Jul  2 07:54:31.129542 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024
Jul  2 07:54:31.129577 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82
Jul  2 07:54:31.129593 kernel: BIOS-provided physical RAM map:
Jul  2 07:54:31.129605 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
Jul  2 07:54:31.129616 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
Jul  2 07:54:31.129627 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
Jul  2 07:54:31.129644 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007d9e9fff] usable
Jul  2 07:54:31.129656 kernel: BIOS-e820: [mem 0x000000007d9ea000-0x000000007fffffff] reserved
Jul  2 07:54:31.129668 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000e03fffff] reserved
Jul  2 07:54:31.129679 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
Jul  2 07:54:31.129692 kernel: NX (Execute Disable) protection: active
Jul  2 07:54:31.129701 kernel: SMBIOS 2.7 present.
Jul  2 07:54:31.129712 kernel: DMI: Amazon EC2 t3.small/, BIOS 1.0 10/16/2017
Jul  2 07:54:31.129723 kernel: Hypervisor detected: KVM
Jul  2 07:54:31.129741 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00
Jul  2 07:54:31.129754 kernel: kvm-clock: cpu 0, msr 58192001, primary cpu clock
Jul  2 07:54:31.129767 kernel: kvm-clock: using sched offset of 6583767791 cycles
Jul  2 07:54:31.129781 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Jul  2 07:54:31.129794 kernel: tsc: Detected 2499.998 MHz processor
Jul  2 07:54:31.129807 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Jul  2 07:54:31.129823 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Jul  2 07:54:31.129835 kernel: last_pfn = 0x7d9ea max_arch_pfn = 0x400000000
Jul  2 07:54:31.129847 kernel: x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
Jul  2 07:54:31.129859 kernel: Using GB pages for direct mapping
Jul  2 07:54:31.129871 kernel: ACPI: Early table checksum verification disabled
Jul  2 07:54:31.129884 kernel: ACPI: RSDP 0x00000000000F8F40 000014 (v00 AMAZON)
Jul  2 07:54:31.129897 kernel: ACPI: RSDT 0x000000007D9EE350 000044 (v01 AMAZON AMZNRSDT 00000001 AMZN 00000001)
Jul  2 07:54:31.129911 kernel: ACPI: FACP 0x000000007D9EFF80 000074 (v01 AMAZON AMZNFACP 00000001 AMZN 00000001)
Jul  2 07:54:31.129925 kernel: ACPI: DSDT 0x000000007D9EE3A0 0010E9 (v01 AMAZON AMZNDSDT 00000001 AMZN 00000001)
Jul  2 07:54:31.129941 kernel: ACPI: FACS 0x000000007D9EFF40 000040
Jul  2 07:54:31.129955 kernel: ACPI: SSDT 0x000000007D9EF6C0 00087A (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Jul  2 07:54:31.129969 kernel: ACPI: APIC 0x000000007D9EF5D0 000076 (v01 AMAZON AMZNAPIC 00000001 AMZN 00000001)
Jul  2 07:54:31.129983 kernel: ACPI: SRAT 0x000000007D9EF530 0000A0 (v01 AMAZON AMZNSRAT 00000001 AMZN 00000001)
Jul  2 07:54:31.129997 kernel: ACPI: SLIT 0x000000007D9EF4C0 00006C (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001)
Jul  2 07:54:31.130011 kernel: ACPI: WAET 0x000000007D9EF490 000028 (v01 AMAZON AMZNWAET 00000001 AMZN 00000001)
Jul  2 07:54:31.130025 kernel: ACPI: HPET 0x00000000000C9000 000038 (v01 AMAZON AMZNHPET 00000001 AMZN 00000001)
Jul  2 07:54:31.130038 kernel: ACPI: SSDT 0x00000000000C9040 00007B (v01 AMAZON AMZNSSDT 00000001 AMZN 00000001)
Jul  2 07:54:31.130054 kernel: ACPI: Reserving FACP table memory at [mem 0x7d9eff80-0x7d9efff3]
Jul  2 07:54:31.130067 kernel: ACPI: Reserving DSDT table memory at [mem 0x7d9ee3a0-0x7d9ef488]
Jul  2 07:54:31.130080 kernel: ACPI: Reserving FACS table memory at [mem 0x7d9eff40-0x7d9eff7f]
Jul  2 07:54:31.130098 kernel: ACPI: Reserving SSDT table memory at [mem 0x7d9ef6c0-0x7d9eff39]
Jul  2 07:54:31.130112 kernel: ACPI: Reserving APIC table memory at [mem 0x7d9ef5d0-0x7d9ef645]
Jul  2 07:54:31.130126 kernel: ACPI: Reserving SRAT table memory at [mem 0x7d9ef530-0x7d9ef5cf]
Jul  2 07:54:31.130140 kernel: ACPI: Reserving SLIT table memory at [mem 0x7d9ef4c0-0x7d9ef52b]
Jul  2 07:54:31.130157 kernel: ACPI: Reserving WAET table memory at [mem 0x7d9ef490-0x7d9ef4b7]
Jul  2 07:54:31.130170 kernel: ACPI: Reserving HPET table memory at [mem 0xc9000-0xc9037]
Jul  2 07:54:31.130184 kernel: ACPI: Reserving SSDT table memory at [mem 0xc9040-0xc90ba]
Jul  2 07:54:31.130198 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0
Jul  2 07:54:31.130212 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0
Jul  2 07:54:31.130226 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x7fffffff]
Jul  2 07:54:31.130240 kernel: NUMA: Initialized distance table, cnt=1
Jul  2 07:54:31.130253 kernel: NODE_DATA(0) allocated [mem 0x7d9e3000-0x7d9e8fff]
Jul  2 07:54:31.130270 kernel: Zone ranges:
Jul  2 07:54:31.130284 kernel:   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
Jul  2 07:54:31.130320 kernel:   DMA32    [mem 0x0000000001000000-0x000000007d9e9fff]
Jul  2 07:54:31.130334 kernel:   Normal   empty
Jul  2 07:54:31.130347 kernel: Movable zone start for each node
Jul  2 07:54:31.130361 kernel: Early memory node ranges
Jul  2 07:54:31.130376 kernel:   node   0: [mem 0x0000000000001000-0x000000000009efff]
Jul  2 07:54:31.130390 kernel:   node   0: [mem 0x0000000000100000-0x000000007d9e9fff]
Jul  2 07:54:31.130404 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007d9e9fff]
Jul  2 07:54:31.130421 kernel: On node 0, zone DMA: 1 pages in unavailable ranges
Jul  2 07:54:31.130435 kernel: On node 0, zone DMA: 97 pages in unavailable ranges
Jul  2 07:54:31.130449 kernel: On node 0, zone DMA32: 9750 pages in unavailable ranges
Jul  2 07:54:31.130464 kernel: ACPI: PM-Timer IO Port: 0xb008
Jul  2 07:54:31.130478 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
Jul  2 07:54:31.130492 kernel: IOAPIC[0]: apic_id 0, version 32, address 0xfec00000, GSI 0-23
Jul  2 07:54:31.130506 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
Jul  2 07:54:31.130520 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
Jul  2 07:54:31.130534 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
Jul  2 07:54:31.130552 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
Jul  2 07:54:31.130567 kernel: ACPI: Using ACPI (MADT) for SMP configuration information
Jul  2 07:54:31.130581 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000
Jul  2 07:54:31.130592 kernel: TSC deadline timer available
Jul  2 07:54:31.130605 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs
Jul  2 07:54:31.130620 kernel: [mem 0x80000000-0xdfffffff] available for PCI devices
Jul  2 07:54:31.130635 kernel: Booting paravirtualized kernel on KVM
Jul  2 07:54:31.130650 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
Jul  2 07:54:31.130666 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
Jul  2 07:54:31.130684 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576
Jul  2 07:54:31.130699 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152
Jul  2 07:54:31.130714 kernel: pcpu-alloc: [0] 0 1 
Jul  2 07:54:31.130728 kernel: kvm-guest: stealtime: cpu 0, msr 7b61c0c0
Jul  2 07:54:31.130742 kernel: kvm-guest: PV spinlocks enabled
Jul  2 07:54:31.130756 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear)
Jul  2 07:54:31.130770 kernel: Built 1 zonelists, mobility grouping on.  Total pages: 506242
Jul  2 07:54:31.130784 kernel: Policy zone: DMA32
Jul  2 07:54:31.130800 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82
Jul  2 07:54:31.130818 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space.
