 coreos-metadata[1419]: Apr 12 20:10:58.678 INFO Fetch successful Apr 12 20:10:58.704832 systemd[1]: Finished coreos-metadata.service. Apr 12 20:10:58.705621 systemd[1]: Starting etcd-member.service... Apr 12 20:10:58.706238 systemd[1]: Started packet-phone-home.service. Apr 12 20:10:58.711327 curl[1564]: % Total % Received % Xferd Average Speed Time Time Time Current Apr 12 20:10:58.711550 curl[1564]: Dload Upload Total Spent Left Speed Apr 12 20:10:58.721818 systemd[1]: Starting docker.service... Apr 12 20:10:58.739198 env[1579]: time="2024-04-12T20:10:58.739140623Z" level=info msg="Starting up" Apr 12 20:10:58.739758 env[1579]: time="2024-04-12T20:10:58.739716886Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:10:58.739758 env[1579]: time="2024-04-12T20:10:58.739726216Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:10:58.739758 env[1579]: time="2024-04-12T20:10:58.739737046Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:10:58.739758 env[1579]: time="2024-04-12T20:10:58.739743291Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:10:58.741033 env[1579]: time="2024-04-12T20:10:58.741017860Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 20:10:58.741033 env[1579]: time="2024-04-12T20:10:58.741030805Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 20:10:58.741095 env[1579]: time="2024-04-12T20:10:58.741040230Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 20:10:58.741095 env[1579]: time="2024-04-12T20:10:58.741047962Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 20:10:58.775612 env[1579]: time="2024-04-12T20:10:58.775573250Z" level=info msg="Loading containers: start." Apr 12 20:10:58.925520 kernel: Initializing XFRM netlink socket Apr 12 20:10:58.998585 env[1579]: time="2024-04-12T20:10:58.998537071Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 20:10:58.999608 systemd-timesyncd[1409]: Network configuration changed, trying to establish connection. Apr 12 20:10:59.058676 systemd-networkd[1298]: docker0: Link UP Apr 12 20:10:59.068100 env[1579]: time="2024-04-12T20:10:59.068027367Z" level=info msg="Loading containers: done." Apr 12 20:10:59.080464 env[1579]: time="2024-04-12T20:10:59.080368923Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 20:10:59.080772 env[1579]: time="2024-04-12T20:10:59.080702160Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 20:10:59.080921 env[1579]: time="2024-04-12T20:10:59.080882530Z" level=info msg="Daemon has completed initialization" Apr 12 20:10:59.081724 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3064262420-merged.mount: Deactivated successfully. Apr 12 20:10:59.088113 systemd[1]: Started docker.service. Apr 12 20:10:59.091290 env[1579]: time="2024-04-12T20:10:59.091236690Z" level=info msg="API listen on /run/docker.sock" Apr 12 20:10:59.091774 etcd-wrapper[1568]: Error response from daemon: No such container: etcd-member Apr 12 20:10:59.097987 curl[1564]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Apr 12 20:10:59.098639 systemd[1]: packet-phone-home.service: Deactivated successfully. Apr 12 20:10:59.104419 etcd-wrapper[1705]: Error: No such container: etcd-member Apr 12 20:10:59.134666 etcd-wrapper[1726]: Unable to find image 'quay.io/coreos/etcd:v3.5.0' locally Apr 12 20:10:58.921311 systemd-resolved[1408]: Clock change detected. Flushing caches. Apr 12 20:10:58.935739 systemd-journald[1250]: Time jumped backwards, rotating. Apr 12 20:10:58.921477 systemd-timesyncd[1409]: Contacted time server [2603:c020:0:8369::bad:babe]:123 (2.flatcar.pool.ntp.org). Apr 12 20:10:58.921563 systemd-timesyncd[1409]: Initial clock synchronization to Fri 2024-04-12 20:10:58.921209 UTC. Apr 12 20:10:59.648648 systemd[1]: Started sshd@4-145.40.90.201:22-43.128.89.189:55774.service. Apr 12 20:10:59.917115 etcd-wrapper[1726]: v3.5.0: Pulling from coreos/etcd Apr 12 20:11:00.205692 etcd-wrapper[1726]: 1813d21adc01: Pulling fs layer Apr 12 20:11:00.205692 etcd-wrapper[1726]: 6e96907ab677: Pulling fs layer Apr 12 20:11:00.205692 etcd-wrapper[1726]: 444ed0ea8673: Pulling fs layer Apr 12 20:11:00.205692 etcd-wrapper[1726]: 0fd2df5633f0: Pulling fs layer Apr 12 20:11:00.205692 etcd-wrapper[1726]: 8cc22b9456bb: Pulling fs layer Apr 12 20:11:00.205692 etcd-wrapper[1726]: 7ac70aecd290: Pulling fs layer Apr 12 20:11:00.206300 etcd-wrapper[1726]: 4b376c64dfe4: Pulling fs layer Apr 12 20:11:00.206300 etcd-wrapper[1726]: 8cc22b9456bb: Waiting Apr 12 20:11:00.206300 etcd-wrapper[1726]: 7ac70aecd290: Waiting Apr 12 20:11:00.206300 etcd-wrapper[1726]: 4b376c64dfe4: Waiting Apr 12 20:11:00.616543 etcd-wrapper[1726]: 444ed0ea8673: Verifying Checksum Apr 12 20:11:00.616543 etcd-wrapper[1726]: 444ed0ea8673: Download complete Apr 12 20:11:00.622334 etcd-wrapper[1726]: 6e96907ab677: Verifying Checksum Apr 12 20:11:00.622334 etcd-wrapper[1726]: 6e96907ab677: Download complete Apr 12 20:11:00.674741 sshd[1739]: Invalid user parking from 43.128.89.189 port 55774 Apr 12 20:11:00.680520 sshd[1739]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:00.681570 sshd[1739]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:00.681658 sshd[1739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:11:00.682616 sshd[1739]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:00.774848 etcd-wrapper[1726]: 1813d21adc01: Download complete Apr 12 20:11:00.950329 etcd-wrapper[1726]: 8cc22b9456bb: Verifying Checksum Apr 12 20:11:00.950329 etcd-wrapper[1726]: 8cc22b9456bb: Download complete Apr 12 20:11:00.968252 etcd-wrapper[1726]: 0fd2df5633f0: Verifying Checksum Apr 12 20:11:00.968252 etcd-wrapper[1726]: 0fd2df5633f0: Download complete Apr 12 20:11:01.087130 etcd-wrapper[1726]: 7ac70aecd290: Verifying Checksum Apr 12 20:11:01.087130 etcd-wrapper[1726]: 7ac70aecd290: Download complete Apr 12 20:11:01.275636 etcd-wrapper[1726]: 4b376c64dfe4: Verifying Checksum Apr 12 20:11:01.275636 etcd-wrapper[1726]: 4b376c64dfe4: Download complete Apr 12 20:11:01.347150 etcd-wrapper[1726]: 1813d21adc01: Pull complete Apr 12 20:11:01.587488 systemd[1]: var-lib-docker-overlay2-cbce8cf434c689e5bd16fc5c53d225de9189eb11188105dc2e28d4e92938f34b-merged.mount: Deactivated successfully. Apr 12 20:11:01.825293 etcd-wrapper[1726]: 6e96907ab677: Pull complete Apr 12 20:11:01.986404 systemd[1]: var-lib-docker-overlay2-270d6e2b333d012cf03df52f8e956e3f2ff9b10d6472eb750648b04707121f21-merged.mount: Deactivated successfully. Apr 12 20:11:02.032616 etcd-wrapper[1726]: 444ed0ea8673: Pull complete Apr 12 20:11:02.216039 etcd-wrapper[1726]: 0fd2df5633f0: Pull complete Apr 12 20:11:02.306999 etcd-wrapper[1726]: 8cc22b9456bb: Pull complete Apr 12 20:11:02.354158 systemd[1]: var-lib-docker-overlay2-860eefe16a6042214a9026ef2c0c2d066924f97d440800044caea6c9ed894d33-merged.mount: Deactivated successfully. Apr 12 20:11:02.361935 systemd[1]: var-lib-docker-overlay2-66615b2ec82379b67241109588e7af08f60bf250a2b88510efe5edc1b928923f-merged.mount: Deactivated successfully. Apr 12 20:11:02.378627 etcd-wrapper[1726]: 7ac70aecd290: Pull complete Apr 12 20:11:02.423302 systemd[1]: var-lib-docker-overlay2-aa67ea28c9ab32609dd18237e19a097bbaf71debeed5eff4e2aa0dbc42f0620e-merged.mount: Deactivated successfully. Apr 12 20:11:02.425976 etcd-wrapper[1726]: 4b376c64dfe4: Pull complete Apr 12 20:11:02.429214 etcd-wrapper[1726]: Digest: sha256:28759af54acd6924b2191dc1a1d096e2fa2e219717a21b9d8edf89717db3631b Apr 12 20:11:02.430134 etcd-wrapper[1726]: Status: Downloaded newer image for quay.io/coreos/etcd:v3.5.0 Apr 12 20:11:02.486657 env[1456]: time="2024-04-12T20:11:02.486558462Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 20:11:02.486657 env[1456]: time="2024-04-12T20:11:02.486592822Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 20:11:02.486657 env[1456]: time="2024-04-12T20:11:02.486604365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 20:11:02.487030 env[1456]: time="2024-04-12T20:11:02.486750968Z" level=info msg="starting signal loop" namespace=moby path=/run/containerd/io.containerd.runtime.v2.task/moby/5dc11e7db444bfb00ad09194c456bfdba5847c2b4c6645c81baaa6b1cfe5dc2d pid=1907 runtime=io.containerd.runc.v2 Apr 12 20:11:02.495661 systemd[1]: Started docker-5dc11e7db444bfb00ad09194c456bfdba5847c2b4c6645c81baaa6b1cfe5dc2d.scope. Apr 12 20:11:02.544993 etcd-wrapper[1726]: {"level":"info","ts":1712952662.5447767,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_DATA_DIR","variable-value":"/var/lib/etcd"} Apr 12 20:11:02.544993 etcd-wrapper[1726]: {"level":"info","ts":1712952662.5448403,"caller":"flags/flag.go:113","msg":"recognized and used environment variable","variable-name":"ETCD_NAME","variable-value":"8fe8443f9bc54b1da2aa8e107c3a401f"} Apr 12 20:11:02.544993 etcd-wrapper[1726]: {"level":"warn","ts":1712952662.5448694,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_URL=quay.io/coreos/etcd"} Apr 12 20:11:02.544993 etcd-wrapper[1726]: {"level":"warn","ts":1712952662.5448773,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_IMAGE_TAG=v3.5.0"} Apr 12 20:11:02.544993 etcd-wrapper[1726]: {"level":"warn","ts":1712952662.5448837,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_USER=etcd"} Apr 12 20:11:02.544993 etcd-wrapper[1726]: {"level":"warn","ts":1712952662.544889,"caller":"flags/flag.go:93","msg":"unrecognized environment variable","environment-variable":"ETCD_SSL_DIR=/etc/ssl/certs"} Apr 12 20:11:02.545330 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.544Z","caller":"etcdmain/etcd.go:72","msg":"Running: ","args":["/usr/local/bin/etcd","--listen-client-urls=http://0.0.0.0:2379","--advertise-client-urls=http://10.67.80.11:2379"]} Apr 12 20:11:02.545330 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.545Z","caller":"embed/etcd.go:131","msg":"configuring peer listeners","listen-peer-urls":["http://localhost:2380"]} Apr 12 20:11:02.545643 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.545Z","caller":"embed/etcd.go:139","msg":"configuring client listeners","listen-client-urls":["http://0.0.0.0:2379"]} Apr 12 20:11:02.545704 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.545Z","caller":"embed/etcd.go:307","msg":"starting an etcd server","etcd-version":"3.5.0","git-sha":"946a5a6f2","go-version":"go1.16.3","go-os":"linux","go-arch":"amd64","max-cpu-set":16,"max-cpu-available":16,"member-initialized":false,"name":"8fe8443f9bc54b1da2aa8e107c3a401f","data-dir":"/var/lib/etcd","wal-dir":"","wal-dir-dedicated":"","member-dir":"/var/lib/etcd/member","force-new-cluster":false,"heartbeat-interval":"100ms","election-timeout":"1s","initial-election-tick-advance":true,"snapshot-count":100000,"snapshot-catchup-entries":5000,"initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.11:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[],"cors":["*"],"host-whitelist":["*"],"initial-cluster":"8fe8443f9bc54b1da2aa8e107c3a401f=http://localhost:2380","initial-cluster-state":"new","initial-cluster-token":"etcd-cluster","quota-size-bytes":2147483648,"pre-vote":true,"initial-corrupt-check":false,"corrupt-check-time-interval":"0s","auto-compaction-mode":"periodic","auto-compaction-retention":"0s","auto-compaction-interval":"0s","discovery-url":"","discovery-proxy":"","downgrade-check-interval":"5s"} Apr 12 20:11:02.546658 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.546Z","caller":"etcdserver/backend.go:81","msg":"opened backend db","path":"/var/lib/etcd/member/snap/db","took":"705.266µs"} Apr 12 20:11:02.548121 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.547Z","caller":"etcdserver/raft.go:448","msg":"starting local member","local-member-id":"8e9e05c52164694d","cluster-id":"cdf818194e3a8c32"} Apr 12 20:11:02.548121 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.547Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=()"} Apr 12 20:11:02.548121 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.548Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 0"} Apr 12 20:11:02.548121 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.548Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"newRaft 8e9e05c52164694d [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]"} Apr 12 20:11:02.548121 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.548Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became follower at term 1"} Apr 12 20:11:02.548121 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.548Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Apr 12 20:11:02.548942 etcd-wrapper[1726]: {"level":"warn","ts":"2024-04-12T20:11:02.548Z","caller":"auth/store.go:1220","msg":"simple token is not cryptographically signed"} Apr 12 20:11:02.549451 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.549Z","caller":"mvcc/kvstore.go:415","msg":"kvstore restored","current-rev":1} Apr 12 20:11:02.549781 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.549Z","caller":"etcdserver/quota.go:94","msg":"enabled backend quota with default value","quota-name":"v3-applier","quota-size-bytes":2147483648,"quota-size":"2.1 GB"} Apr 12 20:11:02.549974 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.549Z","caller":"etcdserver/server.go:843","msg":"starting etcd server","local-member-id":"8e9e05c52164694d","local-server-version":"3.5.0","cluster-version":"to_be_decided"} Apr 12 20:11:02.550125 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.549Z","caller":"etcdserver/server.go:728","msg":"started as single-node; fast-forwarding election ticks","local-member-id":"8e9e05c52164694d","forward-ticks":9,"forward-duration":"900ms","election-ticks":10,"election-timeout":"1s"} Apr 12 20:11:02.550883 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.550Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d switched to configuration voters=(10276657743932975437)"} Apr 12 20:11:02.550954 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.550Z","caller":"membership/cluster.go:393","msg":"added member","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","added-peer-id":"8e9e05c52164694d","added-peer-peer-urls":["http://localhost:2380"]} Apr 12 20:11:02.552470 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.552Z","caller":"embed/etcd.go:276","msg":"now serving peer/client/metrics","local-member-id":"8e9e05c52164694d","initial-advertise-peer-urls":["http://localhost:2380"],"listen-peer-urls":["http://localhost:2380"],"advertise-client-urls":["http://10.67.80.11:2379"],"listen-client-urls":["http://0.0.0.0:2379"],"listen-metrics-urls":[]} Apr 12 20:11:02.552470 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.552Z","caller":"embed/etcd.go:580","msg":"serving peer traffic","address":"127.0.0.1:2380"} Apr 12 20:11:02.552470 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:02.552Z","caller":"embed/etcd.go:552","msg":"cmux::serve","address":"127.0.0.1:2380"} Apr 12 20:11:02.631608 systemd[1]: Started sshd@5-145.40.90.201:22-147.75.109.163:36326.service. Apr 12 20:11:02.635234 sshd[1739]: Failed password for invalid user parking from 43.128.89.189 port 55774 ssh2 Apr 12 20:11:02.702396 sshd[1954]: Accepted publickey for core from 147.75.109.163 port 36326 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:02.705365 sshd[1954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:02.714976 systemd-logind[1450]: New session 6 of user core. Apr 12 20:11:02.717129 systemd[1]: Started session-6.scope. Apr 12 20:11:02.795085 sshd[1954]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:02.801019 systemd[1]: sshd@5-145.40.90.201:22-147.75.109.163:36326.service: Deactivated successfully. Apr 12 20:11:02.802472 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 20:11:02.804056 systemd-logind[1450]: Session 6 logged out. Waiting for processes to exit. Apr 12 20:11:02.806431 systemd[1]: Started sshd@6-145.40.90.201:22-147.75.109.163:36328.service. Apr 12 20:11:02.808492 systemd-logind[1450]: Removed session 6. Apr 12 20:11:02.876248 sshd[1960]: Accepted publickey for core from 147.75.109.163 port 36328 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:02.879172 sshd[1960]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:02.888704 systemd-logind[1450]: New session 7 of user core. Apr 12 20:11:02.890844 systemd[1]: Started session-7.scope. Apr 12 20:11:02.969018 sshd[1960]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:02.974267 systemd[1]: sshd@6-145.40.90.201:22-147.75.109.163:36328.service: Deactivated successfully. Apr 12 20:11:02.975805 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 20:11:02.977397 systemd-logind[1450]: Session 7 logged out. Waiting for processes to exit. Apr 12 20:11:02.979557 systemd-logind[1450]: Removed session 7. Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d is starting a new election at term 1"} Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became pre-candidate at term 1"} Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgPreVoteResp from 8e9e05c52164694d at term 1"} Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became candidate at term 2"} Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d received MsgVoteResp from 8e9e05c52164694d at term 2"} Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"8e9e05c52164694d became leader at term 2"} Apr 12 20:11:03.149208 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.148Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 8e9e05c52164694d elected leader 8e9e05c52164694d at term 2"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.149Z","caller":"etcdserver/server.go:2027","msg":"published local member to cluster through raft","local-member-id":"8e9e05c52164694d","local-member-attributes":"{Name:8fe8443f9bc54b1da2aa8e107c3a401f ClientURLs:[http://10.67.80.11:2379]}","request-path":"/0/members/8e9e05c52164694d/attributes","cluster-id":"cdf818194e3a8c32","publish-timeout":"7s"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.149Z","caller":"etcdserver/server.go:2476","msg":"setting up initial cluster version using v2 API","cluster-version":"3.5"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.149Z","caller":"embed/serve.go:98","msg":"ready to serve client requests"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.149Z","caller":"membership/cluster.go:531","msg":"set initial cluster version","cluster-id":"cdf818194e3a8c32","local-member-id":"8e9e05c52164694d","cluster-version":"3.5"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.149Z","caller":"etcdmain/main.go:47","msg":"notifying init daemon"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.149Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.150Z","caller":"etcdserver/server.go:2500","msg":"cluster version is updated","cluster-version":"3.5"} Apr 12 20:11:03.150788 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.150Z","caller":"etcdmain/main.go:53","msg":"successfully notified init daemon"} Apr 12 20:11:03.150460 systemd[1]: Started etcd-member.service. Apr 12 20:11:03.151286 systemd[1]: Reached target multi-user.target. Apr 12 20:11:03.152025 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:11:03.151Z","caller":"embed/serve.go:140","msg":"serving client traffic insecurely; this is strongly discouraged!","address":"[::]:2379"} Apr 12 20:11:03.154695 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 20:11:03.159415 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 20:11:03.159494 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 20:11:03.159627 systemd[1]: Startup finished in 2.013s (kernel) + 16.561s (initrd) + 25.214s (userspace) = 43.789s. Apr 12 20:11:03.356471 systemd[1]: var-lib-docker-overlay2-a1ca9845d8b990913b885284bd08b90c08d337adc2d025eb6ba81782fc6388f5\x2dinit-merged.mount: Deactivated successfully. Apr 12 20:11:03.680338 sshd[1739]: Received disconnect from 43.128.89.189 port 55774:11: Bye Bye [preauth] Apr 12 20:11:03.680338 sshd[1739]: Disconnected from invalid user parking 43.128.89.189 port 55774 [preauth] Apr 12 20:11:03.682871 systemd[1]: sshd@4-145.40.90.201:22-43.128.89.189:55774.service: Deactivated successfully. Apr 12 20:11:08.014147 systemd[1]: Started sshd@7-145.40.90.201:22-43.156.185.119:33738.service. Apr 12 20:11:08.022589 systemd[1]: Started sshd@8-145.40.90.201:22-46.101.14.145:36380.service. Apr 12 20:11:08.849555 sshd[1973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 user=root Apr 12 20:11:09.007965 sshd[1970]: Invalid user swapnil from 43.156.185.119 port 33738 Apr 12 20:11:09.014291 sshd[1970]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:09.015411 sshd[1970]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:09.015505 sshd[1970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:11:09.016462 sshd[1970]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:10.869963 sshd[1970]: Failed password for invalid user swapnil from 43.156.185.119 port 33738 ssh2 Apr 12 20:11:11.566257 sshd[1973]: Failed password for root from 46.101.14.145 port 36380 ssh2 Apr 12 20:11:11.878406 sshd[1970]: Received disconnect from 43.156.185.119 port 33738:11: Bye Bye [preauth] Apr 12 20:11:11.878406 sshd[1970]: Disconnected from invalid user swapnil 43.156.185.119 port 33738 [preauth] Apr 12 20:11:11.880799 systemd[1]: sshd@7-145.40.90.201:22-43.156.185.119:33738.service: Deactivated successfully. Apr 12 20:11:12.977473 systemd[1]: Started sshd@9-145.40.90.201:22-147.75.109.163:56288.service. Apr 12 20:11:13.013246 sshd[1977]: Accepted publickey for core from 147.75.109.163 port 56288 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:13.014250 sshd[1977]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:13.017869 systemd-logind[1450]: New session 8 of user core. Apr 12 20:11:13.018688 systemd[1]: Started session-8.scope. Apr 12 20:11:13.075326 sshd[1977]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:13.077033 systemd[1]: sshd@9-145.40.90.201:22-147.75.109.163:56288.service: Deactivated successfully. Apr 12 20:11:13.077351 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 20:11:13.077683 systemd-logind[1450]: Session 8 logged out. Waiting for processes to exit. Apr 12 20:11:13.078239 systemd[1]: Started sshd@10-145.40.90.201:22-147.75.109.163:56290.service. Apr 12 20:11:13.078730 systemd-logind[1450]: Removed session 8. Apr 12 20:11:13.113885 sshd[1983]: Accepted publickey for core from 147.75.109.163 port 56290 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:13.114790 sshd[1983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:13.117934 systemd-logind[1450]: New session 9 of user core. Apr 12 20:11:13.118650 systemd[1]: Started session-9.scope. Apr 12 20:11:13.171845 sshd[1983]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:13.173381 systemd[1]: sshd@10-145.40.90.201:22-147.75.109.163:56290.service: Deactivated successfully. Apr 12 20:11:13.173671 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 20:11:13.173927 systemd-logind[1450]: Session 9 logged out. Waiting for processes to exit. Apr 12 20:11:13.174462 systemd[1]: Started sshd@11-145.40.90.201:22-147.75.109.163:56304.service. Apr 12 20:11:13.174823 systemd-logind[1450]: Removed session 9. Apr 12 20:11:13.209960 sshd[1989]: Accepted publickey for core from 147.75.109.163 port 56304 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:13.210999 sshd[1989]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:13.214842 systemd-logind[1450]: New session 10 of user core. Apr 12 20:11:13.215671 systemd[1]: Started session-10.scope. Apr 12 20:11:13.283838 sshd[1989]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:13.290624 systemd[1]: sshd@11-145.40.90.201:22-147.75.109.163:56304.service: Deactivated successfully. Apr 12 20:11:13.292241 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 20:11:13.293890 systemd-logind[1450]: Session 10 logged out. Waiting for processes to exit. Apr 12 20:11:13.296559 systemd[1]: Started sshd@12-145.40.90.201:22-147.75.109.163:56314.service. Apr 12 20:11:13.299025 systemd-logind[1450]: Removed session 10. Apr 12 20:11:13.371812 sshd[1995]: Accepted publickey for core from 147.75.109.163 port 56314 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:13.374753 sshd[1995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:13.384285 systemd-logind[1450]: New session 11 of user core. Apr 12 20:11:13.386442 systemd[1]: Started session-11.scope. Apr 12 20:11:13.479930 sudo[1998]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 20:11:13.480566 sudo[1998]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:11:13.495426 dbus-daemon[1422]: \xd0]\u001f:=V: received setenforce notice (enforcing=-143187408) Apr 12 20:11:13.500358 sudo[1998]: pam_unix(sudo:session): session closed for user root Apr 12 20:11:13.505494 sshd[1995]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:13.512561 systemd[1]: sshd@12-145.40.90.201:22-147.75.109.163:56314.service: Deactivated successfully. Apr 12 20:11:13.514247 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 20:11:13.515907 systemd-logind[1450]: Session 11 logged out. Waiting for processes to exit. Apr 12 20:11:13.518527 systemd[1]: Started sshd@13-145.40.90.201:22-147.75.109.163:56326.service. Apr 12 20:11:13.520935 systemd-logind[1450]: Removed session 11. Apr 12 20:11:13.590127 sshd[2002]: Accepted publickey for core from 147.75.109.163 port 56326 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:13.593028 sshd[2002]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:13.602627 systemd-logind[1450]: New session 12 of user core. Apr 12 20:11:13.604835 systemd[1]: Started session-12.scope. Apr 12 20:11:13.681266 sudo[2006]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 20:11:13.681868 sudo[2006]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:11:13.689363 sudo[2006]: pam_unix(sudo:session): session closed for user root Apr 12 20:11:13.701972 sudo[2005]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 20:11:13.702624 sudo[2005]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 20:11:13.727383 systemd[1]: Stopping audit-rules.service... Apr 12 20:11:13.729000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:11:13.730605 auditctl[2009]: No rules Apr 12 20:11:13.731458 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 20:11:13.731906 systemd[1]: Stopped audit-rules.service. Apr 12 20:11:13.735791 systemd[1]: Starting audit-rules.service... Apr 12 20:11:13.736226 kernel: kauditd_printk_skb: 105 callbacks suppressed Apr 12 20:11:13.736334 kernel: audit: type=1305 audit(1712952673.729:158): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 20:11:13.729000 audit[2009]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7a43a310 a2=420 a3=0 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:11:13.771886 augenrules[2026]: No rules Apr 12 20:11:13.772497 systemd[1]: Finished audit-rules.service. Apr 12 20:11:13.773292 sudo[2005]: pam_unix(sudo:session): session closed for user root Apr 12 20:11:13.774570 sshd[2002]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:13.777078 systemd[1]: sshd@13-145.40.90.201:22-147.75.109.163:56326.service: Deactivated successfully. Apr 12 20:11:13.777594 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 20:11:13.778091 systemd-logind[1450]: Session 12 logged out. Waiting for processes to exit. Apr 12 20:11:13.778933 systemd[1]: Started sshd@14-145.40.90.201:22-147.75.109.163:56340.service. Apr 12 20:11:13.779624 systemd-logind[1450]: Removed session 12. Apr 12 20:11:13.783306 kernel: audit: type=1300 audit(1712952673.729:158): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7a43a310 a2=420 a3=0 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:11:13.783346 kernel: audit: type=1327 audit(1712952673.729:158): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:11:13.729000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 20:11:13.792864 kernel: audit: type=1131 audit(1712952673.730:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.815356 kernel: audit: type=1130 audit(1712952673.771:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.837754 kernel: audit: type=1106 audit(1712952673.772:161): pid=2005 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.772000 audit[2005]: USER_END pid=2005 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.863819 kernel: audit: type=1104 audit(1712952673.772:162): pid=2005 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.772000 audit[2005]: CRED_DISP pid=2005 uid=500 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.867331 sshd[2032]: Accepted publickey for core from 147.75.109.163 port 56340 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:13.869262 sshd[2032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:13.871581 systemd-logind[1450]: New session 13 of user core. Apr 12 20:11:13.872007 systemd[1]: Started session-13.scope. Apr 12 20:11:13.887440 kernel: audit: type=1106 audit(1712952673.774:163): pid=2002 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.774000 audit[2002]: USER_END pid=2002 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.917566 sshd[2032]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:13.919011 systemd[1]: sshd@14-145.40.90.201:22-147.75.109.163:56340.service: Deactivated successfully. Apr 12 20:11:13.919298 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 20:11:13.919634 systemd-logind[1450]: Session 13 logged out. Waiting for processes to exit. Apr 12 20:11:13.774000 audit[2002]: CRED_DISP pid=2002 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.920116 systemd[1]: Started sshd@15-145.40.90.201:22-147.75.109.163:56352.service. Apr 12 20:11:13.920563 systemd-logind[1450]: Removed session 13. Apr 12 20:11:13.945810 kernel: audit: type=1104 audit(1712952673.774:164): pid=2002 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.945840 kernel: audit: type=1131 audit(1712952673.776:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.201:22-147.75.109.163:56326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-145.40.90.201:22-147.75.109.163:56326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.201:22-147.75.109.163:56340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.866000 audit[2032]: USER_ACCT pid=2032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.868000 audit[2032]: CRED_ACQ pid=2032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.868000 audit[2032]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd74b0be70 a2=3 a3=0 items=0 ppid=1 pid=2032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:11:13.868000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:11:13.873000 audit[2032]: USER_START pid=2032 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.873000 audit[2034]: CRED_ACQ pid=2034 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.917000 audit[2032]: USER_END pid=2032 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.917000 audit[2032]: CRED_DISP pid=2032 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:13.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-145.40.90.201:22-147.75.109.163:56340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:13.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.201:22-147.75.109.163:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:14.000000 audit[2040]: USER_ACCT pid=2040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:14.001899 sshd[2040]: Accepted publickey for core from 147.75.109.163 port 56352 ssh2: RSA SHA256:4q+sCjRc5WxlfFnFyvQvQr+/DeMoTFdRHOI9xHx9URg Apr 12 20:11:14.002000 audit[2040]: CRED_ACQ pid=2040 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:14.002000 audit[2040]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe573339b0 a2=3 a3=0 items=0 ppid=1 pid=2040 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 20:11:14.002000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 20:11:14.004107 sshd[2040]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 20:11:14.011748 systemd-logind[1450]: New session 14 of user core. Apr 12 20:11:14.013366 systemd[1]: Started session-14.scope. Apr 12 20:11:14.026000 audit[2040]: USER_START pid=2040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:14.029000 audit[2042]: CRED_ACQ pid=2042 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:14.148898 sshd[1973]: Received disconnect from 46.101.14.145 port 36380:11: Bye Bye [preauth] Apr 12 20:11:14.148898 sshd[1973]: Disconnected from authenticating user root 46.101.14.145 port 36380 [preauth] Apr 12 20:11:14.151435 systemd[1]: sshd@8-145.40.90.201:22-46.101.14.145:36380.service: Deactivated successfully. Apr 12 20:11:14.