Jul  2 07:54:31.130832 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
Jul  2 07:54:31.130846 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
Jul  2 07:54:31.130859 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off
Jul  2 07:54:31.130874 kernel: Memory: 1934420K/2057760K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 123080K reserved, 0K cma-reserved)
Jul  2 07:54:31.130888 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Jul  2 07:54:31.130902 kernel: Kernel/User page tables isolation: enabled
Jul  2 07:54:31.130916 kernel: ftrace: allocating 34514 entries in 135 pages
Jul  2 07:54:31.130934 kernel: ftrace: allocated 135 pages with 4 groups
Jul  2 07:54:31.130949 kernel: rcu: Hierarchical RCU implementation.
Jul  2 07:54:31.130964 kernel: rcu:         RCU event tracing is enabled.
Jul  2 07:54:31.130978 kernel: rcu:         RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
Jul  2 07:54:31.130992 kernel:         Rude variant of Tasks RCU enabled.
Jul  2 07:54:31.131006 kernel:         Tracing variant of Tasks RCU enabled.
Jul  2 07:54:31.131020 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
Jul  2 07:54:31.131035 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2
Jul  2 07:54:31.131049 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16
Jul  2 07:54:31.131065 kernel: random: crng init done
Jul  2 07:54:31.131079 kernel: Console: colour VGA+ 80x25
Jul  2 07:54:31.131093 kernel: printk: console [ttyS0] enabled
Jul  2 07:54:31.131107 kernel: ACPI: Core revision 20210730
Jul  2 07:54:31.131122 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 30580167144 ns
Jul  2 07:54:31.131136 kernel: APIC: Switch to symmetric I/O mode setup
Jul  2 07:54:31.131151 kernel: x2apic enabled
Jul  2 07:54:31.131165 kernel: Switched APIC routing to physical x2apic.
Jul  2 07:54:31.131179 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns
Jul  2 07:54:31.131198 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998)
Jul  2 07:54:31.131213 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Jul  2 07:54:31.131237 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Jul  2 07:54:31.131252 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Jul  2 07:54:31.131277 kernel: Spectre V2 : Mitigation: Retpolines
Jul  2 07:54:31.131311 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
Jul  2 07:54:31.131326 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
Jul  2 07:54:31.131341 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible!
Jul  2 07:54:31.131356 kernel: RETBleed: Vulnerable
Jul  2 07:54:31.131371 kernel: Speculative Store Bypass: Vulnerable
Jul  2 07:54:31.131385 kernel: MDS: Vulnerable: Clear CPU buffers attempted, no microcode
Jul  2 07:54:31.131400 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode
Jul  2 07:54:31.131414 kernel: GDS: Unknown: Dependent on hypervisor status
Jul  2 07:54:31.131428 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Jul  2 07:54:31.131446 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Jul  2 07:54:31.131461 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Jul  2 07:54:31.131475 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
Jul  2 07:54:31.131491 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
Jul  2 07:54:31.131506 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
Jul  2 07:54:31.131525 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
Jul  2 07:54:31.131541 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
Jul  2 07:54:31.131557 kernel: x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
Jul  2 07:54:31.131573 kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Jul  2 07:54:31.131588 kernel: x86/fpu: xstate_offset[3]:  832, xstate_sizes[3]:   64
Jul  2 07:54:31.131603 kernel: x86/fpu: xstate_offset[4]:  896, xstate_sizes[4]:   64
Jul  2 07:54:31.131619 kernel: x86/fpu: xstate_offset[5]:  960, xstate_sizes[5]:   64
Jul  2 07:54:31.131634 kernel: x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]:  512
Jul  2 07:54:31.131650 kernel: x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
Jul  2 07:54:31.131665 kernel: x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]:    8
Jul  2 07:54:31.131680 kernel: x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format.
Jul  2 07:54:31.131696 kernel: Freeing SMP alternatives memory: 32K
Jul  2 07:54:31.131713 kernel: pid_max: default: 32768 minimum: 301
Jul  2 07:54:31.131727 kernel: LSM: Security Framework initializing
Jul  2 07:54:31.131742 kernel: SELinux:  Initializing.
Jul  2 07:54:31.131757 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Jul  2 07:54:31.131772 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear)
Jul  2 07:54:31.131787 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8259CL CPU @ 2.50GHz (family: 0x6, model: 0x55, stepping: 0x7)
Jul  2 07:54:31.131802 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only.
Jul  2 07:54:31.131817 kernel: signal: max sigframe size: 3632
Jul  2 07:54:31.131832 kernel: rcu: Hierarchical SRCU implementation.
Jul  2 07:54:31.131846 kernel: NMI watchdog: Perf NMI watchdog permanently disabled
Jul  2 07:54:31.131864 kernel: smp: Bringing up secondary CPUs ...
Jul  2 07:54:31.131879 kernel: x86: Booting SMP configuration:
Jul  2 07:54:31.131893 kernel: .... node  #0, CPUs:      #1
Jul  2 07:54:31.131908 kernel: kvm-clock: cpu 1, msr 58192041, secondary cpu clock
Jul  2 07:54:31.131923 kernel: kvm-guest: stealtime: cpu 1, msr 7b71c0c0
Jul  2 07:54:31.131939 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
Jul  2 07:54:31.131955 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
Jul  2 07:54:31.131970 kernel: smp: Brought up 1 node, 2 CPUs
Jul  2 07:54:31.131985 kernel: smpboot: Max logical packages: 1
Jul  2 07:54:31.132004 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS)
Jul  2 07:54:31.132019 kernel: devtmpfs: initialized
Jul  2 07:54:31.132034 kernel: x86/mm: Memory block size: 128MB
Jul  2 07:54:31.132050 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
Jul  2 07:54:31.132065 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear)
Jul  2 07:54:31.132080 kernel: pinctrl core: initialized pinctrl subsystem
Jul  2 07:54:31.132095 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family
Jul  2 07:54:31.132110 kernel: audit: initializing netlink subsys (disabled)
Jul  2 07:54:31.132211 kernel: audit: type=2000 audit(1719906870.765:1): state=initialized audit_enabled=0 res=1
Jul  2 07:54:31.132229 kernel: thermal_sys: Registered thermal governor 'step_wise'
Jul  2 07:54:31.132244 kernel: thermal_sys: Registered thermal governor 'user_space'
Jul  2 07:54:31.132258 kernel: cpuidle: using governor menu
Jul  2 07:54:31.132273 kernel: ACPI: bus type PCI registered
Jul  2 07:54:31.132326 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
Jul  2 07:54:31.132341 kernel: dca service started, version 1.12.1
Jul  2 07:54:31.132356 kernel: PCI: Using configuration type 1 for base access
Jul  2 07:54:31.132371 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
Jul  2 07:54:31.132386 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages
Jul  2 07:54:31.132404 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages
Jul  2 07:54:31.132419 kernel: ACPI: Added _OSI(Module Device)
Jul  2 07:54:31.132434 kernel: ACPI: Added _OSI(Processor Device)
Jul  2 07:54:31.132448 kernel: ACPI: Added _OSI(3.0 _SCP Extensions)
Jul  2 07:54:31.132463 kernel: ACPI: Added _OSI(Processor Aggregator Device)
Jul  2 07:54:31.132478 kernel: ACPI: Added _OSI(Linux-Dell-Video)
Jul  2 07:54:31.132492 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio)
Jul  2 07:54:31.132507 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics)
Jul  2 07:54:31.132522 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded
Jul  2 07:54:31.132539 kernel: ACPI: Interpreter enabled
Jul  2 07:54:31.132554 kernel: ACPI: PM: (supports S0 S5)
Jul  2 07:54:31.132569 kernel: ACPI: Using IOAPIC for interrupt routing
Jul  2 07:54:31.132584 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
Jul  2 07:54:31.132598 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F
Jul  2 07:54:31.132613 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
Jul  2 07:54:31.132808 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3]
Jul  2 07:54:31.132939 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
Jul  2 07:54:31.132963 kernel: acpiphp: Slot [3] registered
Jul  2 07:54:31.132978 kernel: acpiphp: Slot [4] registered
Jul  2 07:54:31.132993 kernel: acpiphp: Slot [5] registered
Jul  2 07:54:31.133008 kernel: acpiphp: Slot [6] registered
Jul  2 07:54:31.133023 kernel: acpiphp: Slot [7] registered
Jul  2 07:54:31.133037 kernel: acpiphp: Slot [8] registered
Jul  2 07:54:31.133052 kernel: acpiphp: Slot [9] registered
Jul  2 07:54:31.133067 kernel: acpiphp: Slot [10] registered
Jul  2 07:54:31.133081 kernel: acpiphp: Slot [11] registered
Jul  2 07:54:31.133098 kernel: acpiphp: Slot [12] registered
Jul  2 07:54:31.133113 kernel: acpiphp: Slot [13] registered
Jul  2 07:54:31.133127 kernel: acpiphp: Slot [14] registered
Jul  2 07:54:31.133142 kernel: acpiphp: Slot [15] registered
Jul  2 07:54:31.133157 kernel: acpiphp: Slot [16] registered
Jul  2 07:54:31.133172 kernel: acpiphp: Slot [17] registered
Jul  2 07:54:31.133187 kernel: acpiphp: Slot [18] registered
Jul  2 07:54:31.133201 kernel: acpiphp: Slot [19] registered
Jul  2 07:54:31.133216 kernel: acpiphp: Slot [20] registered
Jul  2 07:54:31.133233 kernel: acpiphp: Slot [21] registered
Jul  2 07:54:31.133248 kernel: acpiphp: Slot [22] registered
Jul  2 07:54:31.133263 kernel: acpiphp: Slot [23] registered
Jul  2 07:54:31.133277 kernel: acpiphp: Slot [24] registered
Jul  2 07:54:31.133304 kernel: acpiphp: Slot [25] registered
Jul  2 07:54:31.133318 kernel: acpiphp: Slot [26] registered
Jul  2 07:54:31.133333 kernel: acpiphp: Slot [27] registered
Jul  2 07:54:31.133348 kernel: acpiphp: Slot [28] registered
Jul  2 07:54:31.133362 kernel: acpiphp: Slot [29] registered
Jul  2 07:54:31.133377 kernel: acpiphp: Slot [30] registered
Jul  2 07:54:31.133394 kernel: acpiphp: Slot [31] registered
Jul  2 07:54:31.133409 kernel: PCI host bridge to bus 0000:00
Jul  2 07:54:31.133534 kernel: pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
Jul  2 07:54:31.133645 kernel: pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
Jul  2 07:54:31.133758 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
Jul  2 07:54:31.133871 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window]
Jul  2 07:54:31.133984 kernel: pci_bus 0000:00: root bus resource [bus 00-ff]
Jul  2 07:54:31.134128 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
Jul  2 07:54:31.134266 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
Jul  2 07:54:31.134418 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x000000
Jul  2 07:54:31.134549 kernel: pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
Jul  2 07:54:31.134675 kernel: pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
Jul  2 07:54:31.134802 kernel: pci 0000:00:01.3: PIIX4 devres E PIO at fff0-ffff
Jul  2 07:54:31.134930 kernel: pci 0000:00:01.3: PIIX4 devres F MMIO at ffc00000-ffffffff
Jul  2 07:54:31.135060 kernel: pci 0000:00:01.3: PIIX4 devres G PIO at fff0-ffff
Jul  2 07:54:31.135186 kernel: pci 0000:00:01.3: PIIX4 devres H MMIO at ffc00000-ffffffff
Jul  2 07:54:31.135332 kernel: pci 0000:00:01.3: PIIX4 devres I PIO at fff0-ffff
Jul  2 07:54:31.135453 kernel: pci 0000:00:01.3: PIIX4 devres J PIO at fff0-ffff
Jul  2 07:54:31.135579 kernel: pci 0000:00:03.0: [1d0f:1111] type 00 class 0x030000
Jul  2 07:54:31.135698 kernel: pci 0000:00:03.0: reg 0x10: [mem 0xfe400000-0xfe7fffff pref]
Jul  2 07:54:31.135821 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref]
Jul  2 07:54:31.135955 kernel: pci 0000:00:03.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
Jul  2 07:54:31.136085 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802
Jul  2 07:54:31.136200 kernel: pci 0000:00:04.0: reg 0x10: [mem 0xfebf0000-0xfebf3fff]
Jul  2 07:54:31.136351 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000
Jul  2 07:54:31.136482 kernel: pci 0000:00:05.0: reg 0x10: [mem 0xfebf4000-0xfebf7fff]
Jul  2 07:54:31.136500 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10
Jul  2 07:54:31.136517 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10
Jul  2 07:54:31.136530 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11
Jul  2 07:54:31.136543 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11
Jul  2 07:54:31.136555 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9
Jul  2 07:54:31.136569 kernel: iommu: Default domain type: Translated 
Jul  2 07:54:31.136582 kernel: iommu: DMA domain TLB invalidation policy: lazy mode 