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-145.40.90.201:22-46.101.14.145:36380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:14.371184 sshd[2040]: pam_unix(sshd:session): session closed for user core Apr 12 20:11:14.372000 audit[2040]: USER_END pid=2040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:14.372000 audit[2040]: CRED_DISP pid=2040 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Apr 12 20:11:14.376585 systemd[1]: sshd@15-145.40.90.201:22-147.75.109.163:56352.service: Deactivated successfully. Apr 12 20:11:14.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-145.40.90.201:22-147.75.109.163:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:14.378135 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 20:11:14.379703 systemd-logind[1450]: Session 14 logged out. Waiting for processes to exit. Apr 12 20:11:14.381881 systemd-logind[1450]: Removed session 14. Apr 12 20:11:15.198513 systemd[1]: Started sshd@16-145.40.90.201:22-134.17.16.40:15120.service. Apr 12 20:11:15.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.201:22-134.17.16.40:15120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:15.311008 systemd[1]: Started sshd@17-145.40.90.201:22-43.156.243.235:56442.service. Apr 12 20:11:15.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-43.156.243.235:56442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:16.212335 sshd[2065]: Invalid user testuser from 134.17.16.40 port 15120 Apr 12 20:11:16.218494 sshd[2065]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:16.219689 sshd[2065]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:16.219782 sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Apr 12 20:11:16.220812 sshd[2065]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:16.220000 audit[2065]: USER_AUTH pid=2065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:11:16.334765 sshd[2068]: Invalid user l from 43.156.243.235 port 56442 Apr 12 20:11:16.340889 sshd[2068]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:16.341616 sshd[2068]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:16.341633 sshd[2068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:11:16.341802 sshd[2068]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:16.340000 audit[2068]: USER_AUTH pid=2068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:11:17.581559 systemd[1]: Started sshd@18-145.40.90.201:22-129.226.146.101:38700.service. Apr 12 20:11:17.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-129.226.146.101:38700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:17.702812 sshd[2065]: Failed password for invalid user testuser from 134.17.16.40 port 15120 ssh2 Apr 12 20:11:17.823644 sshd[2068]: Failed password for invalid user l from 43.156.243.235 port 56442 ssh2 Apr 12 20:11:18.535692 sshd[2065]: Received disconnect from 134.17.16.40 port 15120:11: Bye Bye [preauth] Apr 12 20:11:18.535692 sshd[2065]: Disconnected from invalid user testuser 134.17.16.40 port 15120 [preauth] Apr 12 20:11:18.538204 systemd[1]: sshd@16-145.40.90.201:22-134.17.16.40:15120.service: Deactivated successfully. Apr 12 20:11:18.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-145.40.90.201:22-134.17.16.40:15120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:18.587272 sshd[2071]: Invalid user origin from 129.226.146.101 port 38700 Apr 12 20:11:18.593511 sshd[2071]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:18.594637 sshd[2071]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:18.594730 sshd[2071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:11:18.595746 sshd[2071]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:18.594000 audit[2071]: USER_AUTH pid=2071 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:11:18.874323 sshd[2068]: Received disconnect from 43.156.243.235 port 56442:11: Bye Bye [preauth] Apr 12 20:11:18.874323 sshd[2068]: Disconnected from invalid user l 43.156.243.235 port 56442 [preauth] Apr 12 20:11:18.876848 systemd[1]: sshd@17-145.40.90.201:22-43.156.243.235:56442.service: Deactivated successfully. Apr 12 20:11:18.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-43.156.243.235:56442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:18.882929 kernel: kauditd_printk_skb: 30 callbacks suppressed Apr 12 20:11:18.882977 kernel: audit: type=1131 audit(1712952678.876:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-145.40.90.201:22-43.156.243.235:56442 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:20.685137 sshd[2071]: Failed password for invalid user origin from 129.226.146.101 port 38700 ssh2 Apr 12 20:11:20.878315 sshd[2071]: Received disconnect from 129.226.146.101 port 38700:11: Bye Bye [preauth] Apr 12 20:11:20.878315 sshd[2071]: Disconnected from invalid user origin 129.226.146.101 port 38700 [preauth] Apr 12 20:11:20.880880 systemd[1]: sshd@18-145.40.90.201:22-129.226.146.101:38700.service: Deactivated successfully. Apr 12 20:11:20.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-129.226.146.101:38700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:20.959176 kernel: audit: type=1131 audit(1712952680.880:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-145.40.90.201:22-129.226.146.101:38700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:22.466345 systemd[1]: Started sshd@19-145.40.90.201:22-104.250.50.61:49551.service. Apr 12 20:11:22.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-104.250.50.61:49551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:22.546029 kernel: audit: type=1130 audit(1712952682.465:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-104.250.50.61:49551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:25.040778 sshd[2078]: Invalid user testuser from 104.250.50.61 port 49551 Apr 12 20:11:25.046965 sshd[2078]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:25.048001 sshd[2078]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:25.048096 sshd[2078]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 Apr 12 20:11:25.048954 sshd[2078]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:25.048000 audit[2078]: USER_AUTH pid=2078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:11:25.133160 kernel: audit: type=1100 audit(1712952685.048:195): pid=2078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:11:26.766586 sshd[2078]: Failed password for invalid user testuser from 104.250.50.61 port 49551 ssh2 Apr 12 20:11:27.338523 sshd[2078]: Received disconnect from 104.250.50.61 port 49551:11: Bye Bye [preauth] Apr 12 20:11:27.338523 sshd[2078]: Disconnected from invalid user testuser 104.250.50.61 port 49551 [preauth] Apr 12 20:11:27.341049 systemd[1]: sshd@19-145.40.90.201:22-104.250.50.61:49551.service: Deactivated successfully. Apr 12 20:11:27.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-104.250.50.61:49551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:27.429308 kernel: audit: type=1131 audit(1712952687.340:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-145.40.90.201:22-104.250.50.61:49551 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:28.661537 systemd[1]: Started sshd@20-145.40.90.201:22-124.156.205.16:32960.service. Apr 12 20:11:28.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-124.156.205.16:32960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:28.751174 kernel: audit: type=1130 audit(1712952688.660:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-124.156.205.16:32960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:29.386196 update_engine[1452]: I0412 20:11:29.386075 1452 update_attempter.cc:509] Updating boot flags... Apr 12 20:11:29.645388 sshd[2082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 user=root Apr 12 20:11:29.644000 audit[2082]: USER_AUTH pid=2082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:11:29.736157 kernel: audit: type=1100 audit(1712952689.644:198): pid=2082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:11:31.579028 sshd[2082]: Failed password for root from 124.156.205.16 port 32960 ssh2 Apr 12 20:11:32.391499 sshd[2082]: Received disconnect from 124.156.205.16 port 32960:11: Bye Bye [preauth] Apr 12 20:11:32.391499 sshd[2082]: Disconnected from authenticating user root 124.156.205.16 port 32960 [preauth] Apr 12 20:11:32.394005 systemd[1]: sshd@20-145.40.90.201:22-124.156.205.16:32960.service: Deactivated successfully. Apr 12 20:11:32.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-124.156.205.16:32960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:32.486040 kernel: audit: type=1131 audit(1712952692.393:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-145.40.90.201:22-124.156.205.16:32960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:48.899249 systemd[1]: Started sshd@21-145.40.90.201:22-43.128.225.10:59478.service. Apr 12 20:11:48.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-43.128.225.10:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:48.991042 kernel: audit: type=1130 audit(1712952708.898:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-43.128.225.10:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:49.586842 sshd[2106]: Invalid user client from 43.128.225.10 port 59478 Apr 12 20:11:49.593015 sshd[2106]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:49.594106 sshd[2106]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:49.594198 sshd[2106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:11:49.595091 sshd[2106]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:49.594000 audit[2106]: USER_AUTH pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="client" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:11:49.688037 kernel: audit: type=1100 audit(1712952709.594:201): pid=2106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="client" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:11:51.272850 sshd[2106]: Failed password for invalid user client from 43.128.225.10 port 59478 ssh2 Apr 12 20:11:52.299850 sshd[2106]: Received disconnect from 43.128.225.10 port 59478:11: Bye Bye [preauth] Apr 12 20:11:52.299850 sshd[2106]: Disconnected from invalid user client 43.128.225.10 port 59478 [preauth] Apr 12 20:11:52.302457 systemd[1]: sshd@21-145.40.90.201:22-43.128.225.10:59478.service: Deactivated successfully. Apr 12 20:11:52.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-43.128.225.10:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:52.395030 kernel: audit: type=1131 audit(1712952712.302:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-145.40.90.201:22-43.128.225.10:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:54.250573 systemd[1]: Started sshd@22-145.40.90.201:22-43.163.220.126:46080.service. Apr 12 20:11:54.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.163.220.126:46080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:54.343162 kernel: audit: type=1130 audit(1712952714.249:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.163.220.126:46080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:55.222513 sshd[2110]: Invalid user snk from 43.163.220.126 port 46080 Apr 12 20:11:55.228808 sshd[2110]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:55.229868 sshd[2110]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:11:55.229961 sshd[2110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:11:55.230974 sshd[2110]: pam_faillock(sshd:auth): User unknown Apr 12 20:11:55.230000 audit[2110]: USER_AUTH pid=2110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="snk" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:11:55.323172 kernel: audit: type=1100 audit(1712952715.230:204): pid=2110 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="snk" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:11:57.378865 systemd[1]: Started sshd@23-145.40.90.201:22-150.109.19.36:46304.service. Apr 12 20:11:57.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-150.109.19.36:46304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:57.400099 sshd[2110]: Failed password for invalid user snk from 43.163.220.126 port 46080 ssh2 Apr 12 20:11:57.470985 kernel: audit: type=1130 audit(1712952717.377:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-150.109.19.36:46304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:57.757411 sshd[2110]: Received disconnect from 43.163.220.126 port 46080:11: Bye Bye [preauth] Apr 12 20:11:57.757411 sshd[2110]: Disconnected from invalid user snk 43.163.220.126 port 46080 [preauth] Apr 12 20:11:57.759912 systemd[1]: sshd@22-145.40.90.201:22-43.163.220.126:46080.service: Deactivated successfully. Apr 12 20:11:57.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.163.220.126:46080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:57.852035 kernel: audit: type=1131 audit(1712952717.759:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-145.40.90.201:22-43.163.220.126:46080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:11:58.389664 sshd[2113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:11:58.388000 audit[2113]: USER_AUTH pid=2113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:11:58.482170 kernel: audit: type=1100 audit(1712952718.388:207): pid=2113 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:12:00.303463 sshd[2113]: Failed password for root from 150.109.19.36 port 46304 ssh2 Apr 12 20:12:01.145254 sshd[2113]: Received disconnect from 150.109.19.36 port 46304:11: Bye Bye [preauth] Apr 12 20:12:01.145254 sshd[2113]: Disconnected from authenticating user root 150.109.19.36 port 46304 [preauth] Apr 12 20:12:01.147803 systemd[1]: sshd@23-145.40.90.201:22-150.109.19.36:46304.service: Deactivated successfully. Apr 12 20:12:01.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-150.109.19.36:46304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:01.242078 kernel: audit: type=1131 audit(1712952721.147:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-145.40.90.201:22-150.109.19.36:46304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:07.994481 systemd[1]: Started sshd@24-145.40.90.201:22-43.128.89.189:49006.service. Apr 12 20:12:07.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-43.128.89.189:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:08.088163 kernel: audit: type=1130 audit(1712952727.993:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-43.128.89.189:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:08.998772 sshd[2118]: Invalid user ubuntu from 43.128.89.189 port 49006 Apr 12 20:12:09.004935 sshd[2118]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:09.005969 sshd[2118]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:12:09.006086 sshd[2118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:12:09.006948 sshd[2118]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:09.006000 audit[2118]: USER_AUTH pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:12:09.100042 kernel: audit: type=1100 audit(1712952729.006:210): pid=2118 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:12:09.109941 systemd[1]: Started sshd@25-145.40.90.201:22-46.101.14.145:57744.service. Apr 12 20:12:09.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-46.101.14.145:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:09.202985 kernel: audit: type=1130 audit(1712952729.109:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-46.101.14.145:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:09.962443 sshd[2121]: Invalid user ubuntu from 46.101.14.145 port 57744 Apr 12 20:12:09.968730 sshd[2121]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:09.969837 sshd[2121]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:12:09.969930 sshd[2121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:12:09.970879 sshd[2121]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:09.970000 audit[2121]: USER_AUTH pid=2121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:12:10.064158 kernel: audit: type=1100 audit(1712952729.970:212): pid=2121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:12:10.764378 sshd[2118]: Failed password for invalid user ubuntu from 43.128.89.189 port 49006 ssh2 Apr 12 20:12:11.398600 sshd[2118]: Received disconnect from 43.128.89.189 port 49006:11: Bye Bye [preauth] Apr 12 20:12:11.398600 sshd[2118]: Disconnected from invalid user ubuntu 43.128.89.189 port 49006 [preauth] Apr 12 20:12:11.401054 systemd[1]: sshd@24-145.40.90.201:22-43.128.89.189:49006.service: Deactivated successfully. Apr 12 20:12:11.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-43.128.89.189:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:11.494041 kernel: audit: type=1131 audit(1712952731.400:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-145.40.90.201:22-43.128.89.189:49006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:11.729053 sshd[2121]: Failed password for invalid user ubuntu from 46.101.14.145 port 57744 ssh2 Apr 12 20:12:12.333449 sshd[2121]: Received disconnect from 46.101.14.145 port 57744:11: Bye Bye [preauth] Apr 12 20:12:12.333449 sshd[2121]: Disconnected from invalid user ubuntu 46.101.14.145 port 57744 [preauth] Apr 12 20:12:12.336014 systemd[1]: sshd@25-145.40.90.201:22-46.101.14.145:57744.service: Deactivated successfully. Apr 12 20:12:12.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-46.101.14.145:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:12.429059 kernel: audit: type=1131 audit(1712952732.335:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-145.40.90.201:22-46.101.14.145:57744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:15.461498 systemd[1]: Started sshd@26-145.40.90.201:22-134.17.16.40:15121.service. Apr 12 20:12:15.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-134.17.16.40:15121 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:15.554043 kernel: audit: type=1130 audit(1712952735.460:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-134.17.16.40:15121 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:16.420814 sshd[2126]: Invalid user test from 134.17.16.40 port 15121 Apr 12 20:12:16.427217 sshd[2126]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:16.428354 sshd[2126]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:12:16.428446 sshd[2126]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Apr 12 20:12:16.429369 sshd[2126]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:16.428000 audit[2126]: USER_AUTH pid=2126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:12:16.521031 kernel: audit: type=1100 audit(1712952736.428:216): pid=2126 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:12:18.147346 sshd[2126]: Failed password for invalid user test from 134.17.16.40 port 15121 ssh2 Apr 12 20:12:19.906127 sshd[2126]: Received disconnect from 134.17.16.40 port 15121:11: Bye Bye [preauth] Apr 12 20:12:19.906127 sshd[2126]: Disconnected from invalid user test 134.17.16.40 port 15121 [preauth] Apr 12 20:12:19.908646 systemd[1]: sshd@26-145.40.90.201:22-134.17.16.40:15121.service: Deactivated successfully. Apr 12 20:12:19.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-134.17.16.40:15121 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:20.002063 kernel: audit: type=1131 audit(1712952739.908:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-145.40.90.201:22-134.17.16.40:15121 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:31.221559 systemd[1]: Started sshd@27-145.40.90.201:22-129.226.146.101:34862.service. Apr 12 20:12:31.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-129.226.146.101:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:31.315180 kernel: audit: type=1130 audit(1712952751.220:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-129.226.146.101:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:32.227095 sshd[2131]: Invalid user test from 129.226.146.101 port 34862 Apr 12 20:12:32.233474 sshd[2131]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:32.234599 sshd[2131]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:12:32.234692 sshd[2131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:12:32.235770 sshd[2131]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:32.234000 audit[2131]: USER_AUTH pid=2131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:12:32.328177 kernel: audit: type=1100 audit(1712952752.234:219): pid=2131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:12:34.485352 sshd[2131]: Failed password for invalid user test from 129.226.146.101 port 34862 ssh2 Apr 12 20:12:35.722845 sshd[2131]: Received disconnect from 129.226.146.101 port 34862:11: Bye Bye [preauth] Apr 12 20:12:35.722845 sshd[2131]: Disconnected from invalid user test 129.226.146.101 port 34862 [preauth] Apr 12 20:12:35.725355 systemd[1]: sshd@27-145.40.90.201:22-129.226.146.101:34862.service: Deactivated successfully. Apr 12 20:12:35.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-129.226.146.101:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:35.818045 kernel: audit: type=1131 audit(1712952755.724:220): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-145.40.90.201:22-129.226.146.101:34862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:41.577836 systemd[1]: Started sshd@28-145.40.90.201:22-124.156.205.16:33708.service. Apr 12 20:12:41.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-124.156.205.16:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:41.671162 kernel: audit: type=1130 audit(1712952761.576:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-124.156.205.16:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:42.625511 sshd[2135]: Invalid user ubuntu from 124.156.205.16 port 33708 Apr 12 20:12:42.631885 sshd[2135]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:42.632971 sshd[2135]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:12:42.633093 sshd[2135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:12:42.634091 sshd[2135]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:42.633000 audit[2135]: USER_AUTH pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:12:42.727152 kernel: audit: type=1100 audit(1712952762.633:222): pid=2135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:12:44.923617 sshd[2135]: Failed password for invalid user ubuntu from 124.156.205.16 port 33708 ssh2 Apr 12 20:12:47.252260 sshd[2135]: Received disconnect from 124.156.205.16 port 33708:11: Bye Bye [preauth] Apr 12 20:12:47.252260 sshd[2135]: Disconnected from invalid user ubuntu 124.156.205.16 port 33708 [preauth] Apr 12 20:12:47.254814 systemd[1]: sshd@28-145.40.90.201:22-124.156.205.16:33708.service: Deactivated successfully. Apr 12 20:12:47.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-124.156.205.16:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:47.349159 kernel: audit: type=1131 audit(1712952767.254:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-145.40.90.201:22-124.156.205.16:33708 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:51.449166 systemd[1]: Started sshd@29-145.40.90.201:22-43.156.185.119:55400.service. Apr 12 20:12:51.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-43.156.185.119:55400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:51.542056 kernel: audit: type=1130 audit(1712952771.448:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-43.156.185.119:55400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:52.450077 sshd[2140]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 user=root Apr 12 20:12:52.449000 audit[2140]: USER_AUTH pid=2140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:12:52.543145 kernel: audit: type=1100 audit(1712952772.449:225): pid=2140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:12:52.875303 systemd[1]: Started sshd@30-145.40.90.201:22-43.156.243.235:52780.service. Apr 12 20:12:52.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-43.156.243.235:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:52.969179 kernel: audit: type=1130 audit(1712952772.874:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-43.156.243.235:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:53.955194 sshd[2143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:12:53.954000 audit[2143]: ANOM_LOGIN_FAILURES pid=2143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:53.955440 sshd[2143]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:12:53.954000 audit[2143]: USER_AUTH pid=2143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:12:54.112801 kernel: audit: type=2100 audit(1712952773.954:227): pid=2143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:54.112832 kernel: audit: type=1100 audit(1712952773.954:228): pid=2143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:12:54.444039 sshd[2140]: Failed password for root from 43.156.185.119 port 55400 ssh2 Apr 12 20:12:55.206023 sshd[2140]: Received disconnect from 43.156.185.119 port 55400:11: Bye Bye [preauth] Apr 12 20:12:55.206023 sshd[2140]: Disconnected from authenticating user root 43.156.185.119 port 55400 [preauth] Apr 12 20:12:55.208530 systemd[1]: sshd@29-145.40.90.201:22-43.156.185.119:55400.service: Deactivated successfully. Apr 12 20:12:55.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-43.156.185.119:55400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:55.303179 kernel: audit: type=1131 audit(1712952775.208:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-145.40.90.201:22-43.156.185.119:55400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:55.753386 sshd[2143]: Failed password for root from 43.156.243.235 port 52780 ssh2 Apr 12 20:12:56.717507 sshd[2143]: Received disconnect from 43.156.243.235 port 52780:11: Bye Bye [preauth] Apr 12 20:12:56.717507 sshd[2143]: Disconnected from authenticating user root 43.156.243.235 port 52780 [preauth] Apr 12 20:12:56.720042 systemd[1]: sshd@30-145.40.90.201:22-43.156.243.235:52780.service: Deactivated successfully. Apr 12 20:12:56.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-43.156.243.235:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:56.814164 kernel: audit: type=1131 audit(1712952776.719:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-145.40.90.201:22-43.156.243.235:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:59.034564 systemd[1]: Started sshd@31-145.40.90.201:22-43.128.225.10:54488.service. Apr 12 20:12:59.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:59.128029 kernel: audit: type=1130 audit(1712952779.033:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:59.645799 systemd[1]: Started sshd@32-145.40.90.201:22-43.163.220.126:39318.service. Apr 12 20:12:59.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-43.163.220.126:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:59.715502 sshd[2149]: Invalid user ada from 43.128.225.10 port 54488 Apr 12 20:12:59.716686 sshd[2149]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:59.716878 sshd[2149]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:12:59.716895 sshd[2149]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:12:59.717133 sshd[2149]: pam_faillock(sshd:auth): User unknown Apr 12 20:12:59.716000 audit[2149]: USER_AUTH pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ada" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:12:59.830745 kernel: audit: type=1130 audit(1712952779.644:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-43.163.220.126:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:12:59.830777 kernel: audit: type=1100 audit(1712952779.716:233): pid=2149 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ada" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:13:00.533279 sshd[2152]: Invalid user baa from 43.163.220.126 port 39318 Apr 12 20:13:00.534722 sshd[2152]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:00.534924 sshd[2152]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:13:00.534942 sshd[2152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:13:00.535172 sshd[2152]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:00.534000 audit[2152]: USER_AUTH pid=2152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="baa" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:13:00.628174 kernel: audit: type=1100 audit(1712952780.534:234): pid=2152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="baa" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:13:01.670816 sshd[2149]: Failed password for invalid user ada from 43.128.225.10 port 54488 ssh2 Apr 12 20:13:02.293179 sshd[2152]: Failed password for invalid user baa from 43.163.220.126 port 39318 ssh2 Apr 12 20:13:02.776149 sshd[2149]: Received disconnect from 43.128.225.10 port 54488:11: Bye Bye [preauth] Apr 12 20:13:02.776149 sshd[2149]: Disconnected from invalid user ada 43.128.225.10 port 54488 [preauth] Apr 12 20:13:02.778654 systemd[1]: sshd@31-145.40.90.201:22-43.128.225.10:54488.service: Deactivated successfully. Apr 12 20:13:02.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:02.873179 kernel: audit: type=1131 audit(1712952782.778:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-145.40.90.201:22-43.128.225.10:54488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:04.178402 sshd[2152]: Received disconnect from 43.163.220.126 port 39318:11: Bye Bye [preauth] Apr 12 20:13:04.178402 sshd[2152]: Disconnected from invalid user baa 43.163.220.126 port 39318 [preauth] Apr 12 20:13:04.180967 systemd[1]: sshd@32-145.40.90.201:22-43.163.220.126:39318.service: Deactivated successfully. Apr 12 20:13:04.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-43.163.220.126:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:04.275174 kernel: audit: type=1131 audit(1712952784.180:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-145.40.90.201:22-43.163.220.126:39318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:10.016739 systemd[1]: Started sshd@33-145.40.90.201:22-46.101.14.145:50876.service. Apr 12 20:13:10.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-46.101.14.145:50876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:10.109996 kernel: audit: type=1130 audit(1712952790.015:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-46.101.14.145:50876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:10.853466 sshd[2161]: Invalid user l from 46.101.14.145 port 50876 Apr 12 20:13:10.859548 sshd[2161]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:10.860649 sshd[2161]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:13:10.860741 sshd[2161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:13:10.861707 sshd[2161]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:10.860000 audit[2161]: USER_AUTH pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:13:10.955178 kernel: audit: type=1100 audit(1712952790.860:238): pid=2161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:13:11.794964 systemd[1]: Started sshd@34-145.40.90.201:22-150.109.19.36:42424.service. Apr 12 20:13:11.