Jul  2 07:54:31.136701 kernel: pci 0000:00:03.0: vgaarb: setting as boot VGA device
Jul  2 07:54:31.136817 kernel: pci 0000:00:03.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
Jul  2 07:54:31.136933 kernel: pci 0000:00:03.0: vgaarb: bridge control possible
Jul  2 07:54:31.136952 kernel: vgaarb: loaded
Jul  2 07:54:31.136966 kernel: pps_core: LinuxPPS API ver. 1 registered
Jul  2 07:54:31.136979 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
Jul  2 07:54:31.136992 kernel: PTP clock support registered
Jul  2 07:54:31.137005 kernel: PCI: Using ACPI for IRQ routing
Jul  2 07:54:31.137017 kernel: PCI: pci_cache_line_size set to 64 bytes
Jul  2 07:54:31.137030 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
Jul  2 07:54:31.137043 kernel: e820: reserve RAM buffer [mem 0x7d9ea000-0x7fffffff]
Jul  2 07:54:31.137058 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
Jul  2 07:54:31.137071 kernel: hpet0: 8 comparators, 32-bit 62.500000 MHz counter
Jul  2 07:54:31.137084 kernel: clocksource: Switched to clocksource kvm-clock
Jul  2 07:54:31.137096 kernel: VFS: Disk quotas dquot_6.6.0
Jul  2 07:54:31.137109 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
Jul  2 07:54:31.137121 kernel: pnp: PnP ACPI init
Jul  2 07:54:31.137134 kernel: pnp: PnP ACPI: found 5 devices
Jul  2 07:54:31.137147 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
Jul  2 07:54:31.137160 kernel: NET: Registered PF_INET protocol family
Jul  2 07:54:31.137177 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear)
Jul  2 07:54:31.137190 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear)
Jul  2 07:54:31.137203 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Jul  2 07:54:31.137215 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear)
Jul  2 07:54:31.137228 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear)
Jul  2 07:54:31.137241 kernel: TCP: Hash tables configured (established 16384 bind 16384)
Jul  2 07:54:31.137254 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear)
Jul  2 07:54:31.137267 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear)
Jul  2 07:54:31.137279 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family
Jul  2 07:54:31.137307 kernel: NET: Registered PF_XDP protocol family
Jul  2 07:54:31.137417 kernel: pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
Jul  2 07:54:31.137520 kernel: pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
Jul  2 07:54:31.137623 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
Jul  2 07:54:31.137724 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window]
Jul  2 07:54:31.138627 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers
Jul  2 07:54:31.138781 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds
Jul  2 07:54:31.138807 kernel: PCI: CLS 0 bytes, default 64
Jul  2 07:54:31.138824 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer
Jul  2 07:54:31.138840 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns
Jul  2 07:54:31.138855 kernel: clocksource: Switched to clocksource tsc
Jul  2 07:54:31.138869 kernel: Initialise system trusted keyrings
Jul  2 07:54:31.138884 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0
Jul  2 07:54:31.138900 kernel: Key type asymmetric registered
Jul  2 07:54:31.138914 kernel: Asymmetric key parser 'x509' registered
Jul  2 07:54:31.138929 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
Jul  2 07:54:31.138947 kernel: io scheduler mq-deadline registered
Jul  2 07:54:31.138962 kernel: io scheduler kyber registered
Jul  2 07:54:31.138978 kernel: io scheduler bfq registered
Jul  2 07:54:31.138993 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00
Jul  2 07:54:31.139009 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
Jul  2 07:54:31.139024 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Jul  2 07:54:31.139040 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
Jul  2 07:54:31.139055 kernel: i8042: Warning: Keylock active
Jul  2 07:54:31.139071 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1
Jul  2 07:54:31.139090 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12
Jul  2 07:54:31.139247 kernel: rtc_cmos 00:00: RTC can wake from S4
Jul  2 07:54:31.139391 kernel: rtc_cmos 00:00: registered as rtc0
Jul  2 07:54:31.139517 kernel: rtc_cmos 00:00: setting system clock to 2024-07-02T07:54:30 UTC (1719906870)
Jul  2 07:54:31.139639 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram
Jul  2 07:54:31.139658 kernel: intel_pstate: CPU model not supported
Jul  2 07:54:31.139673 kernel: NET: Registered PF_INET6 protocol family
Jul  2 07:54:31.139689 kernel: Segment Routing with IPv6
Jul  2 07:54:31.139708 kernel: In-situ OAM (IOAM) with IPv6
Jul  2 07:54:31.139723 kernel: NET: Registered PF_PACKET protocol family
Jul  2 07:54:31.139738 kernel: Key type dns_resolver registered
Jul  2 07:54:31.139752 kernel: IPI shorthand broadcast: enabled
Jul  2 07:54:31.139768 kernel: sched_clock: Marking stable (414201070, 222821986)->(748910643, -111887587)
Jul  2 07:54:31.139784 kernel: registered taskstats version 1
Jul  2 07:54:31.139799 kernel: Loading compiled-in X.509 certificates
Jul  2 07:54:31.139815 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42'
Jul  2 07:54:31.139830 kernel: Key type .fscrypt registered
Jul  2 07:54:31.139848 kernel: Key type fscrypt-provisioning registered
Jul  2 07:54:31.139864 kernel: ima: No TPM chip found, activating TPM-bypass!
Jul  2 07:54:31.139879 kernel: ima: Allocated hash algorithm: sha1
Jul  2 07:54:31.139894 kernel: ima: No architecture policies found
Jul  2 07:54:31.139909 kernel: clk: Disabling unused clocks
Jul  2 07:54:31.139925 kernel: Freeing unused kernel image (initmem) memory: 47444K
Jul  2 07:54:31.139940 kernel: Write protecting the kernel read-only data: 28672k
Jul  2 07:54:31.139957 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K
Jul  2 07:54:31.139972 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K
Jul  2 07:54:31.139991 kernel: Run /init as init process
Jul  2 07:54:31.140005 kernel:   with arguments:
Jul  2 07:54:31.140020 kernel:     /init
Jul  2 07:54:31.140033 kernel:   with environment:
Jul  2 07:54:31.140047 kernel:     HOME=/
Jul  2 07:54:31.140061 kernel:     TERM=linux
Jul  2 07:54:31.140076 kernel:     BOOT_IMAGE=/flatcar/vmlinuz-a
Jul  2 07:54:31.140094 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Jul  2 07:54:31.140114 systemd[1]: Detected virtualization amazon.
Jul  2 07:54:31.140128 systemd[1]: Detected architecture x86-64.
Jul  2 07:54:31.140141 systemd[1]: Running in initrd.
Jul  2 07:54:31.140155 systemd[1]: No hostname configured, using default hostname.
Jul  2 07:54:31.140183 systemd[1]: Hostname set to <localhost>.
Jul  2 07:54:31.140201 systemd[1]: Initializing machine ID from VM UUID.
Jul  2 07:54:31.140219 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0
Jul  2 07:54:31.140234 systemd[1]: Queued start job for default target initrd.target.
Jul  2 07:54:31.140250 systemd[1]: Started systemd-ask-password-console.path.
Jul  2 07:54:31.140265 systemd[1]: Reached target cryptsetup.target.
Jul  2 07:54:31.140280 systemd[1]: Reached target paths.target.
Jul  2 07:54:31.140310 systemd[1]: Reached target slices.target.
Jul  2 07:54:31.140326 systemd[1]: Reached target swap.target.
Jul  2 07:54:31.140342 systemd[1]: Reached target timers.target.
Jul  2 07:54:31.140364 systemd[1]: Listening on iscsid.socket.
Jul  2 07:54:31.140381 systemd[1]: Listening on iscsiuio.socket.
Jul  2 07:54:31.140398 systemd[1]: Listening on systemd-journald-audit.socket.
Jul  2 07:54:31.140415 systemd[1]: Listening on systemd-journald-dev-log.socket.
Jul  2 07:54:31.140432 systemd[1]: Listening on systemd-journald.socket.
Jul  2 07:54:31.140448 systemd[1]: Listening on systemd-networkd.socket.
Jul  2 07:54:31.140467 systemd[1]: Listening on systemd-udevd-control.socket.
Jul  2 07:54:31.140484 systemd[1]: Listening on systemd-udevd-kernel.socket.
Jul  2 07:54:31.140505 systemd[1]: Reached target sockets.target.
Jul  2 07:54:31.140523 systemd[1]: Starting kmod-static-nodes.service...
Jul  2 07:54:31.140539 systemd[1]: Finished network-cleanup.service.
Jul  2 07:54:31.140560 systemd[1]: Starting systemd-fsck-usr.service...
Jul  2 07:54:31.140577 systemd[1]: Starting systemd-journald.service...
Jul  2 07:54:31.140594 systemd[1]: Starting systemd-modules-load.service...
Jul  2 07:54:31.140611 systemd[1]: Starting systemd-resolved.service...
Jul  2 07:54:31.140627 systemd[1]: Starting systemd-vconsole-setup.service...
Jul  2 07:54:31.140650 systemd-journald[185]: Journal started
Jul  2 07:54:31.140724 systemd-journald[185]: Runtime Journal (/run/log/journal/ec236d41dce3ad9a9fae55f0ed8878c3) is 4.8M, max 38.7M, 33.9M free.
Jul  2 07:54:31.147313 systemd[1]: Started systemd-journald.service.
Jul  2 07:54:31.180347 systemd-modules-load[186]: Inserted module 'overlay'
Jul  2 07:54:31.297522 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Jul  2 07:54:31.297554 kernel: Bridge firewalling registered
Jul  2 07:54:31.297573 kernel: SCSI subsystem initialized
Jul  2 07:54:31.297589 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log.
Jul  2 07:54:31.297610 kernel: device-mapper: uevent: version 1.0.3
Jul  2 07:54:31.297630 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com
Jul  2 07:54:31.297646 kernel: audit: type=1130 audit(1719906871.292:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.301482 kernel: audit: type=1130 audit(1719906871.295:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.182128 systemd-resolved[187]: Positive Trust Anchors:
Jul  2 07:54:31.310019 kernel: audit: type=1130 audit(1719906871.301:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.310057 kernel: audit: type=1130 audit(1719906871.305:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.182143 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Jul  2 07:54:31.315431 kernel: audit: type=1130 audit(1719906871.309:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.182199 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Jul  2 07:54:31.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.185994 systemd-resolved[187]: Defaulting to hostname 'linux'.
Jul  2 07:54:31.325713 kernel: audit: type=1130 audit(1719906871.315:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.237398 systemd-modules-load[186]: Inserted module 'br_netfilter'
Jul  2 07:54:31.290052 systemd-modules-load[186]: Inserted module 'dm_multipath'
Jul  2 07:54:31.293286 systemd[1]: Started systemd-resolved.service.
Jul  2 07:54:31.297596 systemd[1]: Finished kmod-static-nodes.service.
Jul  2 07:54:31.301717 systemd[1]: Finished systemd-fsck-usr.service.
Jul  2 07:54:31.305834 systemd[1]: Finished systemd-modules-load.service.
Jul  2 07:54:31.310463 systemd[1]: Finished systemd-vconsole-setup.service.
Jul  2 07:54:31.315610 systemd[1]: Reached target nss-lookup.target.
Jul  2 07:54:31.331558 systemd[1]: Starting dracut-cmdline-ask.service...
Jul  2 07:54:31.335140 systemd[1]: Starting systemd-sysctl.service...
Jul  2 07:54:31.337282 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Jul  2 07:54:31.359239 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Jul  2 07:54:31.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.365818 systemd[1]: Finished dracut-cmdline-ask.service.
Jul  2 07:54:31.374603 kernel: audit: type=1130 audit(1719906871.359:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.374814 kernel: audit: type=1130 audit(1719906871.366:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.368034 systemd[1]: Starting dracut-cmdline.service...
Jul  2 07:54:31.376512 systemd[1]: Finished systemd-sysctl.service.
Jul  2 07:54:31.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.383312 kernel: audit: type=1130 audit(1719906871.377:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.385446 dracut-cmdline[207]: dracut-dracut-053
Jul  2 07:54:31.392048 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82
Jul  2 07:54:31.467326 kernel: Loading iSCSI transport class v2.0-870.
Jul  2 07:54:31.490329 kernel: iscsi: registered transport (tcp)
Jul  2 07:54:31.522550 kernel: iscsi: registered transport (qla4xxx)
Jul  2 07:54:31.522672 kernel: QLogic iSCSI HBA Driver
Jul  2 07:54:31.575762 systemd[1]: Finished dracut-cmdline.service.
Jul  2 07:54:31.577098 systemd[1]: Starting dracut-pre-udev.service...
Jul  2 07:54:31.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:31.634320 kernel: raid6: avx512x4 gen() 13129 MB/s
Jul  2 07:54:31.651318 kernel: raid6: avx512x4 xor()  6446 MB/s
Jul  2 07:54:31.668325 kernel: raid6: avx512x2 gen() 13325 MB/s
Jul  2 07:54:31.685320 kernel: raid6: avx512x2 xor() 18791 MB/s
Jul  2 07:54:31.702405 kernel: raid6: avx512x1 gen() 14014 MB/s
Jul  2 07:54:31.719319 kernel: raid6: avx512x1 xor() 20288 MB/s
Jul  2 07:54:31.736350 kernel: raid6: avx2x4   gen() 14255 MB/s
Jul  2 07:54:31.753317 kernel: raid6: avx2x4   xor()  6944 MB/s
Jul  2 07:54:31.770319 kernel: raid6: avx2x2   gen() 12817 MB/s
Jul  2 07:54:31.787323 kernel: raid6: avx2x2   xor() 15819 MB/s
Jul  2 07:54:31.804335 kernel: raid6: avx2x1   gen()  9558 MB/s
Jul  2 07:54:31.821319 kernel: raid6: avx2x1   xor() 13107 MB/s
Jul  2 07:54:31.838318 kernel: raid6: sse2x4   gen()  7775 MB/s
Jul  2 07:54:31.855328 kernel: raid6: sse2x4   xor()  5514 MB/s
Jul  2 07:54:31.872325 kernel: raid6: sse2x2   gen()  9232 MB/s
Jul  2 07:54:31.891321 kernel: raid6: sse2x2   xor()  4092 MB/s
Jul  2 07:54:31.908342 kernel: raid6: sse2x1   gen()  7190 MB/s
Jul  2 07:54:31.927174 kernel: raid6: sse2x1   xor()  3354 MB/s
Jul  2 07:54:31.927298 kernel: raid6: using algorithm avx2x4 gen() 14255 MB/s
Jul  2 07:54:31.927434 kernel: raid6: .... xor() 6944 MB/s, rmw enabled
Jul  2 07:54:31.928526 kernel: raid6: using avx512x2 recovery algorithm
Jul  2 07:54:31.951363 kernel: xor: automatically using best checksumming function   avx       
Jul  2 07:54:32.082322 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no
Jul  2 07:54:32.093204 systemd[1]: Finished dracut-pre-udev.service.