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-150.109.19.36:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:11.888003 kernel: audit: type=1130 audit(1712952791.794:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-150.109.19.36:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:12.659891 sshd[2161]: Failed password for invalid user l from 46.101.14.145 port 50876 ssh2 Apr 12 20:13:12.843121 sshd[2164]: Invalid user guest from 150.109.19.36 port 42424 Apr 12 20:13:12.849329 sshd[2164]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:12.850334 sshd[2164]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:13:12.850428 sshd[2164]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 Apr 12 20:13:12.851361 sshd[2164]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:12.850000 audit[2164]: USER_AUTH pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:13:12.944174 kernel: audit: type=1100 audit(1712952792.850:240): pid=2164 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:13:13.351763 sshd[2161]: Received disconnect from 46.101.14.145 port 50876:11: Bye Bye [preauth] Apr 12 20:13:13.351763 sshd[2161]: Disconnected from invalid user l 46.101.14.145 port 50876 [preauth] Apr 12 20:13:13.354339 systemd[1]: sshd@33-145.40.90.201:22-46.101.14.145:50876.service: Deactivated successfully. Apr 12 20:13:13.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-46.101.14.145:50876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:13.448173 kernel: audit: type=1131 audit(1712952793.353:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-145.40.90.201:22-46.101.14.145:50876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:14.925453 sshd[2164]: Failed password for invalid user guest from 150.109.19.36 port 42424 ssh2 Apr 12 20:13:15.604295 sshd[2164]: Received disconnect from 150.109.19.36 port 42424:11: Bye Bye [preauth] Apr 12 20:13:15.604295 sshd[2164]: Disconnected from invalid user guest 150.109.19.36 port 42424 [preauth] Apr 12 20:13:15.606890 systemd[1]: sshd@34-145.40.90.201:22-150.109.19.36:42424.service: Deactivated successfully. Apr 12 20:13:15.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-150.109.19.36:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:15.701179 kernel: audit: type=1131 audit(1712952795.605:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-145.40.90.201:22-150.109.19.36:42424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:18.155466 systemd[1]: Started sshd@35-145.40.90.201:22-43.128.89.189:42256.service. Apr 12 20:13:18.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-43.128.89.189:42256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:18.249181 kernel: audit: type=1130 audit(1712952798.155:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-43.128.89.189:42256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:19.193522 sshd[2169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 user=root Apr 12 20:13:19.192000 audit[2169]: ANOM_LOGIN_FAILURES pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:19.193766 sshd[2169]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:13:19.192000 audit[2169]: USER_AUTH pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:13:19.350046 kernel: audit: type=2100 audit(1712952799.192:244): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:19.350076 kernel: audit: type=1100 audit(1712952799.192:245): pid=2169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:13:21.227408 sshd[2169]: Failed password for root from 43.128.89.189 port 42256 ssh2 Apr 12 20:13:21.766745 systemd[1]: Started sshd@36-145.40.90.201:22-134.17.16.40:15122.service. Apr 12 20:13:21.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-134.17.16.40:15122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:21.860194 kernel: audit: type=1130 audit(1712952801.765:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-134.17.16.40:15122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:21.951816 sshd[2169]: Received disconnect from 43.128.89.189 port 42256:11: Bye Bye [preauth] Apr 12 20:13:21.951816 sshd[2169]: Disconnected from authenticating user root 43.128.89.189 port 42256 [preauth] Apr 12 20:13:21.952885 systemd[1]: sshd@35-145.40.90.201:22-43.128.89.189:42256.service: Deactivated successfully. Apr 12 20:13:21.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-43.128.89.189:42256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:22.047175 kernel: audit: type=1131 audit(1712952801.952:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-145.40.90.201:22-43.128.89.189:42256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:22.751907 sshd[2172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:13:22.751000 audit[2172]: USER_AUTH pid=2172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:13:22.844160 kernel: audit: type=1100 audit(1712952802.751:248): pid=2172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:13:24.530307 sshd[2172]: Failed password for root from 134.17.16.40 port 15122 ssh2 Apr 12 20:13:25.498502 sshd[2172]: Received disconnect from 134.17.16.40 port 15122:11: Bye Bye [preauth] Apr 12 20:13:25.498502 sshd[2172]: Disconnected from authenticating user root 134.17.16.40 port 15122 [preauth] Apr 12 20:13:25.501046 systemd[1]: sshd@36-145.40.90.201:22-134.17.16.40:15122.service: Deactivated successfully. Apr 12 20:13:25.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-134.17.16.40:15122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:25.594164 kernel: audit: type=1131 audit(1712952805.500:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-145.40.90.201:22-134.17.16.40:15122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:31.740042 systemd[1]: Started sshd@37-145.40.90.201:22-221.226.39.202:58587.service. Apr 12 20:13:31.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:31.831993 kernel: audit: type=1130 audit(1712952811.739:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:32.654056 sshd[2177]: Invalid user lin from 221.226.39.202 port 58587 Apr 12 20:13:32.660290 sshd[2177]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:32.661534 sshd[2177]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:13:32.661626 sshd[2177]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.39.202 Apr 12 20:13:32.662696 sshd[2177]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:32.661000 audit[2177]: USER_AUTH pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lin" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:13:32.756172 kernel: audit: type=1100 audit(1712952812.661:251): pid=2177 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lin" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:13:35.148298 sshd[2177]: Failed password for invalid user lin from 221.226.39.202 port 58587 ssh2 Apr 12 20:13:37.364582 sshd[2177]: Received disconnect from 221.226.39.202 port 58587:11: Bye Bye [preauth] Apr 12 20:13:37.364582 sshd[2177]: Disconnected from invalid user lin 221.226.39.202 port 58587 [preauth] Apr 12 20:13:37.367118 systemd[1]: sshd@37-145.40.90.201:22-221.226.39.202:58587.service: Deactivated successfully. Apr 12 20:13:37.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:37.461177 kernel: audit: type=1131 audit(1712952817.366:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-145.40.90.201:22-221.226.39.202:58587 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:48.746413 systemd[1]: Started sshd@38-145.40.90.201:22-129.226.146.101:59254.service. Apr 12 20:13:48.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-129.226.146.101:59254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:48.840186 kernel: audit: type=1130 audit(1712952828.745:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-129.226.146.101:59254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:49.745573 sshd[2182]: Invalid user amal from 129.226.146.101 port 59254 Apr 12 20:13:49.751684 sshd[2182]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:49.752856 sshd[2182]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:13:49.752947 sshd[2182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:13:49.753918 sshd[2182]: pam_faillock(sshd:auth): User unknown Apr 12 20:13:49.753000 audit[2182]: USER_AUTH pid=2182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amal" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:13:49.846187 kernel: audit: type=1100 audit(1712952829.753:254): pid=2182 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amal" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:13:52.239715 sshd[2182]: Failed password for invalid user amal from 129.226.146.101 port 59254 ssh2 Apr 12 20:13:52.383646 update_engine[1452]: I0412 20:13:52.383520 1452 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Apr 12 20:13:52.383646 update_engine[1452]: I0412 20:13:52.383599 1452 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Apr 12 20:13:52.384563 update_engine[1452]: I0412 20:13:52.384366 1452 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Apr 12 20:13:52.385525 update_engine[1452]: I0412 20:13:52.385448 1452 omaha_request_params.cc:62] Current group set to lts Apr 12 20:13:52.385779 update_engine[1452]: I0412 20:13:52.385737 1452 update_attempter.cc:499] Already updated boot flags. Skipping. Apr 12 20:13:52.385779 update_engine[1452]: I0412 20:13:52.385758 1452 update_attempter.cc:643] Scheduling an action processor start. Apr 12 20:13:52.386027 update_engine[1452]: I0412 20:13:52.385792 1452 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:13:52.386027 update_engine[1452]: I0412 20:13:52.385862 1452 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Apr 12 20:13:52.386272 update_engine[1452]: I0412 20:13:52.386026 1452 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:13:52.386272 update_engine[1452]: I0412 20:13:52.386046 1452 omaha_request_action.cc:271] Request: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: Apr 12 20:13:52.386272 update_engine[1452]: I0412 20:13:52.386057 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:13:52.387235 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Apr 12 20:13:52.389277 update_engine[1452]: I0412 20:13:52.389200 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:13:52.389484 update_engine[1452]: E0412 20:13:52.389461 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:13:52.389655 update_engine[1452]: I0412 20:13:52.389618 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Apr 12 20:13:53.728959 sshd[2182]: Received disconnect from 129.226.146.101 port 59254:11: Bye Bye [preauth] Apr 12 20:13:53.728959 sshd[2182]: Disconnected from invalid user amal 129.226.146.101 port 59254 [preauth] Apr 12 20:13:53.731521 systemd[1]: sshd@38-145.40.90.201:22-129.226.146.101:59254.service: Deactivated successfully. Apr 12 20:13:53.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-129.226.146.101:59254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:13:53.825183 kernel: audit: type=1131 audit(1712952833.731:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-145.40.90.201:22-129.226.146.101:59254 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:02.381101 update_engine[1452]: I0412 20:14:02.380965 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:14:02.382085 update_engine[1452]: I0412 20:14:02.381451 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:14:02.382085 update_engine[1452]: E0412 20:14:02.381659 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:14:02.382085 update_engine[1452]: I0412 20:14:02.381836 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Apr 12 20:14:03.343847 systemd[1]: Started sshd@39-145.40.90.201:22-124.156.205.16:36542.service. Apr 12 20:14:03.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-124.156.205.16:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:03.437197 kernel: audit: type=1130 audit(1712952843.342:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-124.156.205.16:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:04.304396 sshd[2186]: Invalid user work from 124.156.205.16 port 36542 Apr 12 20:14:04.310518 sshd[2186]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:04.311623 sshd[2186]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:14:04.311714 sshd[2186]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:14:04.312657 sshd[2186]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:04.311000 audit[2186]: USER_AUTH pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="work" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:14:04.406179 kernel: audit: type=1100 audit(1712952844.311:257): pid=2186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="work" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:14:05.479735 systemd[1]: Started sshd@40-145.40.90.201:22-43.163.220.126:60786.service. Apr 12 20:14:05.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-43.163.220.126:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:05.573043 kernel: audit: type=1130 audit(1712952845.478:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-43.163.220.126:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:06.122806 sshd[2189]: Invalid user not from 43.163.220.126 port 60786 Apr 12 20:14:06.129089 sshd[2189]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:06.129918 sshd[2189]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:14:06.129935 sshd[2189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:14:06.130172 sshd[2189]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:06.129000 audit[2189]: USER_AUTH pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="not" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:14:06.190815 sshd[2186]: Failed password for invalid user work from 124.156.205.16 port 36542 ssh2 Apr 12 20:14:06.223157 kernel: audit: type=1100 audit(1712952846.129:259): pid=2189 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="not" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:14:06.523614 sshd[2186]: Received disconnect from 124.156.205.16 port 36542:11: Bye Bye [preauth] Apr 12 20:14:06.523614 sshd[2186]: Disconnected from invalid user work 124.156.205.16 port 36542 [preauth] Apr 12 20:14:06.526125 systemd[1]: sshd@39-145.40.90.201:22-124.156.205.16:36542.service: Deactivated successfully. Apr 12 20:14:06.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-124.156.205.16:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:06.620183 kernel: audit: type=1131 audit(1712952846.525:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-145.40.90.201:22-124.156.205.16:36542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:07.948256 sshd[2189]: Failed password for invalid user not from 43.163.220.126 port 60786 ssh2 Apr 12 20:14:09.701299 systemd[1]: Started sshd@41-145.40.90.201:22-43.128.225.10:49490.service. Apr 12 20:14:09.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-43.128.225.10:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:09.795176 kernel: audit: type=1130 audit(1712952849.700:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-43.128.225.10:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:09.859128 sshd[2189]: Received disconnect from 43.163.220.126 port 60786:11: Bye Bye [preauth] Apr 12 20:14:09.859128 sshd[2189]: Disconnected from invalid user not 43.163.220.126 port 60786 [preauth] Apr 12 20:14:09.859916 systemd[1]: sshd@40-145.40.90.201:22-43.163.220.126:60786.service: Deactivated successfully. Apr 12 20:14:09.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-43.163.220.126:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:09.952154 kernel: audit: type=1131 audit(1712952849.859:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-145.40.90.201:22-43.163.220.126:60786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:10.584080 sshd[2193]: Invalid user ftp from 43.128.225.10 port 49490 Apr 12 20:14:10.590416 sshd[2193]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:10.591588 sshd[2193]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:14:10.591681 sshd[2193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:14:10.592622 sshd[2193]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:10.591000 audit[2193]: USER_AUTH pid=2193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:14:10.686176 kernel: audit: type=1100 audit(1712952850.591:263): pid=2193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftp" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:14:11.106078 systemd[1]: Started sshd@42-145.40.90.201:22-46.101.14.145:44008.service. Apr 12 20:14:11.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-46.101.14.145:44008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:11.156896 systemd[1]: Started sshd@43-145.40.90.201:22-43.156.185.119:48784.service. Apr 12 20:14:11.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-43.156.185.119:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:11.292049 kernel: audit: type=1130 audit(1712952851.105:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-46.101.14.145:44008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:11.292094 kernel: audit: type=1130 audit(1712952851.156:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-43.156.185.119:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:11.941500 sshd[2197]: Invalid user tests from 46.101.14.145 port 44008 Apr 12 20:14:11.947894 sshd[2197]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:11.948965 sshd[2197]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:14:11.949082 sshd[2197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:14:11.950025 sshd[2197]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:11.949000 audit[2197]: USER_AUTH pid=2197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tests" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:14:12.044180 kernel: audit: type=1100 audit(1712952851.949:266): pid=2197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tests" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:14:12.099092 sshd[2200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 user=root Apr 12 20:14:12.098000 audit[2200]: ANOM_LOGIN_FAILURES pid=2200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:12.099177 sshd[2200]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Apr 12 20:14:12.098000 audit[2200]: USER_AUTH pid=2200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:14:12.254557 kernel: audit: type=2100 audit(1712952852.098:267): pid=2200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:12.254589 kernel: audit: type=1100 audit(1712952852.098:268): pid=2200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:14:12.294350 sshd[2193]: Failed password for invalid user ftp from 43.128.225.10 port 49490 ssh2 Apr 12 20:14:12.381323 update_engine[1452]: I0412 20:14:12.381202 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:14:12.382159 update_engine[1452]: I0412 20:14:12.381680 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:14:12.382159 update_engine[1452]: E0412 20:14:12.381891 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:14:12.382159 update_engine[1452]: I0412 20:14:12.382095 1452 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Apr 12 20:14:13.322564 sshd[2193]: Received disconnect from 43.128.225.10 port 49490:11: Bye Bye [preauth] Apr 12 20:14:13.322564 sshd[2193]: Disconnected from invalid user ftp 43.128.225.10 port 49490 [preauth] Apr 12 20:14:13.325060 systemd[1]: sshd@41-145.40.90.201:22-43.128.225.10:49490.service: Deactivated successfully. Apr 12 20:14:13.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-43.128.225.10:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:13.419185 kernel: audit: type=1131 audit(1712952853.324:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-145.40.90.201:22-43.128.225.10:49490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:14.124333 sshd[2197]: Failed password for invalid user tests from 46.101.14.145 port 44008 ssh2 Apr 12 20:14:14.408860 sshd[2200]: Failed password for root from 43.156.185.119 port 48784 ssh2 Apr 12 20:14:14.859842 sshd[2200]: Received disconnect from 43.156.185.119 port 48784:11: Bye Bye [preauth] Apr 12 20:14:14.859842 sshd[2200]: Disconnected from authenticating user root 43.156.185.119 port 48784 [preauth] Apr 12 20:14:14.862295 systemd[1]: sshd@43-145.40.90.201:22-43.156.185.119:48784.service: Deactivated successfully. Apr 12 20:14:14.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-43.156.185.119:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:14.956064 kernel: audit: type=1131 audit(1712952854.861:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-145.40.90.201:22-43.156.185.119:48784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:16.282970 sshd[2197]: Received disconnect from 46.101.14.145 port 44008:11: Bye Bye [preauth] Apr 12 20:14:16.282970 sshd[2197]: Disconnected from invalid user tests 46.101.14.145 port 44008 [preauth] Apr 12 20:14:16.285540 systemd[1]: sshd@42-145.40.90.201:22-46.101.14.145:44008.service: Deactivated successfully. Apr 12 20:14:16.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-46.101.14.145:44008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:16.379189 kernel: audit: type=1131 audit(1712952856.285:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-145.40.90.201:22-46.101.14.145:44008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:16.856853 systemd[1]: Started sshd@44-145.40.90.201:22-104.250.50.61:43896.service. Apr 12 20:14:16.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-104.250.50.61:43896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:16.950156 kernel: audit: type=1130 audit(1712952856.855:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-104.250.50.61:43896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:21.127725 sshd[2208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 user=root Apr 12 20:14:21.127000 audit[2208]: USER_AUTH pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:14:21.220045 kernel: audit: type=1100 audit(1712952861.127:273): pid=2208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:14:22.380576 update_engine[1452]: I0412 20:14:22.380451 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:14:22.381468 update_engine[1452]: I0412 20:14:22.380929 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:14:22.381468 update_engine[1452]: E0412 20:14:22.381178 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:14:22.381468 update_engine[1452]: I0412 20:14:22.381335 1452 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:14:22.381468 update_engine[1452]: I0412 20:14:22.381352 1452 omaha_request_action.cc:621] Omaha request response: Apr 12 20:14:22.381856 update_engine[1452]: E0412 20:14:22.381498 1452 omaha_request_action.cc:640] Omaha request network transfer failed. Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381526 1452 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381536 1452 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381546 1452 update_attempter.cc:306] Processing Done. Apr 12 20:14:22.381856 update_engine[1452]: E0412 20:14:22.381572 1452 update_attempter.cc:619] Update failed. Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381582 1452 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381592 1452 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381603 1452 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381753 1452 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381807 1452 omaha_request_action.cc:270] Posting an Omaha request to disabled Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381819 1452 omaha_request_action.cc:271] Request: Apr 12 20:14:22.381856 update_engine[1452]: Apr 12 20:14:22.381856 update_engine[1452]: Apr 12 20:14:22.381856 update_engine[1452]: Apr 12 20:14:22.381856 update_engine[1452]: Apr 12 20:14:22.381856 update_engine[1452]: Apr 12 20:14:22.381856 update_engine[1452]: Apr 12 20:14:22.381856 update_engine[1452]: I0412 20:14:22.381830 1452 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382174 1452 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Apr 12 20:14:22.383495 update_engine[1452]: E0412 20:14:22.382337 1452 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382472 1452 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382486 1452 omaha_request_action.cc:621] Omaha request response: Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382498 1452 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382506 1452 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382513 1452 update_attempter.cc:306] Processing Done. Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382521 1452 update_attempter.cc:310] Error event sent. Apr 12 20:14:22.383495 update_engine[1452]: I0412 20:14:22.382547 1452 update_check_scheduler.cc:74] Next update check in 46m50s Apr 12 20:14:22.384303 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Apr 12 20:14:22.384303 locksmithd[1490]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Apr 12 20:14:23.006311 sshd[2208]: Failed password for root from 104.250.50.61 port 43896 ssh2 Apr 12 20:14:28.608121 systemd[1]: Started sshd@45-145.40.90.201:22-134.17.16.40:15123.service. Apr 12 20:14:28.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-134.17.16.40:15123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:28.702114 kernel: audit: type=1130 audit(1712952868.607:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-134.17.16.40:15123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:29.662116 sshd[2211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:14:29.661000 audit[2211]: USER_AUTH pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:14:29.755163 kernel: audit: type=1100 audit(1712952869.661:275): pid=2211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:14:30.846202 systemd[1]: Started sshd@46-145.40.90.201:22-43.128.89.189:35494.service. Apr 12 20:14:30.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.128.89.189:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:30.940177 kernel: audit: type=1130 audit(1712952870.845:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.128.89.189:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:31.640852 sshd[2211]: Failed password for root from 134.17.16.40 port 15123 ssh2 Apr 12 20:14:31.870811 sshd[2214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 user=root Apr 12 20:14:31.870000 audit[2214]: USER_AUTH pid=2214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:14:31.963054 kernel: audit: type=1100 audit(1712952871.870:277): pid=2214 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:14:32.061605 systemd[1]: Started sshd@47-145.40.90.201:22-150.109.19.36:38568.service. Apr 12 20:14:32.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-150.109.19.36:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:32.155173 kernel: audit: type=1130 audit(1712952872.060:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-150.109.19.36:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:32.421855 sshd[2211]: Received disconnect from 134.17.16.40 port 15123:11: Bye Bye [preauth] Apr 12 20:14:32.421855 sshd[2211]: Disconnected from authenticating user root 134.17.16.40 port 15123 [preauth] Apr 12 20:14:32.424348 systemd[1]: sshd@45-145.40.90.201:22-134.17.16.40:15123.service: Deactivated successfully. Apr 12 20:14:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-134.17.16.40:15123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:32.518151 kernel: audit: type=1131 audit(1712952872.423:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-145.40.90.201:22-134.17.16.40:15123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:33.092062 sshd[2217]: Invalid user wanghq from 150.109.19.36 port 38568 Apr 12 20:14:33.098115 sshd[2217]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:33.099090 sshd[2217]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:14:33.099130 sshd[2217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 Apr 12 20:14:33.099400 sshd[2217]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:33.098000 audit[2217]: USER_AUTH pid=2217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wanghq" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:14:33.193173 kernel: audit: type=1100 audit(1712952873.098:280): pid=2217 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="wanghq" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:14:34.456855 sshd[2214]: Failed password for root from 43.128.89.189 port 35494 ssh2 Apr 12 20:14:34.626330 sshd[2217]: Failed password for invalid user wanghq from 150.109.19.36 port 38568 ssh2 Apr 12 20:14:36.136959 sshd[2217]: Received disconnect from 150.109.19.36 port 38568:11: Bye Bye [preauth] Apr 12 20:14:36.136959 sshd[2217]: Disconnected from invalid user wanghq 150.109.19.36 port 38568 [preauth] Apr 12 20:14:36.139456 systemd[1]: sshd@47-145.40.90.201:22-150.109.19.36:38568.service: Deactivated successfully. Apr 12 20:14:36.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-150.109.19.36:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:36.233053 kernel: audit: type=1131 audit(1712952876.138:281): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-145.40.90.201:22-150.109.19.36:38568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:36.528476 sshd[2208]: Received disconnect from 104.250.50.61 port 43896:11: Bye Bye [preauth] Apr 12 20:14:36.528476 sshd[2208]: Disconnected from authenticating user root 104.250.50.61 port 43896 [preauth] Apr 12 20:14:36.531058 systemd[1]: sshd@44-145.40.90.201:22-104.250.50.61:43896.service: Deactivated successfully. Apr 12 20:14:36.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-104.250.50.61:43896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:36.629065 kernel: audit: type=1131 audit(1712952876.530:282): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-145.40.90.201:22-104.250.50.61:43896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:37.210087 sshd[2214]: Received disconnect from 43.128.89.189 port 35494:11: Bye Bye [preauth] Apr 12 20:14:37.210087 sshd[2214]: Disconnected from authenticating user root 43.128.89.189 port 35494 [preauth] Apr 12 20:14:37.212632 systemd[1]: sshd@46-145.40.90.201:22-43.128.89.189:35494.service: Deactivated successfully. Apr 12 20:14:37.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.128.89.189:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:37.306065 kernel: audit: type=1131 audit(1712952877.212:283): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-145.40.90.201:22-43.128.89.189:35494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:56.839448 systemd[1]: Started sshd@48-145.40.90.201:22-43.156.243.235:49168.service. Apr 12 20:14:56.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-43.156.243.235:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:56.933154 kernel: audit: type=1130 audit(1712952896.839:284): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-43.156.243.235:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:14:57.811887 sshd[2225]: Invalid user johannes from 43.156.243.235 port 49168 Apr 12 20:14:57.818090 sshd[2225]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:57.819266 sshd[2225]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:14:57.819356 sshd[2225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:14:57.820383 sshd[2225]: pam_faillock(sshd:auth): User unknown Apr 12 20:14:57.819000 audit[2225]: USER_AUTH pid=2225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:14:57.914024 kernel: audit: type=1100 audit(1712952897.819:285): pid=2225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:14:59.974788 sshd[2225]: Failed password for invalid user johannes from 43.156.243.235 port 49168 ssh2 Apr 12 20:15:02.031443 sshd[2225]: Received disconnect from 43.156.243.235 port 49168:11: Bye Bye [preauth] Apr 12 20:15:02.031443 sshd[2225]: Disconnected from invalid user johannes 43.156.243.235 port 49168 [preauth] Apr 12 20:15:02.034012 systemd[1]: sshd@48-145.40.90.201:22-43.156.243.235:49168.service: Deactivated successfully. Apr 12 20:15:02.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-43.156.243.235:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:02.128176 kernel: audit: type=1131 audit(1712952902.033:286): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-145.40.90.201:22-43.156.243.235:49168 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:10.163917 systemd[1]: Started sshd@49-145.40.90.201:22-218.92.0.59:7334.service. Apr 12 20:15:10.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-218.92.0.59:7334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:10.257180 kernel: audit: type=1130 audit(1712952910.163:287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-218.92.0.59:7334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:10.315328 sshd[2229]: Unable to negotiate with 218.92.0.59 port 7334: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Apr 12 20:15:10.315855 systemd[1]: sshd@49-145.40.90.201:22-218.92.0.59:7334.service: Deactivated successfully. Apr 12 20:15:10.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-218.92.0.59:7334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:10.408174 kernel: audit: type=1131 audit(1712952910.315:288): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-145.40.90.201:22-218.92.0.59:7334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:12.311308 systemd[1]: Started sshd@50-145.40.90.201:22-46.101.14.145:37144.service. Apr 12 20:15:12.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-46.101.14.145:37144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:12.405177 kernel: audit: type=1130 audit(1712952912.310:289): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-46.101.14.145:37144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:13.146644 sshd[2233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 user=root Apr 12 20:15:13.145000 audit[2233]: USER_AUTH pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:15:13.239014 kernel: audit: type=1100 audit(1712952913.145:290): pid=2233 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:15:15.165436 sshd[2233]: Failed password for root from 46.101.14.145 port 37144 ssh2 Apr 12 20:15:15.860120 sshd[2233]: Received disconnect from 46.101.14.145 port 37144:11: Bye Bye [preauth] Apr 12 20:15:15.860120 sshd[2233]: Disconnected from authenticating user root 46.101.14.145 port 37144 [preauth] Apr 12 20:15:15.862685 systemd[1]: sshd@50-145.40.90.201:22-46.101.14.145:37144.service: Deactivated successfully. Apr 12 20:15:15.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-46.101.14.145:37144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:15.956058 kernel: audit: type=1131 audit(1712952915.862:291): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-145.40.90.201:22-46.101.14.145:37144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:16.193682 systemd[1]: Started sshd@51-145.40.90.201:22-43.163.220.126:54040.service. Apr 12 20:15:16.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-43.163.220.126:54040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:16.287042 kernel: audit: type=1130 audit(1712952916.192:292): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-43.163.220.126:54040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:17.081183 sshd[2237]: Invalid user jag from 43.163.220.126 port 54040 Apr 12 20:15:17.087217 sshd[2237]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:17.088332 sshd[2237]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:15:17.088424 sshd[2237]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:15:17.089337 sshd[2237]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:17.088000 audit[2237]: USER_AUTH pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jag" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:15:17.183052 kernel: audit: type=1100 audit(1712952917.088:293): pid=2237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="jag" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:15:19.323942 sshd[2237]: Failed password for invalid user jag from 43.163.220.126 port 54040 ssh2 Apr 12 20:15:21.657547 sshd[2237]: Received disconnect from 43.163.220.126 port 54040:11: Bye Bye [preauth] Apr 12 20:15:21.657547 sshd[2237]: Disconnected from invalid user jag 43.163.220.126 port 54040 [preauth] Apr 12 20:15:21.660101 systemd[1]: sshd@51-145.40.90.201:22-43.163.220.126:54040.service: Deactivated successfully. Apr 12 20:15:21.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-43.163.220.126:54040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:21.754176 kernel: audit: type=1131 audit(1712952921.659:294): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-145.40.90.201:22-43.163.220.126:54040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:23.826504 systemd[1]: Started sshd@52-145.40.90.201:22-129.226.146.101:55452.service. Apr 12 20:15:23.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-129.226.146.101:55452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:23.920183 kernel: audit: type=1130 audit(1712952923.825:295): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-129.226.146.101:55452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:24.849099 sshd[2241]: Invalid user l from 129.226.146.101 port 55452 Apr 12 20:15:24.855516 sshd[2241]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:24.856488 sshd[2241]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:15:24.856580 sshd[2241]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:15:24.857630 sshd[2241]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:24.856000 audit[2241]: USER_AUTH pid=2241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:15:24.951162 kernel: audit: type=1100 audit(1712952924.856:296): pid=2241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:15:26.498803 systemd[1]: Started sshd@53-145.40.90.201:22-43.156.185.119:42162.service. Apr 12 20:15:26.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-43.156.185.119:42162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:26.592177 kernel: audit: type=1130 audit(1712952926.497:297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-43.156.185.119:42162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:26.720750 sshd[2241]: Failed password for invalid user l from 129.226.146.101 port 55452 ssh2 Apr 12 20:15:27.380108 sshd[2241]: Received disconnect from 129.226.146.101 port 55452:11: Bye Bye [preauth] Apr 12 20:15:27.380108 sshd[2241]: Disconnected from invalid user l 129.226.146.101 port 55452 [preauth] Apr 12 20:15:27.382604 systemd[1]: sshd@52-145.40.90.201:22-129.226.146.101:55452.service: Deactivated successfully. Apr 12 20:15:27.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-129.226.146.101:55452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:27.476043 kernel: audit: type=1131 audit(1712952927.382:298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-145.40.90.201:22-129.226.146.101:55452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:27.539520 sshd[2244]: Invalid user testuser from 43.156.185.119 port 42162 Apr 12 20:15:27.541096 sshd[2244]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:27.541371 sshd[2244]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:15:27.541395 sshd[2244]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:15:27.541669 sshd[2244]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:27.540000 audit[2244]: USER_AUTH pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:15:27.634048 kernel: audit: type=1100 audit(1712952927.540:299): pid=2244 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:15:29.816159 sshd[2244]: Failed password for invalid user testuser from 43.156.185.119 port 42162 ssh2 Apr 12 20:15:30.338740 systemd[1]: Started sshd@54-145.40.90.201:22-124.156.205.16:60642.service. Apr 12 20:15:30.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-124.156.205.16:60642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:30.432178 kernel: audit: type=1130 audit(1712952930.337:300): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-124.156.205.16:60642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:31.339257 sshd[2248]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 user=root Apr 12 20:15:31.338000 audit[2248]: USER_AUTH pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:15:31.432048 kernel: audit: type=1100 audit(1712952931.338:301): pid=2248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:15:31.591968 systemd[1]: Started sshd@55-145.40.90.201:22-43.128.225.10:44522.service. Apr 12 20:15:31.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-43.128.225.10:44522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:31.685047 kernel: audit: type=1130 audit(1712952931.591:302): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-43.128.225.10:44522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:32.016480 sshd[2244]: Received disconnect from 43.156.185.119 port 42162:11: Bye Bye [preauth] Apr 12 20:15:32.016480 sshd[2244]: Disconnected from invalid user testuser 43.156.185.119 port 42162 [preauth] Apr 12 20:15:32.017157 systemd[1]: sshd@53-145.40.90.201:22-43.156.185.119:42162.service: Deactivated successfully. Apr 12 20:15:32.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-43.156.185.119:42162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:32.110178 kernel: audit: type=1131 audit(1712952932.016:303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-145.40.90.201:22-43.156.185.119:42162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:32.510289 sshd[2251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 user=root Apr 12 20:15:32.509000 audit[2251]: USER_AUTH pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:15:32.604174 kernel: audit: type=1100 audit(1712952932.509:304): pid=2251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:15:33.493697 sshd[2248]: Failed password for root from 124.156.205.16 port 60642 ssh2 Apr 12 20:15:34.023911 systemd[1]: Started sshd@56-145.40.90.201:22-134.17.16.40:15125.service. Apr 12 20:15:34.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-134.17.16.40:15125 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:34.087748 sshd[2248]: Received disconnect from 124.156.205.16 port 60642:11: Bye Bye [preauth] Apr 12 20:15:34.087748 sshd[2248]: Disconnected from authenticating user root 124.156.205.16 port 60642 [preauth] Apr 12 20:15:34.088310 systemd[1]: sshd@54-145.40.90.201:22-124.156.205.16:60642.service: Deactivated successfully. Apr 12 20:15:34.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-124.156.205.16:60642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:34.209295 kernel: audit: type=1130 audit(1712952934.023:305): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-134.17.16.40:15125 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:34.209328 kernel: audit: type=1131 audit(1712952934.087:306): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@54-145.40.90.201:22-124.156.205.16:60642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:34.993424 sshd[2255]: Invalid user origin from 134.17.16.40 port 15125 Apr 12 20:15:34.999754 sshd[2255]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:35.000798 sshd[2255]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:15:35.000891 sshd[2255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Apr 12 20:15:35.001832 sshd[2255]: pam_faillock(sshd:auth): User unknown Apr 12 20:15:35.001000 audit[2255]: USER_AUTH pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:15:35.096179 kernel: audit: type=1100 audit(1712952935.001:307): pid=2255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:15:35.136392 sshd[2251]: Failed password for root from 43.128.225.10 port 44522 ssh2 Apr 12 20:15:36.900421 sshd[2255]: Failed password for invalid user origin from 134.17.16.40 port 15125 ssh2 Apr 12 20:15:37.274855 sshd[2255]: Received disconnect from 134.17.16.40 port 15125:11: Bye Bye [preauth] Apr 12 20:15:37.274855 sshd[2255]: Disconnected from invalid user origin 134.17.16.40 port 15125 [preauth] Apr 12 20:15:37.277391 systemd[1]: sshd@56-145.40.90.201:22-134.17.16.40:15125.service: Deactivated successfully. Apr 12 20:15:37.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-134.17.16.40:15125 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:37.371179 kernel: audit: type=1131 audit(1712952937.276:308): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@56-145.40.90.201:22-134.17.16.40:15125 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:37.827725 sshd[2251]: Received disconnect from 43.128.225.10 port 44522:11: Bye Bye [preauth] Apr 12 20:15:37.827725 sshd[2251]: Disconnected from authenticating user root 43.128.225.10 port 44522 [preauth] Apr 12 20:15:37.830283 systemd[1]: sshd@55-145.40.90.201:22-43.128.225.10:44522.service: Deactivated successfully. Apr 12 20:15:37.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-43.128.225.10:44522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:37.924174 kernel: audit: type=1131 audit(1712952937.829:309): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@55-145.40.90.201:22-43.128.225.10:44522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:44.705204 systemd[1]: Started sshd@57-145.40.90.201:22-43.128.89.189:56972.service. Apr 12 20:15:44.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-43.128.89.189:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:44.799198 kernel: audit: type=1130 audit(1712952944.704:310): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-43.128.89.189:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:45.722249 sshd[2262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 user=root Apr 12 20:15:45.721000 audit[2262]: USER_AUTH pid=2262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:15:45.815013 kernel: audit: type=1100 audit(1712952945.721:311): pid=2262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:15:47.465463 sshd[2262]: Failed password for root from 43.128.89.189 port 56972 ssh2 Apr 12 20:15:48.476368 sshd[2262]: Received disconnect from 43.128.89.189 port 56972:11: Bye Bye [preauth] Apr 12 20:15:48.476368 sshd[2262]: Disconnected from authenticating user root 43.128.89.189 port 56972 [preauth] Apr 12 20:15:48.478884 systemd[1]: sshd@57-145.40.90.201:22-43.128.89.189:56972.service: Deactivated successfully. Apr 12 20:15:48.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-43.128.89.189:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:15:48.572178 kernel: audit: type=1131 audit(1712952948.478:312): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@57-145.40.90.201:22-43.128.89.189:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:01.335800 systemd[1]: Started sshd@58-145.40.90.201:22-150.109.19.36:34714.service. Apr 12 20:16:01.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-150.109.19.36:34714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:01.429180 kernel: audit: type=1130 audit(1712952961.334:313): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-150.109.19.36:34714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:02.324719 sshd[2266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:16:02.324000 audit[2266]: USER_AUTH pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:16:02.418167 kernel: audit: type=1100 audit(1712952962.324:314): pid=2266 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:16:05.071199 sshd[2266]: Failed password for root from 150.109.19.36 port 34714 ssh2 Apr 12 20:16:07.655503 sshd[2266]: Received disconnect from 150.109.19.36 port 34714:11: Bye Bye [preauth] Apr 12 20:16:07.655503 sshd[2266]: Disconnected from authenticating user root 150.109.19.36 port 34714 [preauth] Apr 12 20:16:07.658027 systemd[1]: sshd@58-145.40.90.201:22-150.109.19.36:34714.service: Deactivated successfully. Apr 12 20:16:07.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-150.109.19.36:34714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:07.752177 kernel: audit: type=1131 audit(1712952967.657:315): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@58-145.40.90.201:22-150.109.19.36:34714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:12.858799 systemd[1]: Started sshd@59-145.40.90.201:22-46.101.14.145:58512.service. Apr 12 20:16:12.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-46.101.14.145:58512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:12.952054 kernel: audit: type=1130 audit(1712952972.857:316): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-46.101.14.145:58512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:13.681400 sshd[2270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 user=root Apr 12 20:16:13.680000 audit[2270]: USER_AUTH pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:16:13.775159 kernel: audit: type=1100 audit(1712952973.680:317): pid=2270 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:16:15.936272 sshd[2270]: Failed password for root from 46.101.14.145 port 58512 ssh2 Apr 12 20:16:16.397757 sshd[2270]: Received disconnect from 46.101.14.145 port 58512:11: Bye Bye [preauth] Apr 12 20:16:16.397757 sshd[2270]: Disconnected from authenticating user root 46.101.14.145 port 58512 [preauth] Apr 12 20:16:16.400365 systemd[1]: sshd@59-145.40.90.201:22-46.101.14.145:58512.service: Deactivated successfully. Apr 12 20:16:16.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-46.101.14.145:58512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:16.494178 kernel: audit: type=1131 audit(1712952976.399:318): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@59-145.40.90.201:22-46.101.14.145:58512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:26.300822 systemd[1]: Started sshd@60-145.40.90.201:22-43.163.220.126:47286.service. Apr 12 20:16:26.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-43.163.220.126:47286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:26.394045 kernel: audit: type=1130 audit(1712952986.299:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-43.163.220.126:47286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:27.224569 sshd[2274]: Invalid user nkh from 43.163.220.126 port 47286 Apr 12 20:16:27.230561 sshd[2274]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:27.231576 sshd[2274]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:16:27.231667 sshd[2274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:16:27.232699 sshd[2274]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:27.231000 audit[2274]: USER_AUTH pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nkh" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:16:27.326181 kernel: audit: type=1100 audit(1712952987.231:320): pid=2274 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nkh" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:16:29.076026 sshd[2274]: Failed password for invalid user nkh from 43.163.220.126 port 47286 ssh2 Apr 12 20:16:30.330835 sshd[2274]: Received disconnect from 43.163.220.126 port 47286:11: Bye Bye [preauth] Apr 12 20:16:30.330835 sshd[2274]: Disconnected from invalid user nkh 43.163.220.126 port 47286 [preauth] Apr 12 20:16:30.333412 systemd[1]: sshd@60-145.40.90.201:22-43.163.220.126:47286.service: Deactivated successfully. Apr 12 20:16:30.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-43.163.220.126:47286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:30.427058 kernel: audit: type=1131 audit(1712952990.332:321): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@60-145.40.90.201:22-43.163.220.126:47286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:32.729763 systemd[1]: Started sshd@61-145.40.90.201:22-43.156.243.235:45498.service. Apr 12 20:16:32.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:45498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:32.823176 kernel: audit: type=1130 audit(1712952992.728:322): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:45498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:33.738026 sshd[2278]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:16:33.737000 audit[2278]: USER_AUTH pid=2278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:16:33.831170 kernel: audit: type=1100 audit(1712952993.737:323): pid=2278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:16:34.748798 systemd[1]: Started sshd@62-145.40.90.201:22-49.65.101.245:44396.service. Apr 12 20:16:34.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-49.65.101.245:44396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:34.842179 kernel: audit: type=1130 audit(1712952994.747:324): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-49.65.101.245:44396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:35.405713 sshd[2278]: Failed password for root from 43.156.243.235 port 45498 ssh2 Apr 12 20:16:35.584240 sshd[2281]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:16:35.583000 audit[2281]: USER_AUTH pid=2281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:16:35.676163 kernel: audit: type=1100 audit(1712952995.583:325): pid=2281 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:16:36.489000 sshd[2278]: Received disconnect from 43.156.243.235 port 45498:11: Bye Bye [preauth] Apr 12 20:16:36.489000 sshd[2278]: Disconnected from authenticating user root 43.156.243.235 port 45498 [preauth] Apr 12 20:16:36.491538 systemd[1]: sshd@61-145.40.90.201:22-43.156.243.235:45498.service: Deactivated successfully. Apr 12 20:16:36.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:45498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:36.585047 kernel: audit: type=1131 audit(1712952996.491:326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@61-145.40.90.201:22-43.156.243.235:45498 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:37.859020 sshd[2281]: Failed password for root from 49.65.101.245 port 44396 ssh2 Apr 12 20:16:38.300225 sshd[2281]: Received disconnect from 49.65.101.245 port 44396:11: Bye Bye [preauth] Apr 12 20:16:38.300225 sshd[2281]: Disconnected from authenticating user root 49.65.101.245 port 44396 [preauth] Apr 12 20:16:38.302770 systemd[1]: sshd@62-145.40.90.201:22-49.65.101.245:44396.service: Deactivated successfully. Apr 12 20:16:38.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-49.65.101.245:44396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:38.396194 kernel: audit: type=1131 audit(1712952998.302:327): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@62-145.40.90.201:22-49.65.101.245:44396 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:40.245809 systemd[1]: Started sshd@63-145.40.90.201:22-134.17.16.40:15126.service. Apr 12 20:16:40.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-134.17.16.40:15126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:40.339180 kernel: audit: type=1130 audit(1712953000.244:328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-134.17.16.40:15126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:40.684595 systemd[1]: Started sshd@64-145.40.90.201:22-43.156.185.119:35536.service. Apr 12 20:16:40.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-43.156.185.119:35536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:40.778175 kernel: audit: type=1130 audit(1712953000.683:329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-43.156.185.119:35536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:41.223467 sshd[2286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:16:41.222000 audit[2286]: USER_AUTH pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:16:41.316043 kernel: audit: type=1100 audit(1712953001.222:330): pid=2286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:16:41.698902 sshd[2289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 user=root Apr 12 20:16:41.698000 audit[2289]: USER_AUTH pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:16:41.799163 kernel: audit: type=1100 audit(1712953001.698:331): pid=2289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:16:42.655203 sshd[2286]: Failed password for root from 134.17.16.40 port 15126 ssh2 Apr 12 20:16:43.130947 sshd[2289]: Failed password for root from 43.156.185.119 port 35536 ssh2 Apr 12 20:16:43.970882 sshd[2286]: Received disconnect from 134.17.16.40 port 15126:11: Bye Bye [preauth] Apr 12 20:16:43.970882 sshd[2286]: Disconnected from authenticating user root 134.17.16.40 port 15126 [preauth] Apr 12 20:16:43.973374 systemd[1]: sshd@63-145.40.90.201:22-134.17.16.40:15126.service: Deactivated successfully. Apr 12 20:16:43.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-134.17.16.40:15126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:44.067175 kernel: audit: type=1131 audit(1712953003.972:332): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@63-145.40.90.201:22-134.17.16.40:15126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:44.454716 sshd[2289]: Received disconnect from 43.156.185.119 port 35536:11: Bye Bye [preauth] Apr 12 20:16:44.454716 sshd[2289]: Disconnected from authenticating user root 43.156.185.119 port 35536 [preauth] Apr 12 20:16:44.457294 systemd[1]: sshd@64-145.40.90.201:22-43.156.185.119:35536.service: Deactivated successfully. Apr 12 20:16:44.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-43.156.185.119:35536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:44.551154 kernel: audit: type=1131 audit(1712953004.456:333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@64-145.40.90.201:22-43.156.185.119:35536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:54.145783 systemd[1]: Started sshd@65-145.40.90.201:22-129.226.146.101:51636.service. Apr 12 20:16:54.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-129.226.146.101:51636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:54.239004 kernel: audit: type=1130 audit(1712953014.144:334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-129.226.146.101:51636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:54.766573 systemd[1]: Started sshd@66-145.40.90.201:22-124.156.205.16:36568.service. Apr 12 20:16:54.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-124.156.205.16:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:54.860161 kernel: audit: type=1130 audit(1712953014.765:335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-124.156.205.16:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:55.140868 sshd[2295]: Invalid user guest from 129.226.146.101 port 51636 Apr 12 20:16:55.147063 sshd[2295]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:55.148044 sshd[2295]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:16:55.148130 sshd[2295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:16:55.148964 sshd[2295]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:55.148000 audit[2295]: USER_AUTH pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:16:55.247184 kernel: audit: type=1100 audit(1712953015.148:336): pid=2295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:16:55.770882 sshd[2298]: Invalid user parking from 124.156.205.16 port 36568 Apr 12 20:16:55.777104 sshd[2298]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:55.778103 sshd[2298]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:16:55.778189 sshd[2298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:16:55.779070 sshd[2298]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:55.778000 audit[2298]: USER_AUTH pid=2298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:16:55.873180 kernel: audit: type=1100 audit(1712953015.778:337): pid=2298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:16:55.955257 systemd[1]: Started sshd@67-145.40.90.201:22-43.128.89.189:50222.service. Apr 12 20:16:55.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-43.128.89.189:50222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:56.049175 kernel: audit: type=1130 audit(1712953015.954:338): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-43.128.89.189:50222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:56.836632 sshd[2295]: Failed password for invalid user guest from 129.226.146.101 port 51636 ssh2 Apr 12 20:16:56.976031 sshd[2301]: Invalid user amal from 43.128.89.189 port 50222 Apr 12 20:16:56.982356 sshd[2301]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:56.983398 sshd[2301]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:16:56.983491 sshd[2301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:16:56.984405 sshd[2301]: pam_faillock(sshd:auth): User unknown Apr 12 20:16:56.983000 audit[2301]: USER_AUTH pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amal" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:16:57.077173 kernel: audit: type=1100 audit(1712953016.983:339): pid=2301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="amal" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:16:57.191777 systemd[1]: Started sshd@68-145.40.90.201:22-43.128.225.10:39560.service. Apr 12 20:16:57.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-43.128.225.10:39560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:57.285176 kernel: audit: type=1130 audit(1712953017.190:340): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-43.128.225.10:39560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:57.466779 sshd[2298]: Failed password for invalid user parking from 124.156.205.16 port 36568 ssh2 Apr 12 20:16:57.830447 sshd[2304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 user=root Apr 12 20:16:57.829000 audit[2304]: USER_AUTH pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:16:57.896182 sshd[2295]: Received disconnect from 129.226.146.101 port 51636:11: Bye Bye [preauth] Apr 12 20:16:57.896182 sshd[2295]: Disconnected from invalid user guest 129.226.146.101 port 51636 [preauth] Apr 12 20:16:57.896805 systemd[1]: sshd@65-145.40.90.201:22-129.226.146.101:51636.service: Deactivated successfully. Apr 12 20:16:57.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-129.226.146.101:51636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:58.015909 kernel: audit: type=1100 audit(1712953017.829:341): pid=2304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:16:58.015941 kernel: audit: type=1131 audit(1712953017.895:342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@65-145.40.90.201:22-129.226.146.101:51636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:58.764964 sshd[2298]: Received disconnect from 124.156.205.16 port 36568:11: Bye Bye [preauth] Apr 12 20:16:58.764964 sshd[2298]: Disconnected from invalid user parking 124.156.205.16 port 36568 [preauth] Apr 12 20:16:58.767447 systemd[1]: sshd@66-145.40.90.201:22-124.156.205.16:36568.service: Deactivated successfully. Apr 12 20:16:58.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-124.156.205.16:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:58.861058 kernel: audit: type=1131 audit(1712953018.766:343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@66-145.40.90.201:22-124.156.205.16:36568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:16:59.143281 sshd[2301]: Failed password for invalid user amal from 43.128.89.189 port 50222 ssh2 Apr 12 20:16:59.458297 sshd[2304]: Failed password for root from 43.128.225.10 port 39560 ssh2 Apr 12 20:17:00.514317 sshd[2304]: Received disconnect from 43.128.225.10 port 39560:11: Bye Bye [preauth] Apr 12 20:17:00.514317 sshd[2304]: Disconnected from authenticating user root 43.128.225.10 port 39560 [preauth] Apr 12 20:17:00.516762 systemd[1]: sshd@68-145.40.90.201:22-43.128.225.10:39560.service: Deactivated successfully. Apr 12 20:17:00.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-43.128.225.10:39560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:00.611148 kernel: audit: type=1131 audit(1712953020.516:344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@68-145.40.90.201:22-43.128.225.10:39560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:00.954595 sshd[2301]: Received disconnect from 43.128.89.189 port 50222:11: Bye Bye [preauth] Apr 12 20:17:00.954595 sshd[2301]: Disconnected from invalid user amal 43.128.89.189 port 50222 [preauth] Apr 12 20:17:00.957147 systemd[1]: sshd@67-145.40.90.201:22-43.128.89.189:50222.service: Deactivated successfully. Apr 12 20:17:00.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-43.128.89.189:50222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:01.057170 kernel: audit: type=1131 audit(1712953020.956:345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@67-145.40.90.201:22-43.128.89.189:50222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:12.110893 systemd[1]: Started sshd@69-145.40.90.201:22-46.101.14.145:51648.service. Apr 12 20:17:12.