Jul  2 07:54:32.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:32.093000 audit: BPF prog-id=7 op=LOAD
Jul  2 07:54:32.094000 audit: BPF prog-id=8 op=LOAD
Jul  2 07:54:32.095424 systemd[1]: Starting systemd-udevd.service...
Jul  2 07:54:32.113869 systemd-udevd[384]: Using default interface naming scheme 'v252'.
Jul  2 07:54:32.123700 systemd[1]: Started systemd-udevd.service.
Jul  2 07:54:32.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:32.126264 systemd[1]: Starting dracut-pre-trigger.service...
Jul  2 07:54:32.147767 dracut-pre-trigger[391]: rd.md=0: removing MD RAID activation
Jul  2 07:54:32.184281 systemd[1]: Finished dracut-pre-trigger.service.
Jul  2 07:54:32.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:32.185686 systemd[1]: Starting systemd-udev-trigger.service...
Jul  2 07:54:32.243749 systemd[1]: Finished systemd-udev-trigger.service.
Jul  2 07:54:32.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:32.330312 kernel: cryptd: max_cpu_qlen set to 1000
Jul  2 07:54:32.383378 kernel: ena 0000:00:05.0: ENA device version: 0.10
Jul  2 07:54:32.383676 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1
Jul  2 07:54:32.383910 kernel: AVX2 version of gcm_enc/dec engaged.
Jul  2 07:54:32.383931 kernel: AES CTR mode by8 optimization enabled
Jul  2 07:54:32.385308 kernel: ena 0000:00:05.0: LLQ is not supported Fallback to host mode policy.
Jul  2 07:54:32.392317 kernel: nvme nvme0: pci function 0000:00:04.0
Jul  2 07:54:32.392555 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem febf4000, mac addr 06:2a:a1:02:1a:6f
Jul  2 07:54:32.392954 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11
Jul  2 07:54:32.403310 kernel: nvme nvme0: 2/0/0 default/read/poll queues
Jul  2 07:54:32.408444 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk.
Jul  2 07:54:32.408506 kernel: GPT:9289727 != 16777215
Jul  2 07:54:32.408523 kernel: GPT:Alternate GPT header not at the end of the disk.
Jul  2 07:54:32.408542 kernel: GPT:9289727 != 16777215
Jul  2 07:54:32.408560 kernel: GPT: Use GNU Parted to correct GPT errors.
Jul  2 07:54:32.408578 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Jul  2 07:54:32.410420 (udev-worker)[439]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:54:32.501316 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (440)
Jul  2 07:54:32.541916 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device.
Jul  2 07:54:32.606539 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device.
Jul  2 07:54:32.618262 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device.
Jul  2 07:54:32.621084 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device.
Jul  2 07:54:32.633235 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device.
Jul  2 07:54:32.635615 systemd[1]: Starting disk-uuid.service...
Jul  2 07:54:32.642638 disk-uuid[591]: Primary Header is updated.
Jul  2 07:54:32.642638 disk-uuid[591]: Secondary Entries is updated.
Jul  2 07:54:32.642638 disk-uuid[591]: Secondary Header is updated.
Jul  2 07:54:32.649314 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Jul  2 07:54:32.656319 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Jul  2 07:54:32.662322 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Jul  2 07:54:33.663350 kernel:  nvme0n1: p1 p2 p3 p4 p6 p7 p9
Jul  2 07:54:33.663734 disk-uuid[592]: The operation has completed successfully.
Jul  2 07:54:33.791800 systemd[1]: disk-uuid.service: Deactivated successfully.
Jul  2 07:54:33.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:33.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:33.791917 systemd[1]: Finished disk-uuid.service.
Jul  2 07:54:33.807897 systemd[1]: Starting verity-setup.service...
Jul  2 07:54:33.828321 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2"
Jul  2 07:54:33.911958 systemd[1]: Found device dev-mapper-usr.device.
Jul  2 07:54:33.923366 systemd[1]: Mounting sysusr-usr.mount...
Jul  2 07:54:33.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:33.924772 systemd[1]: Finished verity-setup.service.
Jul  2 07:54:34.037425 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none.
Jul  2 07:54:34.037868 systemd[1]: Mounted sysusr-usr.mount.
Jul  2 07:54:34.039747 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met.
Jul  2 07:54:34.042093 systemd[1]: Starting ignition-setup.service...
Jul  2 07:54:34.044457 systemd[1]: Starting parse-ip-for-networkd.service...
Jul  2 07:54:34.071051 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Jul  2 07:54:34.071117 kernel: BTRFS info (device nvme0n1p6): using free space tree
Jul  2 07:54:34.071136 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Jul  2 07:54:34.091726 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Jul  2 07:54:34.106911 systemd[1]: mnt-oem.mount: Deactivated successfully.
Jul  2 07:54:34.120938 systemd[1]: Finished ignition-setup.service.
Jul  2 07:54:34.123980 systemd[1]: Starting ignition-fetch-offline.service...
Jul  2 07:54:34.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.158033 systemd[1]: Finished parse-ip-for-networkd.service.
Jul  2 07:54:34.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.160000 audit: BPF prog-id=9 op=LOAD
Jul  2 07:54:34.161826 systemd[1]: Starting systemd-networkd.service...
Jul  2 07:54:34.193015 systemd-networkd[1103]: lo: Link UP
Jul  2 07:54:34.193028 systemd-networkd[1103]: lo: Gained carrier
Jul  2 07:54:34.193749 systemd-networkd[1103]: Enumeration completed
Jul  2 07:54:34.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.194042 systemd-networkd[1103]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Jul  2 07:54:34.194302 systemd[1]: Started systemd-networkd.service.
Jul  2 07:54:34.198618 systemd[1]: Reached target network.target.
Jul  2 07:54:34.201053 systemd[1]: Starting iscsiuio.service...
Jul  2 07:54:34.208849 systemd-networkd[1103]: eth0: Link UP
Jul  2 07:54:34.209813 systemd-networkd[1103]: eth0: Gained carrier
Jul  2 07:54:34.212161 systemd[1]: Started iscsiuio.service.
Jul  2 07:54:34.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.215018 systemd[1]: Starting iscsid.service...
Jul  2 07:54:34.222393 iscsid[1108]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi
Jul  2 07:54:34.222393 iscsid[1108]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier].
Jul  2 07:54:34.222393 iscsid[1108]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6.
Jul  2 07:54:34.222393 iscsid[1108]: If using hardware iscsi like qla4xxx this message can be ignored.
Jul  2 07:54:34.222393 iscsid[1108]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi
Jul  2 07:54:34.222393 iscsid[1108]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf
Jul  2 07:54:34.235594 systemd[1]: Started iscsid.service.
Jul  2 07:54:34.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.236982 systemd[1]: Starting dracut-initqueue.service...
Jul  2 07:54:34.237676 systemd-networkd[1103]: eth0: DHCPv4 address 172.31.22.44/20, gateway 172.31.16.1 acquired from 172.31.16.1
Jul  2 07:54:34.255020 systemd[1]: Finished dracut-initqueue.service.
Jul  2 07:54:34.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.256228 systemd[1]: Reached target remote-fs-pre.target.
Jul  2 07:54:34.257140 systemd[1]: Reached target remote-cryptsetup.target.