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-46.101.14.145:51648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:12.204053 kernel: audit: type=1130 audit(1712953032.109:346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-46.101.14.145:51648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:12.929156 sshd[2312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 user=root Apr 12 20:17:12.928000 audit[2312]: USER_AUTH pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:17:13.022285 kernel: audit: type=1100 audit(1712953032.928:347): pid=2312 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:17:14.948494 sshd[2312]: Failed password for root from 46.101.14.145 port 51648 ssh2 Apr 12 20:17:15.643435 sshd[2312]: Received disconnect from 46.101.14.145 port 51648:11: Bye Bye [preauth] Apr 12 20:17:15.643435 sshd[2312]: Disconnected from authenticating user root 46.101.14.145 port 51648 [preauth] Apr 12 20:17:15.646086 systemd[1]: sshd@69-145.40.90.201:22-46.101.14.145:51648.service: Deactivated successfully. Apr 12 20:17:15.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-46.101.14.145:51648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:15.740178 kernel: audit: type=1131 audit(1712953035.645:348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@69-145.40.90.201:22-46.101.14.145:51648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:32.521785 systemd[1]: Started sshd@70-145.40.90.201:22-150.109.19.36:59114.service. Apr 12 20:17:32.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-150.109.19.36:59114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:32.615984 kernel: audit: type=1130 audit(1712953052.520:349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-150.109.19.36:59114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:33.544363 sshd[2320]: Invalid user steam from 150.109.19.36 port 59114 Apr 12 20:17:33.550704 sshd[2320]: pam_faillock(sshd:auth): User unknown Apr 12 20:17:33.551707 sshd[2320]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:17:33.551797 sshd[2320]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 Apr 12 20:17:33.552725 sshd[2320]: pam_faillock(sshd:auth): User unknown Apr 12 20:17:33.551000 audit[2320]: USER_AUTH pid=2320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="steam" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:17:33.645179 kernel: audit: type=1100 audit(1712953053.551:350): pid=2320 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="steam" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:17:34.666995 systemd[1]: Started sshd@71-145.40.90.201:22-43.163.220.126:40526.service. Apr 12 20:17:34.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-43.163.220.126:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:34.761051 kernel: audit: type=1130 audit(1712953054.666:351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-43.163.220.126:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:34.788230 sshd[2320]: Failed password for invalid user steam from 150.109.19.36 port 59114 ssh2 Apr 12 20:17:35.574714 sshd[2323]: Invalid user txw from 43.163.220.126 port 40526 Apr 12 20:17:35.580860 sshd[2323]: pam_faillock(sshd:auth): User unknown Apr 12 20:17:35.581893 sshd[2323]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:17:35.582008 sshd[2323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:17:35.583052 sshd[2323]: pam_faillock(sshd:auth): User unknown Apr 12 20:17:35.582000 audit[2323]: USER_AUTH pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="txw" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:17:35.600144 sshd[2320]: Received disconnect from 150.109.19.36 port 59114:11: Bye Bye [preauth] Apr 12 20:17:35.600144 sshd[2320]: Disconnected from invalid user steam 150.109.19.36 port 59114 [preauth] Apr 12 20:17:35.600712 systemd[1]: sshd@70-145.40.90.201:22-150.109.19.36:59114.service: Deactivated successfully. Apr 12 20:17:35.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-150.109.19.36:59114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:35.766530 kernel: audit: type=1100 audit(1712953055.582:352): pid=2323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="txw" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:17:35.766562 kernel: audit: type=1131 audit(1712953055.599:353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@70-145.40.90.201:22-150.109.19.36:59114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:35.784641 etcd-wrapper[1726]: {"level":"warn","ts":"2024-04-12T20:17:35.784Z","caller":"etcdserver/util.go:166","msg":"apply request took too long","took":"186.892206ms","expected-duration":"100ms","prefix":"read-only range ","request":"key:\"/registry/serviceaccounts/kube-system/replicaset-controller\" ","response":"range_response_count:0 size:5"} Apr 12 20:17:35.784641 etcd-wrapper[1726]: {"level":"info","ts":"2024-04-12T20:17:35.784Z","caller":"traceutil/trace.go:171","msg":"trace[714604617] range","detail":"{range_begin:/registry/serviceaccounts/kube-system/replicaset-controller; range_end:; response_count:0; response_revision:361; }","duration":"186.938447ms","start":"2024-04-12T20:17:35.597Z","end":"2024-04-12T20:17:35.784Z","steps":["trace[714604617] 'range keys from in-memory index tree' (duration: 186.832101ms)"],"step_count":1} Apr 12 20:17:38.093965 sshd[2323]: Failed password for invalid user txw from 43.163.220.126 port 40526 ssh2 Apr 12 20:17:40.093618 sshd[2323]: Received disconnect from 43.163.220.126 port 40526:11: Bye Bye [preauth] Apr 12 20:17:40.093618 sshd[2323]: Disconnected from invalid user txw 43.163.220.126 port 40526 [preauth] Apr 12 20:17:40.096119 systemd[1]: sshd@71-145.40.90.201:22-43.163.220.126:40526.service: Deactivated successfully. Apr 12 20:17:40.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-43.163.220.126:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:40.189051 kernel: audit: type=1131 audit(1712953060.095:354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@71-145.40.90.201:22-43.163.220.126:40526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:40.635507 systemd[1]: Started sshd@72-145.40.90.201:22-134.17.16.40:15127.service. Apr 12 20:17:40.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-134.17.16.40:15127 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:40.727992 kernel: audit: type=1130 audit(1712953060.634:355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-134.17.16.40:15127 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:41.698960 sshd[2328]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:17:41.698000 audit[2328]: USER_AUTH pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:17:41.792069 kernel: audit: type=1100 audit(1712953061.698:356): pid=2328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:17:43.366671 sshd[2328]: Failed password for root from 134.17.16.40 port 15127 ssh2 Apr 12 20:17:44.460344 sshd[2328]: Received disconnect from 134.17.16.40 port 15127:11: Bye Bye [preauth] Apr 12 20:17:44.460344 sshd[2328]: Disconnected from authenticating user root 134.17.16.40 port 15127 [preauth] Apr 12 20:17:44.462950 systemd[1]: sshd@72-145.40.90.201:22-134.17.16.40:15127.service: Deactivated successfully. Apr 12 20:17:44.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-134.17.16.40:15127 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:44.555150 kernel: audit: type=1131 audit(1712953064.462:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@72-145.40.90.201:22-134.17.16.40:15127 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:49.622988 systemd[1]: Started sshd@73-145.40.90.201:22-221.226.39.202:25526.service. Apr 12 20:17:49.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-221.226.39.202:25526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:49.716180 kernel: audit: type=1130 audit(1712953069.622:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-221.226.39.202:25526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:52.710230 systemd[1]: Started sshd@74-145.40.90.201:22-43.156.185.119:57134.service. Apr 12 20:17:52.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-43.156.185.119:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:52.802987 kernel: audit: type=1130 audit(1712953072.709:359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-43.156.185.119:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:53.722479 sshd[2335]: Invalid user www from 43.156.185.119 port 57134 Apr 12 20:17:53.728700 sshd[2335]: pam_faillock(sshd:auth): User unknown Apr 12 20:17:53.729683 sshd[2335]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:17:53.729775 sshd[2335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:17:53.730680 sshd[2335]: pam_faillock(sshd:auth): User unknown Apr 12 20:17:53.729000 audit[2335]: USER_AUTH pid=2335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:17:53.823168 kernel: audit: type=1100 audit(1712953073.729:360): pid=2335 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:17:55.713420 sshd[2335]: Failed password for invalid user www from 43.156.185.119 port 57134 ssh2 Apr 12 20:17:56.995271 sshd[2335]: Received disconnect from 43.156.185.119 port 57134:11: Bye Bye [preauth] Apr 12 20:17:56.995271 sshd[2335]: Disconnected from invalid user www 43.156.185.119 port 57134 [preauth] Apr 12 20:17:56.997705 systemd[1]: sshd@74-145.40.90.201:22-43.156.185.119:57134.service: Deactivated successfully. Apr 12 20:17:56.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-43.156.185.119:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:17:57.092175 kernel: audit: type=1131 audit(1712953076.997:361): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@74-145.40.90.201:22-43.156.185.119:57134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:06.453775 systemd[1]: Started sshd@75-145.40.90.201:22-43.156.243.235:41830.service. Apr 12 20:18:06.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-43.156.243.235:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:06.547174 kernel: audit: type=1130 audit(1712953086.452:362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-43.156.243.235:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:07.519428 sshd[2340]: Invalid user testuser from 43.156.243.235 port 41830 Apr 12 20:18:07.525461 sshd[2340]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:07.526437 sshd[2340]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:18:07.526529 sshd[2340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:18:07.527480 sshd[2340]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:07.526000 audit[2340]: USER_AUTH pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:18:07.622183 kernel: audit: type=1100 audit(1712953087.526:363): pid=2340 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="testuser" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:18:09.431152 sshd[2340]: Failed password for invalid user testuser from 43.156.243.235 port 41830 ssh2 Apr 12 20:18:09.486815 systemd[1]: Started sshd@76-145.40.90.201:22-46.101.14.145:44780.service. Apr 12 20:18:09.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-46.101.14.145:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:09.581180 kernel: audit: type=1130 audit(1712953089.485:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-46.101.14.145:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:09.847165 sshd[2340]: Received disconnect from 43.156.243.235 port 41830:11: Bye Bye [preauth] Apr 12 20:18:09.847165 sshd[2340]: Disconnected from invalid user testuser 43.156.243.235 port 41830 [preauth] Apr 12 20:18:09.847744 systemd[1]: sshd@75-145.40.90.201:22-43.156.243.235:41830.service: Deactivated successfully. Apr 12 20:18:09.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-43.156.243.235:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:09.940122 kernel: audit: type=1131 audit(1712953089.846:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@75-145.40.90.201:22-43.156.243.235:41830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:10.319920 sshd[2343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 user=root Apr 12 20:18:10.319000 audit[2343]: USER_AUTH pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:18:10.413049 kernel: audit: type=1100 audit(1712953090.319:366): pid=2343 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:18:12.303820 sshd[2343]: Failed password for root from 46.101.14.145 port 44780 ssh2 Apr 12 20:18:13.033576 sshd[2343]: Received disconnect from 46.101.14.145 port 44780:11: Bye Bye [preauth] Apr 12 20:18:13.033576 sshd[2343]: Disconnected from authenticating user root 46.101.14.145 port 44780 [preauth] Apr 12 20:18:13.036019 systemd[1]: sshd@76-145.40.90.201:22-46.101.14.145:44780.service: Deactivated successfully. Apr 12 20:18:13.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-46.101.14.145:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:13.129019 kernel: audit: type=1131 audit(1712953093.035:367): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@76-145.40.90.201:22-46.101.14.145:44780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:17.205089 systemd[1]: Started sshd@77-145.40.90.201:22-124.156.205.16:38986.service. Apr 12 20:18:17.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-124.156.205.16:38986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:17.298030 kernel: audit: type=1130 audit(1712953097.204:368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-124.156.205.16:38986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:18.162731 sshd[2350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 user=root Apr 12 20:18:18.162000 audit[2350]: USER_AUTH pid=2350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:18:18.255166 kernel: audit: type=1100 audit(1712953098.162:369): pid=2350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:18:19.851295 systemd[1]: Started sshd@78-145.40.90.201:22-43.128.225.10:34584.service. Apr 12 20:18:19.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-43.128.225.10:34584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:19.910115 sshd[2350]: Failed password for root from 124.156.205.16 port 38986 ssh2 Apr 12 20:18:19.945154 kernel: audit: type=1130 audit(1712953099.850:370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-43.128.225.10:34584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:20.751867 sshd[2353]: Invalid user fran from 43.128.225.10 port 34584 Apr 12 20:18:20.758038 sshd[2353]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:20.759193 sshd[2353]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:18:20.759289 sshd[2353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:18:20.760323 sshd[2353]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:20.759000 audit[2353]: USER_AUTH pid=2353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fran" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:18:20.854041 kernel: audit: type=1100 audit(1712953100.759:371): pid=2353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fran" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:18:20.903612 sshd[2350]: Received disconnect from 124.156.205.16 port 38986:11: Bye Bye [preauth] Apr 12 20:18:20.903612 sshd[2350]: Disconnected from authenticating user root 124.156.205.16 port 38986 [preauth] Apr 12 20:18:20.906089 systemd[1]: sshd@77-145.40.90.201:22-124.156.205.16:38986.service: Deactivated successfully. Apr 12 20:18:20.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-124.156.205.16:38986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:20.999037 kernel: audit: type=1131 audit(1712953100.905:372): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@77-145.40.90.201:22-124.156.205.16:38986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:22.448146 sshd[2353]: Failed password for invalid user fran from 43.128.225.10 port 34584 ssh2 Apr 12 20:18:22.923720 systemd[1]: Started sshd@79-145.40.90.201:22-43.128.89.189:43490.service. Apr 12 20:18:22.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-43.128.89.189:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:23.017062 kernel: audit: type=1130 audit(1712953102.922:373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-43.128.89.189:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:23.731521 sshd[2353]: Received disconnect from 43.128.225.10 port 34584:11: Bye Bye [preauth] Apr 12 20:18:23.731521 sshd[2353]: Disconnected from invalid user fran 43.128.225.10 port 34584 [preauth] Apr 12 20:18:23.733962 systemd[1]: sshd@78-145.40.90.201:22-43.128.225.10:34584.service: Deactivated successfully. Apr 12 20:18:23.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-43.128.225.10:34584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:23.828055 kernel: audit: type=1131 audit(1712953103.733:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@78-145.40.90.201:22-43.128.225.10:34584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:23.937876 sshd[2357]: Invalid user swapnil from 43.128.89.189 port 43490 Apr 12 20:18:23.939086 sshd[2357]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:23.939331 sshd[2357]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:18:23.939350 sshd[2357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:18:23.939526 sshd[2357]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:23.938000 audit[2357]: USER_AUTH pid=2357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="swapnil" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:18:24.032076 kernel: audit: type=1100 audit(1712953103.938:375): pid=2357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="swapnil" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:18:25.613453 systemd[1]: Started sshd@80-145.40.90.201:22-129.226.146.101:47832.service. Apr 12 20:18:25.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-129.226.146.101:47832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:25.706991 sshd[2357]: Failed password for invalid user swapnil from 43.128.89.189 port 43490 ssh2 Apr 12 20:18:25.707125 kernel: audit: type=1130 audit(1712953105.612:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-129.226.146.101:47832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:26.627874 sshd[2361]: Invalid user fanjiahui from 129.226.146.101 port 47832 Apr 12 20:18:26.634060 sshd[2361]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:26.635053 sshd[2361]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:18:26.635145 sshd[2361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:18:26.636052 sshd[2361]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:26.635000 audit[2361]: USER_AUTH pid=2361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:18:26.731063 kernel: audit: type=1100 audit(1712953106.635:377): pid=2361 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:18:26.808797 sshd[2357]: Received disconnect from 43.128.89.189 port 43490:11: Bye Bye [preauth] Apr 12 20:18:26.808797 sshd[2357]: Disconnected from invalid user swapnil 43.128.89.189 port 43490 [preauth] Apr 12 20:18:26.809620 systemd[1]: sshd@79-145.40.90.201:22-43.128.89.189:43490.service: Deactivated successfully. Apr 12 20:18:26.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-43.128.89.189:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:26.903044 kernel: audit: type=1131 audit(1712953106.808:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@79-145.40.90.201:22-43.128.89.189:43490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:28.815553 sshd[2361]: Failed password for invalid user fanjiahui from 129.226.146.101 port 47832 ssh2 Apr 12 20:18:30.661055 sshd[2361]: Received disconnect from 129.226.146.101 port 47832:11: Bye Bye [preauth] Apr 12 20:18:30.661055 sshd[2361]: Disconnected from invalid user fanjiahui 129.226.146.101 port 47832 [preauth] Apr 12 20:18:30.663540 systemd[1]: sshd@80-145.40.90.201:22-129.226.146.101:47832.service: Deactivated successfully. Apr 12 20:18:30.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-129.226.146.101:47832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:30.757055 kernel: audit: type=1131 audit(1712953110.663:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@80-145.40.90.201:22-129.226.146.101:47832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:39.767878 systemd[1]: Started sshd@81-145.40.90.201:22-43.163.220.126:33766.service. Apr 12 20:18:39.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-43.163.220.126:33766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:39.861036 kernel: audit: type=1130 audit(1712953119.767:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-43.163.220.126:33766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:40.434084 sshd[2367]: Invalid user dmv from 43.163.220.126 port 33766 Apr 12 20:18:40.440499 sshd[2367]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:40.441618 sshd[2367]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:18:40.441709 sshd[2367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:18:40.442739 sshd[2367]: pam_faillock(sshd:auth): User unknown Apr 12 20:18:40.441000 audit[2367]: USER_AUTH pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dmv" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:18:40.450432 systemd[1]: Started sshd@82-145.40.90.201:22-134.17.16.40:15128.service. Apr 12 20:18:40.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-134.17.16.40:15128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:40.625523 kernel: audit: type=1100 audit(1712953120.441:381): pid=2367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dmv" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:18:40.625554 kernel: audit: type=1130 audit(1712953120.449:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-134.17.16.40:15128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:41.430122 sshd[2370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:18:41.429000 audit[2370]: USER_AUTH pid=2370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:18:41.522013 kernel: audit: type=1100 audit(1712953121.429:383): pid=2370 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:18:42.210856 sshd[2367]: Failed password for invalid user dmv from 43.163.220.126 port 33766 ssh2 Apr 12 20:18:42.523514 sshd[2367]: Received disconnect from 43.163.220.126 port 33766:11: Bye Bye [preauth] Apr 12 20:18:42.523514 sshd[2367]: Disconnected from invalid user dmv 43.163.220.126 port 33766 [preauth] Apr 12 20:18:42.525861 systemd[1]: sshd@81-145.40.90.201:22-43.163.220.126:33766.service: Deactivated successfully. Apr 12 20:18:42.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-43.163.220.126:33766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:42.620188 kernel: audit: type=1131 audit(1712953122.525:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@81-145.40.90.201:22-43.163.220.126:33766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:43.333996 sshd[2370]: Failed password for root from 134.17.16.40 port 15128 ssh2 Apr 12 20:18:44.175013 sshd[2370]: Received disconnect from 134.17.16.40 port 15128:11: Bye Bye [preauth] Apr 12 20:18:44.175013 sshd[2370]: Disconnected from authenticating user root 134.17.16.40 port 15128 [preauth] Apr 12 20:18:44.177561 systemd[1]: sshd@82-145.40.90.201:22-134.17.16.40:15128.service: Deactivated successfully. Apr 12 20:18:44.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-134.17.16.40:15128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:18:44.272043 kernel: audit: type=1131 audit(1712953124.177:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@82-145.40.90.201:22-134.17.16.40:15128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:00.735178 systemd[1]: Started sshd@83-145.40.90.201:22-150.109.19.36:55264.service. Apr 12 20:19:00.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-150.109.19.36:55264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:00.828014 kernel: audit: type=1130 audit(1712953140.734:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-150.109.19.36:55264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:01.709375 sshd[2376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:19:01.708000 audit[2376]: USER_AUTH pid=2376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:19:01.803144 kernel: audit: type=1100 audit(1712953141.708:387): pid=2376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:19:03.693390 sshd[2376]: Failed password for root from 150.109.19.36 port 55264 ssh2 Apr 12 20:19:04.326975 systemd[1]: Started sshd@84-145.40.90.201:22-43.156.185.119:50502.service. Apr 12 20:19:04.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-43.156.185.119:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:04.421155 kernel: audit: type=1130 audit(1712953144.326:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-43.156.185.119:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:04.460251 sshd[2376]: Received disconnect from 150.109.19.36 port 55264:11: Bye Bye [preauth] Apr 12 20:19:04.460251 sshd[2376]: Disconnected from authenticating user root 150.109.19.36 port 55264 [preauth] Apr 12 20:19:04.460871 systemd[1]: sshd@83-145.40.90.201:22-150.109.19.36:55264.service: Deactivated successfully. Apr 12 20:19:04.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-150.109.19.36:55264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:04.554180 kernel: audit: type=1131 audit(1712953144.460:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@83-145.40.90.201:22-150.109.19.36:55264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:05.327911 sshd[2379]: Invalid user origin from 43.156.185.119 port 50502 Apr 12 20:19:05.334004 sshd[2379]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:05.335025 sshd[2379]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:19:05.335119 sshd[2379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:19:05.336032 sshd[2379]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:05.335000 audit[2379]: USER_AUTH pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:19:05.429100 kernel: audit: type=1100 audit(1712953145.335:390): pid=2379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:19:06.206184 systemd[1]: Started sshd@85-145.40.90.201:22-46.101.14.145:37912.service. Apr 12 20:19:06.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-46.101.14.145:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:06.299985 kernel: audit: type=1130 audit(1712953146.205:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-46.101.14.145:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:07.079324 sshd[2383]: Invalid user test from 46.101.14.145 port 37912 Apr 12 20:19:07.085413 sshd[2383]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:07.086452 sshd[2383]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:19:07.086544 sshd[2383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:19:07.087459 sshd[2383]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:07.086000 audit[2383]: USER_AUTH pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:19:07.180046 kernel: audit: type=1100 audit(1712953147.086:392): pid=2383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:19:07.204184 sshd[2379]: Failed password for invalid user origin from 43.156.185.119 port 50502 ssh2 Apr 12 20:19:07.614691 sshd[2379]: Received disconnect from 43.156.185.119 port 50502:11: Bye Bye [preauth] Apr 12 20:19:07.614691 sshd[2379]: Disconnected from invalid user origin 43.156.185.119 port 50502 [preauth] Apr 12 20:19:07.617216 systemd[1]: sshd@84-145.40.90.201:22-43.156.185.119:50502.service: Deactivated successfully. Apr 12 20:19:07.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-43.156.185.119:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:07.711180 kernel: audit: type=1131 audit(1712953147.616:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@84-145.40.90.201:22-43.156.185.119:50502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:08.895700 sshd[2383]: Failed password for invalid user test from 46.101.14.145 port 37912 ssh2 Apr 12 20:19:10.541695 sshd[2383]: Received disconnect from 46.101.14.145 port 37912:11: Bye Bye [preauth] Apr 12 20:19:10.541695 sshd[2383]: Disconnected from invalid user test 46.101.14.145 port 37912 [preauth] Apr 12 20:19:10.544273 systemd[1]: sshd@85-145.40.90.201:22-46.101.14.145:37912.service: Deactivated successfully. Apr 12 20:19:10.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-46.101.14.145:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:10.638072 kernel: audit: type=1131 audit(1712953150.543:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@85-145.40.90.201:22-46.101.14.145:37912 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:22.034960 systemd[1]: Started sshd@86-145.40.90.201:22-219.152.174.29:48768.service. Apr 12 20:19:22.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-219.152.174.29:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:22.128065 kernel: audit: type=1130 audit(1712953162.034:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-219.152.174.29:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:22.987944 sshd[2390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:19:22.987000 audit[2390]: USER_AUTH pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:19:23.081037 kernel: audit: type=1100 audit(1712953162.987:396): pid=2390 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:19:24.520313 sshd[2390]: Failed password for root from 219.152.174.29 port 48768 ssh2 Apr 12 20:19:25.615050 systemd[1]: Started sshd@87-145.40.90.201:22-221.226.39.202:35650.service. Apr 12 20:19:25.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-221.226.39.202:35650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:25.708172 kernel: audit: type=1130 audit(1712953165.614:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-221.226.39.202:35650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:25.730331 sshd[2390]: Received disconnect from 219.152.174.29 port 48768:11: Bye Bye [preauth] Apr 12 20:19:25.730331 sshd[2390]: Disconnected from authenticating user root 219.152.174.29 port 48768 [preauth] Apr 12 20:19:25.730927 systemd[1]: sshd@86-145.40.90.201:22-219.152.174.29:48768.service: Deactivated successfully. Apr 12 20:19:25.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-219.152.174.29:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:25.824043 kernel: audit: type=1131 audit(1712953165.730:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@86-145.40.90.201:22-219.152.174.29:48768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:37.010992 systemd[1]: Started sshd@88-145.40.90.201:22-124.156.205.16:45382.service. Apr 12 20:19:37.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-124.156.205.16:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:37.105086 kernel: audit: type=1130 audit(1712953177.010:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-124.156.205.16:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:37.988484 sshd[2399]: Invalid user guest from 124.156.205.16 port 45382 Apr 12 20:19:37.994621 sshd[2399]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:37.995717 sshd[2399]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:19:37.995748 sshd[2399]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:19:37.995946 sshd[2399]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:37.995000 audit[2399]: USER_AUTH pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:19:38.089048 kernel: audit: type=1100 audit(1712953177.995:400): pid=2399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="guest" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:19:38.446293 systemd[1]: Started sshd@89-145.40.90.201:22-43.156.243.235:38158.service. Apr 12 20:19:38.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-43.156.243.235:38158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:38.537984 kernel: audit: type=1130 audit(1712953178.445:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-43.156.243.235:38158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:39.511490 sshd[2403]: Invalid user maximo from 43.156.243.235 port 38158 Apr 12 20:19:39.517800 sshd[2403]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:39.518524 sshd[2403]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:19:39.518542 sshd[2403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:19:39.518752 sshd[2403]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:39.517000 audit[2403]: USER_AUTH pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="maximo" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:19:39.612075 kernel: audit: type=1100 audit(1712953179.517:402): pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="maximo" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:19:40.255664 sshd[2399]: Failed password for invalid user guest from 124.156.205.16 port 45382 ssh2 Apr 12 20:19:40.732852 sshd[2399]: Received disconnect from 124.156.205.16 port 45382:11: Bye Bye [preauth] Apr 12 20:19:40.732852 sshd[2399]: Disconnected from invalid user guest 124.156.205.16 port 45382 [preauth] Apr 12 20:19:40.735370 systemd[1]: sshd@88-145.40.90.201:22-124.156.205.16:45382.service: Deactivated successfully. Apr 12 20:19:40.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-124.156.205.16:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:40.829175 kernel: audit: type=1131 audit(1712953180.734:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@88-145.40.90.201:22-124.156.205.16:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:41.032993 systemd[1]: Started sshd@90-145.40.90.201:22-43.128.225.10:57846.service. Apr 12 20:19:41.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-43.128.225.10:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:41.125985 kernel: audit: type=1130 audit(1712953181.032:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-43.128.225.10:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:41.385021 sshd[2403]: Failed password for invalid user maximo from 43.156.243.235 port 38158 ssh2 Apr 12 20:19:41.414984 systemd[1]: Started sshd@91-145.40.90.201:22-134.17.16.40:15129.service. Apr 12 20:19:41.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-134.17.16.40:15129 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:41.509153 kernel: audit: type=1130 audit(1712953181.414:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-134.17.16.40:15129 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:41.712129 sshd[2407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 user=root Apr 12 20:19:41.711000 audit[2407]: USER_AUTH pid=2407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:19:41.810096 kernel: audit: type=1100 audit(1712953181.711:406): pid=2407 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:19:42.406314 sshd[2410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:19:42.405000 audit[2410]: USER_AUTH pid=2410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:19:42.467314 systemd[1]: Started sshd@92-145.40.90.201:22-43.128.89.189:36752.service. Apr 12 20:19:42.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-43.128.89.189:36752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:42.591837 kernel: audit: type=1100 audit(1712953182.405:407): pid=2410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:19:42.591871 kernel: audit: type=1130 audit(1712953182.466:408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-43.128.89.189:36752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:42.631994 sshd[2403]: Received disconnect from 43.156.243.235 port 38158:11: Bye Bye [preauth] Apr 12 20:19:42.631994 sshd[2403]: Disconnected from invalid user maximo 43.156.243.235 port 38158 [preauth] Apr 12 20:19:42.632682 systemd[1]: sshd@89-145.40.90.201:22-43.156.243.235:38158.service: Deactivated successfully. Apr 12 20:19:42.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-43.156.243.235:38158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:42.724176 kernel: audit: type=1131 audit(1712953182.631:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@89-145.40.90.201:22-43.156.243.235:38158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:43.520581 sshd[2407]: Failed password for root from 43.128.225.10 port 57846 ssh2 Apr 12 20:19:43.565777 sshd[2413]: Invalid user johannes from 43.128.89.189 port 36752 Apr 12 20:19:43.571934 sshd[2413]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:43.573024 sshd[2413]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:19:43.573118 sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:19:43.574025 sshd[2413]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:43.573000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:19:43.668158 kernel: audit: type=1100 audit(1712953183.573:410): pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:19:44.400378 sshd[2407]: Received disconnect from 43.128.225.10 port 57846:11: Bye Bye [preauth] Apr 12 20:19:44.400378 sshd[2407]: Disconnected from authenticating user root 43.128.225.10 port 57846 [preauth] Apr 12 20:19:44.402843 systemd[1]: sshd@90-145.40.90.201:22-43.128.225.10:57846.service: Deactivated successfully. Apr 12 20:19:44.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-43.128.225.10:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:44.496144 kernel: audit: type=1131 audit(1712953184.402:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@90-145.40.90.201:22-43.128.225.10:57846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:44.686243 sshd[2410]: Failed password for root from 134.17.16.40 port 15129 ssh2 Apr 12 20:19:45.156968 sshd[2410]: Received disconnect from 134.17.16.40 port 15129:11: Bye Bye [preauth] Apr 12 20:19:45.156968 sshd[2410]: Disconnected from authenticating user root 134.17.16.40 port 15129 [preauth] Apr 12 20:19:45.159440 systemd[1]: sshd@91-145.40.90.201:22-134.17.16.40:15129.service: Deactivated successfully. Apr 12 20:19:45.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-134.17.16.40:15129 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:45.253061 kernel: audit: type=1131 audit(1712953185.158:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@91-145.40.90.201:22-134.17.16.40:15129 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:45.471953 systemd[1]: Started sshd@93-145.40.90.201:22-43.163.220.126:55232.service. Apr 12 20:19:45.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-43.163.220.126:55232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:45.566080 kernel: audit: type=1130 audit(1712953185.471:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-43.163.220.126:55232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:45.657933 sshd[2413]: Failed password for invalid user johannes from 43.128.89.189 port 36752 ssh2 Apr 12 20:19:46.369444 sshd[2419]: Invalid user box from 43.163.220.126 port 55232 Apr 12 20:19:46.375507 sshd[2419]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:46.376621 sshd[2419]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:19:46.376713 sshd[2419]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:19:46.377727 sshd[2419]: pam_faillock(sshd:auth): User unknown Apr 12 20:19:46.376000 audit[2419]: USER_AUTH pid=2419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="box" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:19:46.471117 kernel: audit: type=1100 audit(1712953186.376:414): pid=2419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="box" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:19:47.814804 sshd[2413]: Received disconnect from 43.128.89.189 port 36752:11: Bye Bye [preauth] Apr 12 20:19:47.814804 sshd[2413]: Disconnected from invalid user johannes 43.128.89.189 port 36752 [preauth] Apr 12 20:19:47.817331 systemd[1]: sshd@92-145.40.90.201:22-43.128.89.189:36752.service: Deactivated successfully. Apr 12 20:19:47.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-43.128.89.189:36752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:47.911191 kernel: audit: type=1131 audit(1712953187.816:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@92-145.40.90.201:22-43.128.89.189:36752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:48.205400 sshd[2419]: Failed password for invalid user box from 43.163.220.126 port 55232 ssh2 Apr 12 20:19:48.515584 sshd[2419]: Received disconnect from 43.163.220.126 port 55232:11: Bye Bye [preauth] Apr 12 20:19:48.515584 sshd[2419]: Disconnected from invalid user box 43.163.220.126 port 55232 [preauth] Apr 12 20:19:48.518051 systemd[1]: sshd@93-145.40.90.201:22-43.163.220.126:55232.service: Deactivated successfully. Apr 12 20:19:48.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-43.163.220.126:55232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:48.612155 kernel: audit: type=1131 audit(1712953188.517:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@93-145.40.90.201:22-43.163.220.126:55232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:49.628268 sshd[2332]: Timeout before authentication for 221.226.39.202 port 25526 Apr 12 20:19:49.629771 systemd[1]: sshd@73-145.40.90.201:22-221.226.39.202:25526.service: Deactivated successfully. Apr 12 20:19:49.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-221.226.39.202:25526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:49.724057 kernel: audit: type=1131 audit(1712953189.629:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@73-145.40.90.201:22-221.226.39.202:25526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:53.292944 systemd[1]: Started sshd@94-145.40.90.201:22-129.226.146.101:44012.service. Apr 12 20:19:53.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-129.226.146.101:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:53.387173 kernel: audit: type=1130 audit(1712953193.292:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-129.226.146.101:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:54.334707 sshd[2425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 user=root Apr 12 20:19:54.334000 audit[2425]: USER_AUTH pid=2425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:19:54.428141 kernel: audit: type=1100 audit(1712953194.334:419): pid=2425 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:19:56.594764 sshd[2425]: Failed password for root from 129.226.146.101 port 44012 ssh2 Apr 12 20:19:57.097174 sshd[2425]: Received disconnect from 129.226.146.101 port 44012:11: Bye Bye [preauth] Apr 12 20:19:57.097174 sshd[2425]: Disconnected from authenticating user root 129.226.146.101 port 44012 [preauth] Apr 12 20:19:57.099657 systemd[1]: sshd@94-145.40.90.201:22-129.226.146.101:44012.service: Deactivated successfully. Apr 12 20:19:57.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-129.226.146.101:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:19:57.194179 kernel: audit: type=1131 audit(1712953197.099:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@94-145.40.90.201:22-129.226.146.101:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:05.065050 systemd[1]: Started sshd@95-145.40.90.201:22-46.101.14.145:59276.service. Apr 12 20:20:05.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-46.101.14.145:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:05.158034 kernel: audit: type=1130 audit(1712953205.064:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-46.101.14.145:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:05.900724 sshd[2429]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 user=root Apr 12 20:20:05.900000 audit[2429]: USER_AUTH pid=2429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:20:05.994165 kernel: audit: type=1100 audit(1712953205.900:422): pid=2429 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:20:08.005032 sshd[2429]: Failed password for root from 46.101.14.145 port 59276 ssh2 Apr 12 20:20:08.617843 sshd[2429]: Received disconnect from 46.101.14.145 port 59276:11: Bye Bye [preauth] Apr 12 20:20:08.617843 sshd[2429]: Disconnected from authenticating user root 46.101.14.145 port 59276 [preauth] Apr 12 20:20:08.620338 systemd[1]: sshd@95-145.40.90.201:22-46.101.14.145:59276.service: Deactivated successfully. Apr 12 20:20:08.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-46.101.14.145:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:08.714058 kernel: audit: type=1131 audit(1712953208.619:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@95-145.40.90.201:22-46.101.14.145:59276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:12.097701 systemd[1]: Started sshd@96-145.40.90.201:22-43.156.185.119:43868.service. Apr 12 20:20:12.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-43.156.185.119:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:12.191037 kernel: audit: type=1130 audit(1712953212.096:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-43.156.185.119:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:13.017821 systemd[1]: Started sshd@97-145.40.90.201:22-221.226.39.202:40780.service. Apr 12 20:20:13.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-221.226.39.202:40780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:13.101752 sshd[2433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 user=root Apr 12 20:20:13.100000 audit[2433]: USER_AUTH pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:20:13.201210 kernel: audit: type=1130 audit(1712953213.016:425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-221.226.39.202:40780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:13.201243 kernel: audit: type=1100 audit(1712953213.100:426): pid=2433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:20:15.637363 sshd[2433]: Failed password for root from 43.156.185.119 port 43868 ssh2 Apr 12 20:20:15.859900 sshd[2433]: Received disconnect from 43.156.185.119 port 43868:11: Bye Bye [preauth] Apr 12 20:20:15.859900 sshd[2433]: Disconnected from authenticating user root 43.156.185.119 port 43868 [preauth] Apr 12 20:20:15.862413 systemd[1]: sshd@96-145.40.90.201:22-43.156.185.119:43868.service: Deactivated successfully. Apr 12 20:20:15.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-43.156.185.119:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:15.956062 kernel: audit: type=1131 audit(1712953215.861:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@96-145.40.90.201:22-43.156.185.119:43868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:21.458665 systemd[1]: Started sshd@98-145.40.90.201:22-104.250.50.61:32978.service. Apr 12 20:20:21.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:21.552177 kernel: audit: type=1130 audit(1712953221.457:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:23.887485 sshd[2440]: Connection closed by 104.250.50.61 port 32978 [preauth] Apr 12 20:20:23.887950 systemd[1]: sshd@98-145.40.90.201:22-104.250.50.61:32978.service: Deactivated successfully. Apr 12 20:20:23.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:23.982170 kernel: audit: type=1131 audit(1712953223.887:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@98-145.40.90.201:22-104.250.50.61:32978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:31.597735 systemd[1]: Started sshd@99-145.40.90.201:22-150.109.19.36:52422.service. Apr 12 20:20:31.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-150.109.19.36:52422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:31.691090 kernel: audit: type=1130 audit(1712953231.596:430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-150.109.19.36:52422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:32.616689 sshd[2444]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:20:32.615000 audit[2444]: USER_AUTH pid=2444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:20:32.709026 kernel: audit: type=1100 audit(1712953232.615:431): pid=2444 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:20:34.425241 sshd[2444]: Failed password for root from 150.109.19.36 port 52422 ssh2 Apr 12 20:20:35.372112 sshd[2444]: Received disconnect from 150.109.19.36 port 52422:11: Bye Bye [preauth] Apr 12 20:20:35.372112 sshd[2444]: Disconnected from authenticating user root 150.109.19.36 port 52422 [preauth] Apr 12 20:20:35.374638 systemd[1]: sshd@99-145.40.90.201:22-150.109.19.36:52422.service: Deactivated successfully. Apr 12 20:20:35.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-150.109.19.36:52422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:35.468035 kernel: audit: type=1131 audit(1712953235.374:432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@99-145.40.90.201:22-150.109.19.36:52422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:42.756657 systemd[1]: Started sshd@100-145.40.90.201:22-134.17.16.40:15192.service. Apr 12 20:20:42.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-134.17.16.40:15192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:42.850087 kernel: audit: type=1130 audit(1712953242.755:433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-134.17.16.40:15192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:43.739921 sshd[2448]: Invalid user tests from 134.17.16.40 port 15192 Apr 12 20:20:43.746126 sshd[2448]: pam_faillock(sshd:auth): User unknown Apr 12 20:20:43.747140 sshd[2448]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:20:43.747233 sshd[2448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Apr 12 20:20:43.748204 sshd[2448]: pam_faillock(sshd:auth): User unknown Apr 12 20:20:43.747000 audit[2448]: USER_AUTH pid=2448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tests" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:20:43.842198 kernel: audit: type=1100 audit(1712953243.747:434): pid=2448 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tests" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:20:46.068188 sshd[2448]: Failed password for invalid user tests from 134.17.16.40 port 15192 ssh2 Apr 12 20:20:48.108476 sshd[2448]: Received disconnect from 134.17.16.40 port 15192:11: Bye Bye [preauth] Apr 12 20:20:48.108476 sshd[2448]: Disconnected from invalid user tests 134.17.16.40 port 15192 [preauth] Apr 12 20:20:48.110924 systemd[1]: sshd@100-145.40.90.201:22-134.17.16.40:15192.service: Deactivated successfully. Apr 12 20:20:48.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-134.17.16.40:15192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:48.205059 kernel: audit: type=1131 audit(1712953248.110:435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@100-145.40.90.201:22-134.17.16.40:15192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:51.395900 systemd[1]: Started sshd@101-145.40.90.201:22-43.128.89.189:58224.service. Apr 12 20:20:51.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-145.40.90.201:22-43.128.89.189:58224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:51.488984 kernel: audit: type=1130 audit(1712953251.395:436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-145.40.90.201:22-43.128.89.189:58224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:52.411590 sshd[2455]: Invalid user origin from 43.128.89.189 port 58224 Apr 12 20:20:52.417806 sshd[2455]: pam_faillock(sshd:auth): User unknown Apr 12 20:20:52.418818 sshd[2455]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:20:52.418909 sshd[2455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:20:52.419917 sshd[2455]: pam_faillock(sshd:auth): User unknown Apr 12 20:20:52.419000 audit[2455]: USER_AUTH pid=2455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:20:52.514160 kernel: audit: type=1100 audit(1712953252.419:437): pid=2455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="origin" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:20:54.308383 sshd[2455]: Failed password for invalid user origin from 43.128.89.189 port 58224 ssh2 Apr 12 20:20:54.700015 sshd[2455]: Received disconnect from 43.128.89.189 port 58224:11: Bye Bye [preauth] Apr 12 20:20:54.700015 sshd[2455]: Disconnected from invalid user origin 43.128.89.189 port 58224 [preauth] Apr 12 20:20:54.702516 systemd[1]: sshd@101-145.40.90.201:22-43.128.89.189:58224.service: Deactivated successfully. Apr 12 20:20:54.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-145.40.90.201:22-43.128.89.189:58224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:54.796044 kernel: audit: type=1131 audit(1712953254.702:438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@101-145.40.90.201:22-43.128.89.189:58224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:55.341605 systemd[1]: Started sshd@102-145.40.90.201:22-43.163.220.126:48482.service. Apr 12 20:20:55.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-145.40.90.201:22-43.163.220.126:48482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:55.435157 kernel: audit: type=1130 audit(1712953255.340:439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-145.40.90.201:22-43.163.220.126:48482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:56.049909 sshd[2459]: Invalid user gev from 43.163.220.126 port 48482 Apr 12 20:20:56.056413 sshd[2459]: pam_faillock(sshd:auth): User unknown Apr 12 20:20:56.057588 sshd[2459]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:20:56.057680 sshd[2459]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:20:56.058766 sshd[2459]: pam_faillock(sshd:auth): User unknown Apr 12 20:20:56.057000 audit[2459]: USER_AUTH pid=2459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gev" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:20:56.153162 kernel: audit: type=1100 audit(1712953256.057:440): pid=2459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="gev" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:20:58.091845 systemd[1]: Started sshd@103-145.40.90.201:22-221.226.39.202:45846.service. Apr 12 20:20:58.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-145.40.90.201:22-221.226.39.202:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:58.185175 kernel: audit: type=1130 audit(1712953258.090:441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-145.40.90.201:22-221.226.39.202:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:58.499126 sshd[2459]: Failed password for invalid user gev from 43.163.220.126 port 48482 ssh2 Apr 12 20:20:59.286725 sshd[2459]: Received disconnect from 43.163.220.126 port 48482:11: Bye Bye [preauth] Apr 12 20:20:59.286725 sshd[2459]: Disconnected from invalid user gev 43.163.220.126 port 48482 [preauth] Apr 12 20:20:59.289190 systemd[1]: sshd@102-145.40.90.201:22-43.163.220.126:48482.service: Deactivated successfully. Apr 12 20:20:59.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-145.40.90.201:22-43.163.220.126:48482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:20:59.384172 kernel: audit: type=1131 audit(1712953259.288:442): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@102-145.40.90.201:22-43.163.220.126:48482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:01.262836 systemd[1]: Started sshd@104-145.40.90.201:22-124.156.205.16:33380.service. Apr 12 20:21:01.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-145.40.90.201:22-124.156.205.16:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:01.356056 kernel: audit: type=1130 audit(1712953261.261:443): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-145.40.90.201:22-124.156.205.16:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:02.318731 sshd[2466]: Invalid user johannes from 124.156.205.16 port 33380 Apr 12 20:21:02.324824 sshd[2466]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:02.325834 sshd[2466]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:21:02.325923 sshd[2466]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:21:02.326849 sshd[2466]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:02.326000 audit[2466]: USER_AUTH pid=2466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:21:02.421178 kernel: audit: type=1100 audit(1712953262.326:444): pid=2466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="johannes" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:21:04.406618 systemd[1]: Started sshd@105-145.40.90.201:22-117.34.211.24:59392.service. Apr 12 20:21:04.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-145.40.90.201:22-117.34.211.24:59392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:04.500151 kernel: audit: type=1130 audit(1712953264.405:445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-145.40.90.201:22-117.34.211.24:59392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:04.922915 sshd[2466]: Failed password for invalid user johannes from 124.156.205.16 port 33380 ssh2 Apr 12 20:21:05.095728 systemd[1]: Started sshd@106-145.40.90.201:22-43.128.225.10:52880.service. Apr 12 20:21:05.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-145.40.90.201:22-43.128.225.10:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:05.188986 kernel: audit: type=1130 audit(1712953265.094:446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-145.40.90.201:22-43.128.225.10:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:05.253365 systemd[1]: Started sshd@107-145.40.90.201:22-46.101.14.145:52408.service. Apr 12 20:21:05.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-145.40.90.201:22-46.101.14.145:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:05.347193 kernel: audit: type=1130 audit(1712953265.252:447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-145.40.90.201:22-46.101.14.145:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:05.770136 sshd[2471]: Invalid user ftpadmin from 43.128.225.10 port 52880 Apr 12 20:21:05.776402 sshd[2471]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:05.777415 sshd[2471]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:21:05.777508 sshd[2471]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:21:05.778537 sshd[2471]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:05.777000 audit[2471]: USER_AUTH pid=2471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpadmin" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:21:05.872184 kernel: audit: type=1100 audit(1712953265.777:448): pid=2471 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ftpadmin" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:21:06.076579 sshd[2474]: Invalid user www from 46.101.14.145 port 52408 Apr 12 20:21:06.083043 sshd[2474]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:06.084057 sshd[2474]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:21:06.084152 sshd[2474]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:21:06.085246 sshd[2474]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:06.084000 audit[2474]: USER_AUTH pid=2474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:21:06.184158 kernel: audit: type=1100 audit(1712953266.084:449): pid=2474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:21:06.553729 sshd[2466]: Received disconnect from 124.156.205.16 port 33380:11: Bye Bye [preauth] Apr 12 20:21:06.553729 sshd[2466]: Disconnected from invalid user johannes 124.156.205.16 port 33380 [preauth] Apr 12 20:21:06.556250 systemd[1]: sshd@104-145.40.90.201:22-124.156.205.16:33380.service: Deactivated successfully. Apr 12 20:21:06.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-145.40.90.201:22-124.156.205.16:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:06.649986 kernel: audit: type=1131 audit(1712953266.555:450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@104-145.40.90.201:22-124.156.205.16:33380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:07.451194 sshd[2471]: Failed password for invalid user ftpadmin from 43.128.225.10 port 52880 ssh2 Apr 12 20:21:08.565564 sshd[2474]: Failed password for invalid user www from 46.101.14.145 port 52408 ssh2 Apr 12 20:21:08.946217 sshd[2471]: Received disconnect from 43.128.225.10 port 52880:11: Bye Bye [preauth] Apr 12 20:21:08.946217 sshd[2471]: Disconnected from invalid user ftpadmin 43.128.225.10 port 52880 [preauth] Apr 12 20:21:08.948713 systemd[1]: sshd@106-145.40.90.201:22-43.128.225.10:52880.service: Deactivated successfully. Apr 12 20:21:08.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-145.40.90.201:22-43.128.225.10:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:09.040984 kernel: audit: type=1131 audit(1712953268.948:451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@106-145.40.90.201:22-43.128.225.10:52880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:09.317587 sshd[2474]: Received disconnect from 46.101.14.145 port 52408:11: Bye Bye [preauth] Apr 12 20:21:09.317587 sshd[2474]: Disconnected from invalid user www 46.101.14.145 port 52408 [preauth] Apr 12 20:21:09.320229 systemd[1]: sshd@107-145.40.90.201:22-46.101.14.145:52408.service: Deactivated successfully. Apr 12 20:21:09.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-145.40.90.201:22-46.101.14.145:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:09.414190 kernel: audit: type=1131 audit(1712953269.319:452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@107-145.40.90.201:22-46.101.14.145:52408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:18.121905 systemd[1]: Started sshd@108-145.40.90.201:22-43.156.243.235:34490.service. Apr 12 20:21:18.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-145.40.90.201:22-43.156.243.235:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:18.215154 kernel: audit: type=1130 audit(1712953278.120:453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-145.40.90.201:22-43.156.243.235:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:19.124652 sshd[2482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:21:19.123000 audit[2482]: USER_AUTH pid=2482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:21:19.218160 kernel: audit: type=1100 audit(1712953279.123:454): pid=2482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:21:21.388360 sshd[2482]: Failed password for root from 43.156.243.235 port 34490 ssh2 Apr 12 20:21:21.881585 sshd[2482]: Received disconnect from 43.156.243.235 port 34490:11: Bye Bye [preauth] Apr 12 20:21:21.881585 sshd[2482]: Disconnected from authenticating user root 43.156.243.235 port 34490 [preauth] Apr 12 20:21:21.883999 systemd[1]: sshd@108-145.40.90.201:22-43.156.243.235:34490.service: Deactivated successfully. Apr 12 20:21:21.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-145.40.90.201:22-43.156.243.235:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:21.978161 kernel: audit: type=1131 audit(1712953281.883:455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@108-145.40.90.201:22-43.156.243.235:34490 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:24.097395 systemd[1]: Started sshd@109-145.40.90.201:22-43.156.185.119:37234.service. Apr 12 20:21:24.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-145.40.90.201:22-43.156.185.119:37234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:24.191157 kernel: audit: type=1130 audit(1712953284.096:456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-145.40.90.201:22-43.156.185.119:37234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:24.439845 systemd[1]: Started sshd@110-145.40.90.201:22-129.226.146.101:40204.service. Apr 12 20:21:24.