Jul  2 07:54:34.258305 systemd[1]: Reached target remote-fs.target.
Jul  2 07:54:34.263782 systemd[1]: Starting dracut-pre-mount.service...
Jul  2 07:54:34.275861 systemd[1]: Finished dracut-pre-mount.service.
Jul  2 07:54:34.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.697479 ignition[1068]: Ignition 2.14.0
Jul  2 07:54:34.697496 ignition[1068]: Stage: fetch-offline
Jul  2 07:54:34.697641 ignition[1068]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:34.697683 ignition[1068]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:34.727149 ignition[1068]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:34.728706 ignition[1068]: Ignition finished successfully
Jul  2 07:54:34.731008 systemd[1]: Finished ignition-fetch-offline.service.
Jul  2 07:54:34.732879 systemd[1]: Starting ignition-fetch.service...
Jul  2 07:54:34.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.750446 ignition[1127]: Ignition 2.14.0
Jul  2 07:54:34.750461 ignition[1127]: Stage: fetch
Jul  2 07:54:34.750658 ignition[1127]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:34.750692 ignition[1127]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:34.765479 ignition[1127]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:34.767112 ignition[1127]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:34.823993 ignition[1127]: INFO     : PUT result: OK
Jul  2 07:54:34.827997 ignition[1127]: DEBUG    : parsed url from cmdline: ""
Jul  2 07:54:34.827997 ignition[1127]: INFO     : no config URL provided
Jul  2 07:54:34.827997 ignition[1127]: INFO     : reading system config file "/usr/lib/ignition/user.ign"
Jul  2 07:54:34.827997 ignition[1127]: INFO     : no config at "/usr/lib/ignition/user.ign"
Jul  2 07:54:34.833272 ignition[1127]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:34.833272 ignition[1127]: INFO     : PUT result: OK
Jul  2 07:54:34.833272 ignition[1127]: INFO     : GET http://169.254.169.254/2019-10-01/user-data: attempt #1
Jul  2 07:54:34.837081 ignition[1127]: INFO     : GET result: OK
Jul  2 07:54:34.837081 ignition[1127]: DEBUG    : parsing config with SHA512: 6a74255e86eb5816ff11f30c9ea767978a553a83ff65936838d395709d1279e701bbee8b3d8634dbe952ecb729abc3e9be38fc789e7959d934d68c7541b80dcb
Jul  2 07:54:34.842691 unknown[1127]: fetched base config from "system"
Jul  2 07:54:34.842714 unknown[1127]: fetched base config from "system"
Jul  2 07:54:34.842725 unknown[1127]: fetched user config from "aws"
Jul  2 07:54:34.846165 ignition[1127]: fetch: fetch complete
Jul  2 07:54:34.846176 ignition[1127]: fetch: fetch passed
Jul  2 07:54:34.847692 ignition[1127]: Ignition finished successfully
Jul  2 07:54:34.851525 systemd[1]: Finished ignition-fetch.service.
Jul  2 07:54:34.853347 systemd[1]: Starting ignition-kargs.service...
Jul  2 07:54:34.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.864154 ignition[1133]: Ignition 2.14.0
Jul  2 07:54:34.864165 ignition[1133]: Stage: kargs
Jul  2 07:54:34.864324 ignition[1133]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:34.864346 ignition[1133]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:34.872201 ignition[1133]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:34.873350 ignition[1133]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:34.874592 ignition[1133]: INFO     : PUT result: OK
Jul  2 07:54:34.877772 ignition[1133]: kargs: kargs passed
Jul  2 07:54:34.877821 ignition[1133]: Ignition finished successfully
Jul  2 07:54:34.880161 systemd[1]: Finished ignition-kargs.service.
Jul  2 07:54:34.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.881812 systemd[1]: Starting ignition-disks.service...
Jul  2 07:54:34.890324 ignition[1139]: Ignition 2.14.0
Jul  2 07:54:34.890587 ignition[1139]: Stage: disks
Jul  2 07:54:34.891940 ignition[1139]: reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:34.891964 ignition[1139]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:34.910479 ignition[1139]: no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:34.911880 ignition[1139]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:34.913309 ignition[1139]: INFO     : PUT result: OK
Jul  2 07:54:34.916437 ignition[1139]: disks: disks passed
Jul  2 07:54:34.916491 ignition[1139]: Ignition finished successfully
Jul  2 07:54:34.919010 systemd[1]: Finished ignition-disks.service.
Jul  2 07:54:34.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.920649 systemd[1]: Reached target initrd-root-device.target.
Jul  2 07:54:34.922618 systemd[1]: Reached target local-fs-pre.target.
Jul  2 07:54:34.924145 systemd[1]: Reached target local-fs.target.
Jul  2 07:54:34.925636 systemd[1]: Reached target sysinit.target.
Jul  2 07:54:34.926960 systemd[1]: Reached target basic.target.
Jul  2 07:54:34.929085 systemd[1]: Starting systemd-fsck-root.service...
Jul  2 07:54:34.964455 systemd-fsck[1147]: ROOT: clean, 614/553520 files, 56020/553472 blocks
Jul  2 07:54:34.967816 systemd[1]: Finished systemd-fsck-root.service.
Jul  2 07:54:34.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:34.970353 systemd[1]: Mounting sysroot.mount...
Jul  2 07:54:34.992863 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none.
Jul  2 07:54:34.992559 systemd[1]: Mounted sysroot.mount.
Jul  2 07:54:34.993999 systemd[1]: Reached target initrd-root-fs.target.
Jul  2 07:54:35.003917 systemd[1]: Mounting sysroot-usr.mount...
Jul  2 07:54:35.006316 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met.
Jul  2 07:54:35.006497 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot).
Jul  2 07:54:35.006542 systemd[1]: Reached target ignition-diskful.target.
Jul  2 07:54:35.012739 systemd[1]: Mounted sysroot-usr.mount.
Jul  2 07:54:35.034912 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Jul  2 07:54:35.053875 systemd[1]: Starting initrd-setup-root.service...
Jul  2 07:54:35.079802 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1164)
Jul  2 07:54:35.082481 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Jul  2 07:54:35.082543 kernel: BTRFS info (device nvme0n1p6): using free space tree
Jul  2 07:54:35.082561 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Jul  2 07:54:35.087616 initrd-setup-root[1169]: cut: /sysroot/etc/passwd: No such file or directory
Jul  2 07:54:35.091325 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Jul  2 07:54:35.103177 initrd-setup-root[1195]: cut: /sysroot/etc/group: No such file or directory
Jul  2 07:54:35.106054 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Jul  2 07:54:35.111052 initrd-setup-root[1203]: cut: /sysroot/etc/shadow: No such file or directory
Jul  2 07:54:35.118009 initrd-setup-root[1211]: cut: /sysroot/etc/gshadow: No such file or directory
Jul  2 07:54:35.343191 systemd[1]: Finished initrd-setup-root.service.
Jul  2 07:54:35.356430 kernel: kauditd_printk_skb: 23 callbacks suppressed
Jul  2 07:54:35.356615 kernel: audit: type=1130 audit(1719906875.343:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:35.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:35.346580 systemd[1]: Starting ignition-mount.service...
Jul  2 07:54:35.357703 systemd[1]: Starting sysroot-boot.service...
Jul  2 07:54:35.363181 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully.
Jul  2 07:54:35.363457 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully.