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-145.40.90.201:22-129.226.146.101:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:24.534129 kernel: audit: type=1130 audit(1712953284.439:457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-145.40.90.201:22-129.226.146.101:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:25.110024 sshd[2486]: Invalid user user1 from 43.156.185.119 port 37234 Apr 12 20:21:25.116129 sshd[2486]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:25.117127 sshd[2486]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:21:25.117217 sshd[2486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:21:25.118231 sshd[2486]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:25.117000 audit[2486]: USER_AUTH pid=2486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:21:25.212174 kernel: audit: type=1100 audit(1712953285.117:458): pid=2486 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:21:25.454876 sshd[2489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 user=root Apr 12 20:21:25.454000 audit[2489]: USER_AUTH pid=2489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:21:25.556161 kernel: audit: type=1100 audit(1712953285.454:459): pid=2489 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:21:25.620347 sshd[2393]: Timeout before authentication for 221.226.39.202 port 35650 Apr 12 20:21:25.621866 systemd[1]: sshd@87-145.40.90.201:22-221.226.39.202:35650.service: Deactivated successfully. Apr 12 20:21:25.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-221.226.39.202:35650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:25.715027 kernel: audit: type=1131 audit(1712953285.621:460): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@87-145.40.90.201:22-221.226.39.202:35650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:27.538610 sshd[2486]: Failed password for invalid user user1 from 43.156.185.119 port 37234 ssh2 Apr 12 20:21:27.875375 sshd[2489]: Failed password for root from 129.226.146.101 port 40204 ssh2 Apr 12 20:21:28.060291 sshd[2486]: Received disconnect from 43.156.185.119 port 37234:11: Bye Bye [preauth] Apr 12 20:21:28.060291 sshd[2486]: Disconnected from invalid user user1 43.156.185.119 port 37234 [preauth] Apr 12 20:21:28.062767 systemd[1]: sshd@109-145.40.90.201:22-43.156.185.119:37234.service: Deactivated successfully. Apr 12 20:21:28.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-145.40.90.201:22-43.156.185.119:37234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:28.156041 kernel: audit: type=1131 audit(1712953288.062:461): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@109-145.40.90.201:22-43.156.185.119:37234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:28.203466 sshd[2489]: Received disconnect from 129.226.146.101 port 40204:11: Bye Bye [preauth] Apr 12 20:21:28.203466 sshd[2489]: Disconnected from authenticating user root 129.226.146.101 port 40204 [preauth] Apr 12 20:21:28.204158 systemd[1]: sshd@110-145.40.90.201:22-129.226.146.101:40204.service: Deactivated successfully. Apr 12 20:21:28.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-145.40.90.201:22-129.226.146.101:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:28.296141 kernel: audit: type=1131 audit(1712953288.203:462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@110-145.40.90.201:22-129.226.146.101:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:37.114799 systemd[1]: Started sshd@111-145.40.90.201:22-49.65.101.245:59024.service. Apr 12 20:21:37.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-145.40.90.201:22-49.65.101.245:59024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:37.208193 kernel: audit: type=1130 audit(1712953297.113:463): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-145.40.90.201:22-49.65.101.245:59024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:37.942761 sshd[2495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:21:37.942000 audit[2495]: USER_AUTH pid=2495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:21:38.036166 kernel: audit: type=1100 audit(1712953297.942:464): pid=2495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:21:40.343272 sshd[2495]: Failed password for root from 49.65.101.245 port 59024 ssh2 Apr 12 20:21:40.720805 sshd[2495]: Received disconnect from 49.65.101.245 port 59024:11: Bye Bye [preauth] Apr 12 20:21:40.720805 sshd[2495]: Disconnected from authenticating user root 49.65.101.245 port 59024 [preauth] Apr 12 20:21:40.723336 systemd[1]: sshd@111-145.40.90.201:22-49.65.101.245:59024.service: Deactivated successfully. Apr 12 20:21:40.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-145.40.90.201:22-49.65.101.245:59024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:40.817175 kernel: audit: type=1131 audit(1712953300.722:465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@111-145.40.90.201:22-49.65.101.245:59024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:45.209776 systemd[1]: Started sshd@112-145.40.90.201:22-221.226.39.202:50850.service. Apr 12 20:21:45.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-145.40.90.201:22-221.226.39.202:50850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:45.303146 kernel: audit: type=1130 audit(1712953305.208:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-145.40.90.201:22-221.226.39.202:50850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:45.749972 systemd[1]: Started sshd@113-145.40.90.201:22-134.17.16.40:15193.service. Apr 12 20:21:45.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-145.40.90.201:22-134.17.16.40:15193 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:45.843188 kernel: audit: type=1130 audit(1712953305.749:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-145.40.90.201:22-134.17.16.40:15193 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:46.739588 sshd[2501]: Invalid user ubuntu from 134.17.16.40 port 15193 Apr 12 20:21:46.745733 sshd[2501]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:46.746785 sshd[2501]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:21:46.746876 sshd[2501]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Apr 12 20:21:46.747821 sshd[2501]: pam_faillock(sshd:auth): User unknown Apr 12 20:21:46.747000 audit[2501]: USER_AUTH pid=2501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:21:46.840168 kernel: audit: type=1100 audit(1712953306.747:468): pid=2501 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:21:48.716715 sshd[2501]: Failed password for invalid user ubuntu from 134.17.16.40 port 15193 ssh2 Apr 12 20:21:49.132898 sshd[2501]: Received disconnect from 134.17.16.40 port 15193:11: Bye Bye [preauth] Apr 12 20:21:49.132898 sshd[2501]: Disconnected from invalid user ubuntu 134.17.16.40 port 15193 [preauth] Apr 12 20:21:49.135337 systemd[1]: sshd@113-145.40.90.201:22-134.17.16.40:15193.service: Deactivated successfully. Apr 12 20:21:49.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-145.40.90.201:22-134.17.16.40:15193 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:49.229177 kernel: audit: type=1131 audit(1712953309.134:469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@113-145.40.90.201:22-134.17.16.40:15193 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:52.512475 systemd[1]: Started sshd@114-145.40.90.201:22-219.152.174.29:47336.service. Apr 12 20:21:52.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-145.40.90.201:22-219.152.174.29:47336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:52.605014 kernel: audit: type=1130 audit(1712953312.511:470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-145.40.90.201:22-219.152.174.29:47336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:53.480485 sshd[2506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 user=root Apr 12 20:21:53.479000 audit[2506]: USER_AUTH pid=2506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:21:53.572039 kernel: audit: type=1100 audit(1712953313.479:471): pid=2506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:21:55.745305 sshd[2506]: Failed password for root from 219.152.174.29 port 47336 ssh2 Apr 12 20:21:56.222295 sshd[2506]: Received disconnect from 219.152.174.29 port 47336:11: Bye Bye [preauth] Apr 12 20:21:56.222295 sshd[2506]: Disconnected from authenticating user root 219.152.174.29 port 47336 [preauth] Apr 12 20:21:56.224761 systemd[1]: sshd@114-145.40.90.201:22-219.152.174.29:47336.service: Deactivated successfully. Apr 12 20:21:56.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-145.40.90.201:22-219.152.174.29:47336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:21:56.318166 kernel: audit: type=1131 audit(1712953316.224:472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@114-145.40.90.201:22-219.152.174.29:47336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:01.826535 systemd[1]: Started sshd@115-145.40.90.201:22-43.128.89.189:51460.service. Apr 12 20:22:01.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-145.40.90.201:22-43.128.89.189:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:01.918986 kernel: audit: type=1130 audit(1712953321.825:473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-145.40.90.201:22-43.128.89.189:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:02.839918 sshd[2510]: Invalid user l from 43.128.89.189 port 51460 Apr 12 20:22:02.846073 sshd[2510]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:02.847095 sshd[2510]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:22:02.847194 sshd[2510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:22:02.848053 sshd[2510]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:02.847000 audit[2510]: USER_AUTH pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:22:02.941169 kernel: audit: type=1100 audit(1712953322.847:474): pid=2510 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:22:04.680420 sshd[2510]: Failed password for invalid user l from 43.128.89.189 port 51460 ssh2 Apr 12 20:22:05.375687 sshd[2510]: Received disconnect from 43.128.89.189 port 51460:11: Bye Bye [preauth] Apr 12 20:22:05.375687 sshd[2510]: Disconnected from invalid user l 43.128.89.189 port 51460 [preauth] Apr 12 20:22:05.378197 systemd[1]: sshd@115-145.40.90.201:22-43.128.89.189:51460.service: Deactivated successfully. Apr 12 20:22:05.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-145.40.90.201:22-43.128.89.189:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:05.449958 systemd[1]: Started sshd@116-145.40.90.201:22-43.163.220.126:41726.service. Apr 12 20:22:05.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-145.40.90.201:22-43.163.220.126:41726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:05.564742 kernel: audit: type=1131 audit(1712953325.377:475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@115-145.40.90.201:22-43.128.89.189:51460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:05.564797 kernel: audit: type=1130 audit(1712953325.449:476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-145.40.90.201:22-43.163.220.126:41726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:05.916161 systemd[1]: Started sshd@117-145.40.90.201:22-46.101.14.145:45540.service. Apr 12 20:22:05.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-145.40.90.201:22-46.101.14.145:45540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:06.010068 kernel: audit: type=1130 audit(1712953325.915:477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-145.40.90.201:22-46.101.14.145:45540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:06.142765 systemd[1]: Started sshd@118-145.40.90.201:22-150.109.19.36:48870.service. Apr 12 20:22:06.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-145.40.90.201:22-150.109.19.36:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:06.236043 kernel: audit: type=1130 audit(1712953326.142:478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-145.40.90.201:22-150.109.19.36:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:06.331150 sshd[2514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 user=root Apr 12 20:22:06.330000 audit[2514]: USER_AUTH pid=2514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:22:06.429156 kernel: audit: type=1100 audit(1712953326.330:479): pid=2514 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:22:06.719478 sshd[2517]: Invalid user parking from 46.101.14.145 port 45540 Apr 12 20:22:06.725656 sshd[2517]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:06.726756 sshd[2517]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:22:06.726847 sshd[2517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:22:06.727871 sshd[2517]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:06.727000 audit[2517]: USER_AUTH pid=2517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:22:06.826169 kernel: audit: type=1100 audit(1712953326.727:480): pid=2517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="parking" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:22:07.190234 sshd[2520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:22:07.189000 audit[2520]: USER_AUTH pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:22:07.283162 kernel: audit: type=1100 audit(1712953327.189:481): pid=2520 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:22:08.379412 sshd[2514]: Failed password for root from 43.163.220.126 port 41726 ssh2 Apr 12 20:22:08.776407 sshd[2517]: Failed password for invalid user parking from 46.101.14.145 port 45540 ssh2 Apr 12 20:22:09.061294 sshd[2514]: Received disconnect from 43.163.220.126 port 41726:11: Bye Bye [preauth] Apr 12 20:22:09.061294 sshd[2514]: Disconnected from authenticating user root 43.163.220.126 port 41726 [preauth] Apr 12 20:22:09.063739 systemd[1]: sshd@116-145.40.90.201:22-43.163.220.126:41726.service: Deactivated successfully. Apr 12 20:22:09.063000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-145.40.90.201:22-43.163.220.126:41726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:09.158182 kernel: audit: type=1131 audit(1712953329.063:482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@116-145.40.90.201:22-43.163.220.126:41726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:09.374947 sshd[2520]: Failed password for root from 150.109.19.36 port 48870 ssh2 Apr 12 20:22:09.681559 sshd[2517]: Received disconnect from 46.101.14.145 port 45540:11: Bye Bye [preauth] Apr 12 20:22:09.681559 sshd[2517]: Disconnected from invalid user parking 46.101.14.145 port 45540 [preauth] Apr 12 20:22:09.684048 systemd[1]: sshd@117-145.40.90.201:22-46.101.14.145:45540.service: Deactivated successfully. Apr 12 20:22:09.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-145.40.90.201:22-46.101.14.145:45540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:09.778178 kernel: audit: type=1131 audit(1712953329.683:483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@117-145.40.90.201:22-46.101.14.145:45540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:09.946574 sshd[2520]: Received disconnect from 150.109.19.36 port 48870:11: Bye Bye [preauth] Apr 12 20:22:09.946574 sshd[2520]: Disconnected from authenticating user root 150.109.19.36 port 48870 [preauth] Apr 12 20:22:09.948959 systemd[1]: sshd@118-145.40.90.201:22-150.109.19.36:48870.service: Deactivated successfully. Apr 12 20:22:09.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-145.40.90.201:22-150.109.19.36:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:10.048053 kernel: audit: type=1131 audit(1712953329.948:484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@118-145.40.90.201:22-150.109.19.36:48870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:13.023132 sshd[2436]: Timeout before authentication for 221.226.39.202 port 40780 Apr 12 20:22:13.024620 systemd[1]: sshd@97-145.40.90.201:22-221.226.39.202:40780.service: Deactivated successfully. Apr 12 20:22:13.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-221.226.39.202:40780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:13.118168 kernel: audit: type=1131 audit(1712953333.024:485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@97-145.40.90.201:22-221.226.39.202:40780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:24.828983 systemd[1]: Started sshd@119-145.40.90.201:22-124.156.205.16:34004.service. Apr 12 20:22:24.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-145.40.90.201:22-124.156.205.16:34004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:24.923045 kernel: audit: type=1130 audit(1712953344.828:486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-145.40.90.201:22-124.156.205.16:34004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:25.837528 sshd[2529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 user=root Apr 12 20:22:25.836000 audit[2529]: USER_AUTH pid=2529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:22:25.930160 kernel: audit: type=1100 audit(1712953345.836:487): pid=2529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:22:27.263938 systemd[1]: Started sshd@120-145.40.90.201:22-43.128.225.10:47902.service. Apr 12 20:22:27.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-145.40.90.201:22-43.128.225.10:47902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:27.357055 kernel: audit: type=1130 audit(1712953347.263:488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-145.40.90.201:22-43.128.225.10:47902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:27.495113 sshd[2529]: Failed password for root from 124.156.205.16 port 34004 ssh2 Apr 12 20:22:27.947225 sshd[2532]: Invalid user git from 43.128.225.10 port 47902 Apr 12 20:22:27.953499 sshd[2532]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:27.954513 sshd[2532]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:22:27.954606 sshd[2532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 Apr 12 20:22:27.955660 sshd[2532]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:27.954000 audit[2532]: USER_AUTH pid=2532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="git" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:22:28.049026 kernel: audit: type=1100 audit(1712953347.954:489): pid=2532 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="git" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:22:28.587733 sshd[2529]: Received disconnect from 124.156.205.16 port 34004:11: Bye Bye [preauth] Apr 12 20:22:28.587733 sshd[2529]: Disconnected from authenticating user root 124.156.205.16 port 34004 [preauth] Apr 12 20:22:28.590216 systemd[1]: sshd@119-145.40.90.201:22-124.156.205.16:34004.service: Deactivated successfully. Apr 12 20:22:28.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-145.40.90.201:22-124.156.205.16:34004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:28.684174 kernel: audit: type=1131 audit(1712953348.589:490): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@119-145.40.90.201:22-124.156.205.16:34004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:30.887622 sshd[2532]: Failed password for invalid user git from 43.128.225.10 port 47902 ssh2 Apr 12 20:22:31.173800 sshd[2532]: Received disconnect from 43.128.225.10 port 47902:11: Bye Bye [preauth] Apr 12 20:22:31.173800 sshd[2532]: Disconnected from invalid user git 43.128.225.10 port 47902 [preauth] Apr 12 20:22:31.176315 systemd[1]: sshd@120-145.40.90.201:22-43.128.225.10:47902.service: Deactivated successfully. Apr 12 20:22:31.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-145.40.90.201:22-43.128.225.10:47902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:31.270169 kernel: audit: type=1131 audit(1712953351.175:491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@120-145.40.90.201:22-43.128.225.10:47902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:33.527894 systemd[1]: Started sshd@121-145.40.90.201:22-221.226.39.202:55910.service. Apr 12 20:22:33.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-145.40.90.201:22-221.226.39.202:55910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:33.621172 kernel: audit: type=1130 audit(1712953353.526:492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-145.40.90.201:22-221.226.39.202:55910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:34.387725 systemd[1]: Started sshd@122-145.40.90.201:22-43.156.185.119:58830.service. Apr 12 20:22:34.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-145.40.90.201:22-43.156.185.119:58830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:34.480986 kernel: audit: type=1130 audit(1712953354.386:493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-145.40.90.201:22-43.156.185.119:58830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:35.414330 sshd[2542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 user=root Apr 12 20:22:35.413000 audit[2542]: USER_AUTH pid=2542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:22:35.507159 kernel: audit: type=1100 audit(1712953355.413:494): pid=2542 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:22:36.043550 sshd[2539]: Invalid user sz from 221.226.39.202 port 55910 Apr 12 20:22:36.049805 sshd[2539]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:36.050605 sshd[2539]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:22:36.050622 sshd[2539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.39.202 Apr 12 20:22:36.050836 sshd[2539]: pam_faillock(sshd:auth): User unknown Apr 12 20:22:36.049000 audit[2539]: USER_AUTH pid=2539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sz" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:22:36.143164 kernel: audit: type=1100 audit(1712953356.049:495): pid=2539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sz" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:22:37.112011 sshd[2542]: Failed password for root from 43.156.185.119 port 58830 ssh2 Apr 12 20:22:37.883841 sshd[2539]: Failed password for invalid user sz from 221.226.39.202 port 55910 ssh2 Apr 12 20:22:38.172295 sshd[2542]: Received disconnect from 43.156.185.119 port 58830:11: Bye Bye [preauth] Apr 12 20:22:38.172295 sshd[2542]: Disconnected from authenticating user root 43.156.185.119 port 58830 [preauth] Apr 12 20:22:38.174724 systemd[1]: sshd@122-145.40.90.201:22-43.156.185.119:58830.service: Deactivated successfully. Apr 12 20:22:38.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-145.40.90.201:22-43.156.185.119:58830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:38.268176 kernel: audit: type=1131 audit(1712953358.174:496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@122-145.40.90.201:22-43.156.185.119:58830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:39.148939 sshd[2539]: Received disconnect from 221.226.39.202 port 55910:11: Bye Bye [preauth] Apr 12 20:22:39.148939 sshd[2539]: Disconnected from invalid user sz 221.226.39.202 port 55910 [preauth] Apr 12 20:22:39.151490 systemd[1]: sshd@121-145.40.90.201:22-221.226.39.202:55910.service: Deactivated successfully. Apr 12 20:22:39.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-145.40.90.201:22-221.226.39.202:55910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:39.245193 kernel: audit: type=1131 audit(1712953359.150:497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@121-145.40.90.201:22-221.226.39.202:55910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:48.556750 systemd[1]: Started sshd@123-145.40.90.201:22-134.17.16.40:15195.service. Apr 12 20:22:48.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-145.40.90.201:22-134.17.16.40:15195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:48.650176 kernel: audit: type=1130 audit(1712953368.555:498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-145.40.90.201:22-134.17.16.40:15195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:49.530884 sshd[2548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 user=root Apr 12 20:22:49.530000 audit[2548]: USER_AUTH pid=2548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:22:49.623145 kernel: audit: type=1100 audit(1712953369.530:499): pid=2548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:22:51.148564 sshd[2548]: Failed password for root from 134.17.16.40 port 15195 ssh2 Apr 12 20:22:52.274803 sshd[2548]: Received disconnect from 134.17.16.40 port 15195:11: Bye Bye [preauth] Apr 12 20:22:52.274803 sshd[2548]: Disconnected from authenticating user root 134.17.16.40 port 15195 [preauth] Apr 12 20:22:52.277294 systemd[1]: sshd@123-145.40.90.201:22-134.17.16.40:15195.service: Deactivated successfully. Apr 12 20:22:52.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-145.40.90.201:22-134.17.16.40:15195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:52.371043 kernel: audit: type=1131 audit(1712953372.276:500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@123-145.40.90.201:22-134.17.16.40:15195 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:53.761002 systemd[1]: Started sshd@124-145.40.90.201:22-43.156.243.235:59050.service. Apr 12 20:22:53.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-145.40.90.201:22-43.156.243.235:59050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:53.853985 kernel: audit: type=1130 audit(1712953373.760:501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-145.40.90.201:22-43.156.243.235:59050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:54.787700 sshd[2552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 user=root Apr 12 20:22:54.787000 audit[2552]: USER_AUTH pid=2552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:22:54.881159 kernel: audit: type=1100 audit(1712953374.787:502): pid=2552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:22:57.090355 sshd[2552]: Failed password for root from 43.156.243.235 port 59050 ssh2 Apr 12 20:22:57.549127 sshd[2552]: Received disconnect from 43.156.243.235 port 59050:11: Bye Bye [preauth] Apr 12 20:22:57.549127 sshd[2552]: Disconnected from authenticating user root 43.156.243.235 port 59050 [preauth] Apr 12 20:22:57.551602 systemd[1]: sshd@124-145.40.90.201:22-43.156.243.235:59050.service: Deactivated successfully. Apr 12 20:22:57.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-145.40.90.201:22-43.156.243.235:59050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:57.645168 kernel: audit: type=1131 audit(1712953377.551:503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@124-145.40.90.201:22-43.156.243.235:59050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:58.097242 sshd[2462]: Timeout before authentication for 221.226.39.202 port 45846 Apr 12 20:22:58.098762 systemd[1]: sshd@103-145.40.90.201:22-221.226.39.202:45846.service: Deactivated successfully. Apr 12 20:22:58.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-145.40.90.201:22-221.226.39.202:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:22:58.193172 kernel: audit: type=1131 audit(1712953378.098:504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@103-145.40.90.201:22-221.226.39.202:45846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:00.218771 systemd[1]: Started sshd@125-145.40.90.201:22-129.226.146.101:36402.service. Apr 12 20:23:00.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-145.40.90.201:22-129.226.146.101:36402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:00.312025 kernel: audit: type=1130 audit(1712953380.217:505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-145.40.90.201:22-129.226.146.101:36402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:01.254121 sshd[2557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 user=root Apr 12 20:23:01.253000 audit[2557]: USER_AUTH pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:23:01.347181 kernel: audit: type=1100 audit(1712953381.253:506): pid=2557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:23:02.851228 sshd[2557]: Failed password for root from 129.226.146.101 port 36402 ssh2 Apr 12 20:23:03.352567 systemd[1]: Started sshd@126-145.40.90.201:22-49.65.101.245:44996.service. Apr 12 20:23:03.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-145.40.90.201:22-49.65.101.245:44996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:03.446159 kernel: audit: type=1130 audit(1712953383.351:507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-145.40.90.201:22-49.65.101.245:44996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:04.005958 sshd[2557]: Received disconnect from 129.226.146.101 port 36402:11: Bye Bye [preauth] Apr 12 20:23:04.005958 sshd[2557]: Disconnected from authenticating user root 129.226.146.101 port 36402 [preauth] Apr 12 20:23:04.008438 systemd[1]: sshd@125-145.40.90.201:22-129.226.146.101:36402.service: Deactivated successfully. Apr 12 20:23:04.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-145.40.90.201:22-129.226.146.101:36402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:04.102016 kernel: audit: type=1131 audit(1712953384.007:508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@125-145.40.90.201:22-129.226.146.101:36402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:04.168145 sshd[2560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 user=root Apr 12 20:23:04.167000 audit[2560]: USER_AUTH pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:23:04.259998 kernel: audit: type=1100 audit(1712953384.167:509): pid=2560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:23:04.413616 sshd[2469]: Timeout before authentication for 117.34.211.24 port 59392 Apr 12 20:23:04.415092 systemd[1]: sshd@105-145.40.90.201:22-117.34.211.24:59392.service: Deactivated successfully. Apr 12 20:23:04.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-145.40.90.201:22-117.34.211.24:59392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:04.514170 kernel: audit: type=1131 audit(1712953384.414:510): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@105-145.40.90.201:22-117.34.211.24:59392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:06.176240 sshd[2560]: Failed password for root from 49.65.101.245 port 44996 ssh2 Apr 12 20:23:06.280554 systemd[1]: Started sshd@127-145.40.90.201:22-46.101.14.145:38672.service. Apr 12 20:23:06.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-145.40.90.201:22-46.101.14.145:38672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:06.374185 kernel: audit: type=1130 audit(1712953386.279:511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-145.40.90.201:22-46.101.14.145:38672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:06.885740 sshd[2560]: Received disconnect from 49.65.101.245 port 44996:11: Bye Bye [preauth] Apr 12 20:23:06.885740 sshd[2560]: Disconnected from authenticating user root 49.65.101.245 port 44996 [preauth] Apr 12 20:23:06.888273 systemd[1]: sshd@126-145.40.90.201:22-49.65.101.245:44996.service: Deactivated successfully. Apr 12 20:23:06.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-145.40.90.201:22-49.65.101.245:44996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:06.982154 kernel: audit: type=1131 audit(1712953386.887:512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@126-145.40.90.201:22-49.65.101.245:44996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:07.143268 sshd[2565]: Invalid user fanjiahui from 46.101.14.145 port 38672 Apr 12 20:23:07.149501 sshd[2565]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:07.150663 sshd[2565]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:07.150758 sshd[2565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:23:07.151711 sshd[2565]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:07.150000 audit[2565]: USER_AUTH pid=2565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:23:07.251184 kernel: audit: type=1100 audit(1712953387.150:513): pid=2565 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:23:08.909481 sshd[2565]: Failed password for invalid user fanjiahui from 46.101.14.145 port 38672 ssh2 Apr 12 20:23:09.219143 sshd[2565]: Received disconnect from 46.101.14.145 port 38672:11: Bye Bye [preauth] Apr 12 20:23:09.219143 sshd[2565]: Disconnected from invalid user fanjiahui 46.101.14.145 port 38672 [preauth] Apr 12 20:23:09.221586 systemd[1]: sshd@127-145.40.90.201:22-46.101.14.145:38672.service: Deactivated successfully. Apr 12 20:23:09.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-145.40.90.201:22-46.101.14.145:38672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:09.315172 kernel: audit: type=1131 audit(1712953389.221:514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@127-145.40.90.201:22-46.101.14.145:38672 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:10.953475 systemd[1]: Started sshd@128-145.40.90.201:22-43.128.89.189:44696.service. Apr 12 20:23:10.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-145.40.90.201:22-43.128.89.189:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:11.046173 kernel: audit: type=1130 audit(1712953390.952:515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-145.40.90.201:22-43.128.89.189:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:11.972496 sshd[2570]: Invalid user tests from 43.128.89.189 port 44696 Apr 12 20:23:11.978596 sshd[2570]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:11.979715 sshd[2570]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:11.979805 sshd[2570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:23:11.980788 sshd[2570]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:11.980000 audit[2570]: USER_AUTH pid=2570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tests" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:23:12.075178 kernel: audit: type=1100 audit(1712953391.980:516): pid=2570 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="tests" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:23:13.618307 sshd[2570]: Failed password for invalid user tests from 43.128.89.189 port 44696 ssh2 Apr 12 20:23:13.839578 systemd[1]: Started sshd@129-145.40.90.201:22-43.163.220.126:34970.service. Apr 12 20:23:13.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-145.40.90.201:22-43.163.220.126:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:13.933175 kernel: audit: type=1130 audit(1712953393.838:517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-145.40.90.201:22-43.163.220.126:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:14.252015 sshd[2570]: Received disconnect from 43.128.89.189 port 44696:11: Bye Bye [preauth] Apr 12 20:23:14.252015 sshd[2570]: Disconnected from invalid user tests 43.128.89.189 port 44696 [preauth] Apr 12 20:23:14.252886 systemd[1]: sshd@128-145.40.90.201:22-43.128.89.189:44696.service: Deactivated successfully. Apr 12 20:23:14.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-145.40.90.201:22-43.128.89.189:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:14.345169 kernel: audit: type=1131 audit(1712953394.252:518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@128-145.40.90.201:22-43.128.89.189:44696 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:14.713091 sshd[2573]: Invalid user ohx from 43.163.220.126 port 34970 Apr 12 20:23:14.719112 sshd[2573]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:14.720104 sshd[2573]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:14.720189 sshd[2573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:23:14.721045 sshd[2573]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:14.720000 audit[2573]: USER_AUTH pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ohx" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:23:14.815082 kernel: audit: type=1100 audit(1712953394.720:519): pid=2573 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ohx" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:23:16.465017 systemd[1]: Started sshd@130-145.40.90.201:22-104.250.50.61:55710.service. Apr 12 20:23:16.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-145.40.90.201:22-104.250.50.61:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:16.558026 kernel: audit: type=1130 audit(1712953396.464:520): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-145.40.90.201:22-104.250.50.61:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:17.437396 sshd[2573]: Failed password for invalid user ohx from 43.163.220.126 port 34970 ssh2 Apr 12 20:23:19.310789 sshd[2573]: Received disconnect from 43.163.220.126 port 34970:11: Bye Bye [preauth] Apr 12 20:23:19.310789 sshd[2573]: Disconnected from invalid user ohx 43.163.220.126 port 34970 [preauth] Apr 12 20:23:19.313309 systemd[1]: sshd@129-145.40.90.201:22-43.163.220.126:34970.service: Deactivated successfully. Apr 12 20:23:19.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-145.40.90.201:22-43.163.220.126:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:19.407147 kernel: audit: type=1131 audit(1712953399.312:521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@129-145.40.90.201:22-43.163.220.126:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:19.421296 sshd[2577]: Invalid user l from 104.250.50.61 port 55710 Apr 12 20:23:19.422423 sshd[2577]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:19.422636 sshd[2577]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:19.422653 sshd[2577]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.250.50.61 Apr 12 20:23:19.422832 sshd[2577]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:19.421000 audit[2577]: USER_AUTH pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:23:19.514189 kernel: audit: type=1100 audit(1712953399.421:522): pid=2577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="l" exe="/usr/sbin/sshd" hostname=104.250.50.61 addr=104.250.50.61 terminal=ssh res=failed' Apr 12 20:23:20.893874 systemd[1]: Started sshd@131-145.40.90.201:22-221.226.39.202:60898.service. Apr 12 20:23:20.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-145.40.90.201:22-221.226.39.202:60898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:20.987161 kernel: audit: type=1130 audit(1712953400.892:523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@131-145.40.90.201:22-221.226.39.202:60898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:21.159279 sshd[2577]: Failed password for invalid user l from 104.250.50.61 port 55710 ssh2 Apr 12 20:23:21.841558 systemd[1]: Started sshd@132-145.40.90.201:22-219.152.174.29:40138.service. Apr 12 20:23:21.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-145.40.90.201:22-219.152.174.29:40138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:21.935158 kernel: audit: type=1130 audit(1712953401.840:524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-145.40.90.201:22-219.152.174.29:40138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:22.445152 sshd[2577]: Received disconnect from 104.250.50.61 port 55710:11: Bye Bye [preauth] Apr 12 20:23:22.445152 sshd[2577]: Disconnected from invalid user l 104.250.50.61 port 55710 [preauth] Apr 12 20:23:22.447616 systemd[1]: sshd@130-145.40.90.201:22-104.250.50.61:55710.service: Deactivated successfully. Apr 12 20:23:22.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-145.40.90.201:22-104.250.50.61:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:22.541175 kernel: audit: type=1131 audit(1712953402.447:525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@130-145.40.90.201:22-104.250.50.61:55710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:23.007848 sshd[2584]: Invalid user centos from 219.152.174.29 port 40138 Apr 12 20:23:23.013934 sshd[2584]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:23.014937 sshd[2584]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:23.015045 sshd[2584]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.152.174.29 Apr 12 20:23:23.015895 sshd[2584]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:23.015000 audit[2584]: USER_AUTH pid=2584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="centos" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:23:23.110181 kernel: audit: type=1100 audit(1712953403.015:526): pid=2584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="centos" exe="/usr/sbin/sshd" hostname=219.152.174.29 addr=219.152.174.29 terminal=ssh res=failed' Apr 12 20:23:24.633645 sshd[2584]: Failed password for invalid user centos from 219.152.174.29 port 40138 ssh2 Apr 12 20:23:25.224358 sshd[2584]: Received disconnect from 219.152.174.29 port 40138:11: Bye Bye [preauth] Apr 12 20:23:25.224358 sshd[2584]: Disconnected from invalid user centos 219.152.174.29 port 40138 [preauth] Apr 12 20:23:25.226836 systemd[1]: sshd@132-145.40.90.201:22-219.152.174.29:40138.service: Deactivated successfully. Apr 12 20:23:25.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-145.40.90.201:22-219.152.174.29:40138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:25.321178 kernel: audit: type=1131 audit(1712953405.226:527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@132-145.40.90.201:22-219.152.174.29:40138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:42.749199 systemd[1]: Started sshd@133-145.40.90.201:22-43.156.185.119:52190.service. Apr 12 20:23:42.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-145.40.90.201:22-43.156.185.119:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:42.843175 kernel: audit: type=1130 audit(1712953422.747:528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-145.40.90.201:22-43.156.185.119:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:43.768724 sshd[2589]: Invalid user test from 43.156.185.119 port 52190 Apr 12 20:23:43.774908 sshd[2589]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:43.775920 sshd[2589]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:43.776044 sshd[2589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.185.119 Apr 12 20:23:43.776949 sshd[2589]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:43.776000 audit[2589]: USER_AUTH pid=2589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:23:43.871161 kernel: audit: type=1100 audit(1712953423.776:529): pid=2589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="test" exe="/usr/sbin/sshd" hostname=43.156.185.119 addr=43.156.185.119 terminal=ssh res=failed' Apr 12 20:23:43.990635 systemd[1]: Started sshd@134-145.40.90.201:22-150.109.19.36:45182.service. Apr 12 20:23:43.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-145.40.90.201:22-150.109.19.36:45182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:44.085172 kernel: audit: type=1130 audit(1712953423.989:530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-145.40.90.201:22-150.109.19.36:45182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:44.974675 sshd[2592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.19.36 user=root Apr 12 20:23:44.973000 audit[2592]: USER_AUTH pid=2592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:23:45.068043 kernel: audit: type=1100 audit(1712953424.973:531): pid=2592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=150.109.19.36 addr=150.109.19.36 terminal=ssh res=failed' Apr 12 20:23:45.214866 sshd[2499]: Timeout before authentication for 221.226.39.202 port 50850 Apr 12 20:23:45.216429 systemd[1]: sshd@112-145.40.90.201:22-221.226.39.202:50850.service: Deactivated successfully. Apr 12 20:23:45.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-145.40.90.201:22-221.226.39.202:50850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:45.311166 kernel: audit: type=1131 audit(1712953425.215:532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@112-145.40.90.201:22-221.226.39.202:50850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:45.474850 sshd[2589]: Failed password for invalid user test from 43.156.185.119 port 52190 ssh2 Apr 12 20:23:47.144194 sshd[2592]: Failed password for root from 150.109.19.36 port 45182 ssh2 Apr 12 20:23:47.263002 sshd[2589]: Received disconnect from 43.156.185.119 port 52190:11: Bye Bye [preauth] Apr 12 20:23:47.263002 sshd[2589]: Disconnected from invalid user test 43.156.185.119 port 52190 [preauth] Apr 12 20:23:47.265544 systemd[1]: sshd@133-145.40.90.201:22-43.156.185.119:52190.service: Deactivated successfully. Apr 12 20:23:47.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-145.40.90.201:22-43.156.185.119:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:47.314632 systemd[1]: Started sshd@135-145.40.90.201:22-124.156.205.16:35582.service. Apr 12 20:23:47.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-145.40.90.201:22-124.156.205.16:35582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:47.450496 kernel: audit: type=1131 audit(1712953427.266:533): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@133-145.40.90.201:22-43.156.185.119:52190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:47.450578 kernel: audit: type=1130 audit(1712953427.314:534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-145.40.90.201:22-124.156.205.16:35582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:47.720628 sshd[2592]: Received disconnect from 150.109.19.36 port 45182:11: Bye Bye [preauth] Apr 12 20:23:47.720628 sshd[2592]: Disconnected from authenticating user root 150.109.19.36 port 45182 [preauth] Apr 12 20:23:47.723227 systemd[1]: sshd@134-145.40.90.201:22-150.109.19.36:45182.service: Deactivated successfully. Apr 12 20:23:47.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-145.40.90.201:22-150.109.19.36:45182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:47.817192 kernel: audit: type=1131 audit(1712953427.723:535): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@134-145.40.90.201:22-150.109.19.36:45182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:48.124277 systemd[1]: Started sshd@136-145.40.90.201:22-43.128.225.10:42932.service. Apr 12 20:23:48.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-145.40.90.201:22-43.128.225.10:42932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:48.217149 kernel: audit: type=1130 audit(1712953428.123:536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-145.40.90.201:22-43.128.225.10:42932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:48.339918 sshd[2597]: Invalid user www from 124.156.205.16 port 35582 Apr 12 20:23:48.346050 sshd[2597]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:48.347036 sshd[2597]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:48.347123 sshd[2597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.205.16 Apr 12 20:23:48.347963 sshd[2597]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:48.347000 audit[2597]: USER_AUTH pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:23:48.448064 kernel: audit: type=1100 audit(1712953428.347:537): pid=2597 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="www" exe="/usr/sbin/sshd" hostname=124.156.205.16 addr=124.156.205.16 terminal=ssh res=failed' Apr 12 20:23:48.823686 sshd[2603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.225.10 user=root Apr 12 20:23:48.822000 audit[2603]: USER_AUTH pid=2603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:23:48.917053 kernel: audit: type=1100 audit(1712953428.822:538): pid=2603 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.128.225.10 addr=43.128.225.10 terminal=ssh res=failed' Apr 12 20:23:49.321896 systemd[1]: Started sshd@137-145.40.90.201:22-134.17.16.40:15196.service. Apr 12 20:23:49.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-145.40.90.201:22-134.17.16.40:15196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:49.415098 kernel: audit: type=1130 audit(1712953429.320:539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-145.40.90.201:22-134.17.16.40:15196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:50.381031 sshd[2606]: Invalid user fanjiahui from 134.17.16.40 port 15196 Apr 12 20:23:50.387164 sshd[2606]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:50.388246 sshd[2606]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:23:50.388339 sshd[2606]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.17.16.40 Apr 12 20:23:50.389384 sshd[2606]: pam_faillock(sshd:auth): User unknown Apr 12 20:23:50.388000 audit[2606]: USER_AUTH pid=2606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:23:50.484163 kernel: audit: type=1100 audit(1712953430.388:540): pid=2606 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fanjiahui" exe="/usr/sbin/sshd" hostname=134.17.16.40 addr=134.17.16.40 terminal=ssh res=failed' Apr 12 20:23:50.733191 sshd[2597]: Failed password for invalid user www from 124.156.205.16 port 35582 ssh2 Apr 12 20:23:51.209021 sshd[2603]: Failed password for root from 43.128.225.10 port 42932 ssh2 Apr 12 20:23:51.515565 sshd[2603]: Received disconnect from 43.128.225.10 port 42932:11: Bye Bye [preauth] Apr 12 20:23:51.515565 sshd[2603]: Disconnected from authenticating user root 43.128.225.10 port 42932 [preauth] Apr 12 20:23:51.517914 systemd[1]: sshd@136-145.40.90.201:22-43.128.225.10:42932.service: Deactivated successfully. Apr 12 20:23:51.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-145.40.90.201:22-43.128.225.10:42932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:51.612173 kernel: audit: type=1131 audit(1712953431.518:541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@136-145.40.90.201:22-43.128.225.10:42932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:51.614319 sshd[2597]: Received disconnect from 124.156.205.16 port 35582:11: Bye Bye [preauth] Apr 12 20:23:51.614319 sshd[2597]: Disconnected from invalid user www 124.156.205.16 port 35582 [preauth] Apr 12 20:23:51.614750 systemd[1]: sshd@135-145.40.90.201:22-124.156.205.16:35582.service: Deactivated successfully. Apr 12 20:23:51.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-145.40.90.201:22-124.156.205.16:35582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:51.708178 kernel: audit: type=1131 audit(1712953431.614:542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@135-145.40.90.201:22-124.156.205.16:35582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:52.714409 sshd[2606]: Failed password for invalid user fanjiahui from 134.17.16.40 port 15196 ssh2 Apr 12 20:23:54.421476 sshd[2606]: Received disconnect from 134.17.16.40 port 15196:11: Bye Bye [preauth] Apr 12 20:23:54.421476 sshd[2606]: Disconnected from invalid user fanjiahui 134.17.16.40 port 15196 [preauth] Apr 12 20:23:54.424001 systemd[1]: sshd@137-145.40.90.201:22-134.17.16.40:15196.service: Deactivated successfully. Apr 12 20:23:54.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-145.40.90.201:22-134.17.16.40:15196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:23:54.517169 kernel: audit: type=1131 audit(1712953434.423:543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@137-145.40.90.201:22-134.17.16.40:15196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:04.947492 systemd[1]: Started sshd@138-145.40.90.201:22-221.226.39.202:1267.service. Apr 12 20:24:04.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-145.40.90.201:22-221.226.39.202:1267 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:05.040191 kernel: audit: type=1130 audit(1712953444.946:544): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-145.40.90.201:22-221.226.39.202:1267 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:06.572750 systemd[1]: Started sshd@139-145.40.90.201:22-46.101.14.145:60036.service. Apr 12 20:24:06.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-145.40.90.201:22-46.101.14.145:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:06.666172 kernel: audit: type=1130 audit(1712953446.571:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-145.40.90.201:22-46.101.14.145:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:06.770829 sshd[2612]: Invalid user ubuntu from 221.226.39.202 port 1267 Apr 12 20:24:06.775589 sshd[2612]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:06.776528 sshd[2612]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:06.776607 sshd[2612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.39.202 Apr 12 20:24:06.777591 sshd[2612]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:06.776000 audit[2612]: USER_AUTH pid=2612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:24:06.877044 kernel: audit: type=1100 audit(1712953446.776:546): pid=2612 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=221.226.39.202 addr=221.226.39.202 terminal=ssh res=failed' Apr 12 20:24:07.424541 sshd[2615]: Invalid user user1 from 46.101.14.145 port 60036 Apr 12 20:24:07.430799 sshd[2615]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:07.431843 sshd[2615]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:07.431934 sshd[2615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.14.145 Apr 12 20:24:07.432868 sshd[2615]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:07.432000 audit[2615]: USER_AUTH pid=2615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:24:07.526164 kernel: audit: type=1100 audit(1712953447.432:547): pid=2615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=46.101.14.145 addr=46.101.14.145 terminal=ssh res=failed' Apr 12 20:24:08.299674 sshd[2612]: Failed password for invalid user ubuntu from 221.226.39.202 port 1267 ssh2 Apr 12 20:24:09.149328 sshd[2612]: Received disconnect from 221.226.39.202 port 1267:11: Bye Bye [preauth] Apr 12 20:24:09.149328 sshd[2612]: Disconnected from invalid user ubuntu 221.226.39.202 port 1267 [preauth] Apr 12 20:24:09.151783 systemd[1]: sshd@138-145.40.90.201:22-221.226.39.202:1267.service: Deactivated successfully. Apr 12 20:24:09.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-145.40.90.201:22-221.226.39.202:1267 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:09.245170 kernel: audit: type=1131 audit(1712953449.151:548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@138-145.40.90.201:22-221.226.39.202:1267 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:09.426745 sshd[2615]: Failed password for invalid user user1 from 46.101.14.145 port 60036 ssh2 Apr 12 20:24:10.345709 sshd[2615]: Received disconnect from 46.101.14.145 port 60036:11: Bye Bye [preauth] Apr 12 20:24:10.345709 sshd[2615]: Disconnected from invalid user user1 46.101.14.145 port 60036 [preauth] Apr 12 20:24:10.348284 systemd[1]: sshd@139-145.40.90.201:22-46.101.14.145:60036.service: Deactivated successfully. Apr 12 20:24:10.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-145.40.90.201:22-46.101.14.145:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:10.442204 kernel: audit: type=1131 audit(1712953450.347:549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@139-145.40.90.201:22-46.101.14.145:60036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:18.946090 systemd[1]: Started sshd@140-145.40.90.201:22-43.128.89.189:37936.service. Apr 12 20:24:18.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-145.40.90.201:22-43.128.89.189:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:19.039005 kernel: audit: type=1130 audit(1712953458.945:550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-145.40.90.201:22-43.128.89.189:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:19.943496 sshd[2620]: Invalid user user1 from 43.128.89.189 port 37936 Apr 12 20:24:19.949596 sshd[2620]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:19.950687 sshd[2620]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:19.950778 sshd[2620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.128.89.189 Apr 12 20:24:19.951741 sshd[2620]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:19.950000 audit[2620]: USER_AUTH pid=2620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:24:20.045192 kernel: audit: type=1100 audit(1712953459.950:551): pid=2620 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user1" exe="/usr/sbin/sshd" hostname=43.128.89.189 addr=43.128.89.189 terminal=ssh res=failed' Apr 12 20:24:20.891783 systemd[1]: Started sshd@141-145.40.90.201:22-43.163.220.126:56448.service. Apr 12 20:24:20.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-145.40.90.201:22-43.163.220.126:56448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:20.985174 kernel: audit: type=1130 audit(1712953460.890:552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-145.40.90.201:22-43.163.220.126:56448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:21.810552 sshd[2623]: Invalid user mfb from 43.163.220.126 port 56448 Apr 12 20:24:21.816720 sshd[2623]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:21.817722 sshd[2623]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:21.817813 sshd[2623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.163.220.126 Apr 12 20:24:21.818755 sshd[2623]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:21.817000 audit[2623]: USER_AUTH pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mfb" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:24:21.913057 kernel: audit: type=1100 audit(1712953461.817:553): pid=2623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="mfb" exe="/usr/sbin/sshd" hostname=43.163.220.126 addr=43.163.220.126 terminal=ssh res=failed' Apr 12 20:24:21.925255 sshd[2620]: Failed password for invalid user user1 from 43.128.89.189 port 37936 ssh2 Apr 12 20:24:22.887097 sshd[2620]: Received disconnect from 43.128.89.189 port 37936:11: Bye Bye [preauth] Apr 12 20:24:22.887097 sshd[2620]: Disconnected from invalid user user1 43.128.89.189 port 37936 [preauth] Apr 12 20:24:22.889570 systemd[1]: sshd@140-145.40.90.201:22-43.128.89.189:37936.service: Deactivated successfully. Apr 12 20:24:22.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-145.40.90.201:22-43.128.89.189:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:22.983035 kernel: audit: type=1131 audit(1712953462.889:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@140-145.40.90.201:22-43.128.89.189:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:23.732285 sshd[2623]: Failed password for invalid user mfb from 43.163.220.126 port 56448 ssh2 Apr 12 20:24:24.932911 systemd[1]: Started sshd@142-145.40.90.201:22-43.156.243.235:55374.service. Apr 12 20:24:24.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-145.40.90.201:22-43.156.243.235:55374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:25.026179 kernel: audit: type=1130 audit(1712953464.932:555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-145.40.90.201:22-43.156.243.235:55374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:25.362501 systemd[1]: Started sshd@143-145.40.90.201:22-49.65.101.245:49388.service. Apr 12 20:24:25.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-145.40.90.201:22-49.65.101.245:49388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:25.456181 kernel: audit: type=1130 audit(1712953465.361:556): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-145.40.90.201:22-49.65.101.245:49388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:25.551326 sshd[2623]: Received disconnect from 43.163.220.126 port 56448:11: Bye Bye [preauth] Apr 12 20:24:25.551326 sshd[2623]: Disconnected from invalid user mfb 43.163.220.126 port 56448 [preauth] Apr 12 20:24:25.552915 systemd[1]: sshd@141-145.40.90.201:22-43.163.220.126:56448.service: Deactivated successfully. Apr 12 20:24:25.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-145.40.90.201:22-43.163.220.126:56448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:25.645149 kernel: audit: type=1131 audit(1712953465.552:557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@141-145.40.90.201:22-43.163.220.126:56448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:25.956170 sshd[2627]: Invalid user work from 43.156.243.235 port 55374 Apr 12 20:24:25.962168 sshd[2627]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:25.963257 sshd[2627]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:25.963349 sshd[2627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.243.235 Apr 12 20:24:25.964374 sshd[2627]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:25.963000 audit[2627]: USER_AUTH pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="work" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:24:26.064194 kernel: audit: type=1100 audit(1712953465.963:558): pid=2627 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="work" exe="/usr/sbin/sshd" hostname=43.156.243.235 addr=43.156.243.235 terminal=ssh res=failed' Apr 12 20:24:26.183644 sshd[2630]: Invalid user user from 49.65.101.245 port 49388 Apr 12 20:24:26.188627 sshd[2630]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:26.189640 sshd[2630]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:26.189722 sshd[2630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.65.101.245 Apr 12 20:24:26.190648 sshd[2630]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:26.189000 audit[2630]: USER_AUTH pid=2630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:24:26.286178 kernel: audit: type=1100 audit(1712953466.189:559): pid=2630 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="user" exe="/usr/sbin/sshd" hostname=49.65.101.245 addr=49.65.101.245 terminal=ssh res=failed' Apr 12 20:24:27.762421 sshd[2627]: Failed password for invalid user work from 43.156.243.235 port 55374 ssh2 Apr 12 20:24:28.188032 sshd[2627]: Received disconnect from 43.156.243.235 port 55374:11: Bye Bye [preauth] Apr 12 20:24:28.188032 sshd[2627]: Disconnected from invalid user work 43.156.243.235 port 55374 [preauth] Apr 12 20:24:28.190489 systemd[1]: sshd@142-145.40.90.201:22-43.156.243.235:55374.service: Deactivated successfully. Apr 12 20:24:28.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-145.40.90.201:22-43.156.243.235:55374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:28.285173 kernel: audit: type=1131 audit(1712953468.189:560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@142-145.40.90.201:22-43.156.243.235:55374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:28.460328 sshd[2630]: Failed password for invalid user user from 49.65.101.245 port 49388 ssh2 Apr 12 20:24:29.380439 sshd[2630]: Received disconnect from 49.65.101.245 port 49388:11: Bye Bye [preauth] Apr 12 20:24:29.380439 sshd[2630]: Disconnected from invalid user user 49.65.101.245 port 49388 [preauth] Apr 12 20:24:29.382996 systemd[1]: sshd@143-145.40.90.201:22-49.65.101.245:49388.service: Deactivated successfully. Apr 12 20:24:29.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-145.40.90.201:22-49.65.101.245:49388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:29.477080 kernel: audit: type=1131 audit(1712953469.382:561): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@143-145.40.90.201:22-49.65.101.245:49388 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:29.822162 systemd[1]: Started sshd@144-145.40.90.201:22-129.226.146.101:60822.service. Apr 12 20:24:29.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-145.40.90.201:22-129.226.146.101:60822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:29.916049 kernel: audit: type=1130 audit(1712953469.821:562): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-145.40.90.201:22-129.226.146.101:60822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:30.835460 sshd[2637]: Invalid user ubuntu from 129.226.146.101 port 60822 Apr 12 20:24:30.841530 sshd[2637]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:30.842723 sshd[2637]: pam_unix(sshd:auth): check pass; user unknown Apr 12 20:24:30.842818 sshd[2637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.146.101 Apr 12 20:24:30.843783 sshd[2637]: pam_faillock(sshd:auth): User unknown Apr 12 20:24:30.842000 audit[2637]: USER_AUTH pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:24:30.937195 kernel: audit: type=1100 audit(1712953470.842:563): pid=2637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubuntu" exe="/usr/sbin/sshd" hostname=129.226.146.101 addr=129.226.146.101 terminal=ssh res=failed' Apr 12 20:24:32.325801 sshd[2637]: Failed password for invalid user ubuntu from 129.226.146.101 port 60822 ssh2 Apr 12 20:24:33.233225 sshd[2637]: Received disconnect from 129.226.146.101 port 60822:11: Bye Bye [preauth] Apr 12 20:24:33.233225 sshd[2637]: Disconnected from invalid user ubuntu 129.226.146.101 port 60822 [preauth] Apr 12 20:24:33.235746 systemd[1]: sshd@144-145.40.90.201:22-129.226.146.101:60822.service: Deactivated successfully. Apr 12 20:24:33.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-145.40.90.201:22-129.226.146.101:60822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 20:24:33.330087 kernel: audit: type=1131 audit(1712953473.235:564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@144-145.40.90.201:22-129.226.146.101:60822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'