Jul  2 07:54:35.382337 ignition[1230]: INFO     : Ignition 2.14.0
Jul  2 07:54:35.382337 ignition[1230]: INFO     : Stage: mount
Jul  2 07:54:35.384191 ignition[1230]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:35.384191 ignition[1230]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:35.405029 ignition[1230]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:35.406426 ignition[1230]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:35.409789 ignition[1230]: INFO     : PUT result: OK
Jul  2 07:54:35.413237 systemd[1]: Finished sysroot-boot.service.
Jul  2 07:54:35.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:35.416898 ignition[1230]: INFO     : mount: mount passed
Jul  2 07:54:35.418767 ignition[1230]: INFO     : Ignition finished successfully
Jul  2 07:54:35.417841 systemd[1]: Finished ignition-mount.service.
Jul  2 07:54:35.421731 kernel: audit: type=1130 audit(1719906875.414:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:35.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:35.422886 systemd[1]: Starting ignition-files.service...
Jul  2 07:54:35.426857 kernel: audit: type=1130 audit(1719906875.421:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:35.432773 systemd[1]: Mounting sysroot-usr-share-oem.mount...
Jul  2 07:54:35.449315 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1240)
Jul  2 07:54:35.453088 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-intel) checksum algorithm
Jul  2 07:54:35.453141 kernel: BTRFS info (device nvme0n1p6): using free space tree
Jul  2 07:54:35.453154 kernel: BTRFS info (device nvme0n1p6): has skinny extents
Jul  2 07:54:35.482313 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations
Jul  2 07:54:35.485362 systemd[1]: Mounted sysroot-usr-share-oem.mount.
Jul  2 07:54:35.503063 ignition[1259]: INFO     : Ignition 2.14.0
Jul  2 07:54:35.503063 ignition[1259]: INFO     : Stage: files
Jul  2 07:54:35.505214 ignition[1259]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:35.505214 ignition[1259]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:35.514678 ignition[1259]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:35.515924 ignition[1259]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:35.517536 ignition[1259]: INFO     : PUT result: OK
Jul  2 07:54:35.522039 ignition[1259]: DEBUG    : files: compiled without relabeling support, skipping
Jul  2 07:54:35.527991 ignition[1259]: INFO     : files: ensureUsers: op(1): [started]  creating or modifying user "core"
Jul  2 07:54:35.527991 ignition[1259]: DEBUG    : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core"
Jul  2 07:54:35.532832 ignition[1259]: INFO     : files: ensureUsers: op(1): [finished] creating or modifying user "core"
Jul  2 07:54:35.534267 ignition[1259]: INFO     : files: ensureUsers: op(2): [started]  adding ssh keys to user "core"
Jul  2 07:54:35.536589 unknown[1259]: wrote ssh authorized keys file for user: core
Jul  2 07:54:35.537712 ignition[1259]: INFO     : files: ensureUsers: op(2): [finished] adding ssh keys to user "core"
Jul  2 07:54:35.539519 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [started]  writing file "/sysroot/etc/flatcar-cgroupv1"
Jul  2 07:54:35.541180 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1"
Jul  2 07:54:35.542769 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [started]  writing file "/sysroot/etc/eks/bootstrap.sh"
Jul  2 07:54:35.544581 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Jul  2 07:54:35.560886 ignition[1259]: INFO     : op(1): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1764205720"
Jul  2 07:54:35.562623 ignition[1259]: CRITICAL : op(1): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem1764205720": device or resource busy
Jul  2 07:54:35.565856 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1263)
Jul  2 07:54:35.565880 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1764205720", trying btrfs: device or resource busy
Jul  2 07:54:35.565880 ignition[1259]: INFO     : op(2): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem1764205720"
Jul  2 07:54:35.569109 ignition[1259]: INFO     : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1764205720"
Jul  2 07:54:35.579682 ignition[1259]: INFO     : op(3): [started]  unmounting "/mnt/oem1764205720"
Jul  2 07:54:35.580883 ignition[1259]: INFO     : op(3): [finished] unmounting "/mnt/oem1764205720"
Jul  2 07:54:35.580883 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh"
Jul  2 07:54:35.580883 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [started]  writing file "/sysroot/home/core/install.sh"
Jul  2 07:54:35.592602 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh"
Jul  2 07:54:35.592602 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [started]  writing file "/sysroot/etc/flatcar/update.conf"
Jul  2 07:54:35.606260 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/flatcar/update.conf"
Jul  2 07:54:35.606260 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [started]  writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw"
Jul  2 07:54:35.606260 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(7): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw"
Jul  2 07:54:35.626441 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [started]  writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Jul  2 07:54:35.626441 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Jul  2 07:54:35.633762 ignition[1259]: INFO     : op(4): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2829261810"
Jul  2 07:54:35.635306 ignition[1259]: CRITICAL : op(4): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2829261810": device or resource busy
Jul  2 07:54:35.635306 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2829261810", trying btrfs: device or resource busy
Jul  2 07:54:35.638758 ignition[1259]: INFO     : op(5): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2829261810"
Jul  2 07:54:35.638758 ignition[1259]: INFO     : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2829261810"
Jul  2 07:54:35.641633 ignition[1259]: INFO     : op(6): [started]  unmounting "/mnt/oem2829261810"
Jul  2 07:54:35.641633 ignition[1259]: INFO     : op(6): [finished] unmounting "/mnt/oem2829261810"
Jul  2 07:54:35.644014 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json"
Jul  2 07:54:35.644014 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [started]  writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Jul  2 07:54:35.644014 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Jul  2 07:54:35.654228 ignition[1259]: INFO     : op(7): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891923466"
Jul  2 07:54:35.656268 ignition[1259]: CRITICAL : op(7): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891923466": device or resource busy
Jul  2 07:54:35.656268 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2891923466", trying btrfs: device or resource busy
Jul  2 07:54:35.656268 ignition[1259]: INFO     : op(8): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891923466"
Jul  2 07:54:35.656268 ignition[1259]: INFO     : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2891923466"
Jul  2 07:54:35.663946 ignition[1259]: INFO     : op(9): [started]  unmounting "/mnt/oem2891923466"
Jul  2 07:54:35.665010 ignition[1259]: INFO     : op(9): [finished] unmounting "/mnt/oem2891923466"
Jul  2 07:54:35.665010 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml"
Jul  2 07:54:35.667861 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [started]  writing file "/sysroot/etc/systemd/system/nvidia.service"
Jul  2 07:54:35.667861 ignition[1259]: INFO     : oem config not found in "/usr/share/oem", looking on oem partition
Jul  2 07:54:35.679093 ignition[1259]: INFO     : op(a): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2097987119"
Jul  2 07:54:35.680710 ignition[1259]: CRITICAL : op(a): [failed]   mounting "/dev/disk/by-label/OEM" at "/mnt/oem2097987119": device or resource busy
Jul  2 07:54:35.680710 ignition[1259]: ERROR    : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2097987119", trying btrfs: device or resource busy
Jul  2 07:54:35.680710 ignition[1259]: INFO     : op(b): [started]  mounting "/dev/disk/by-label/OEM" at "/mnt/oem2097987119"
Jul  2 07:54:35.680710 ignition[1259]: INFO     : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2097987119"
Jul  2 07:54:35.680710 ignition[1259]: INFO     : op(c): [started]  unmounting "/mnt/oem2097987119"
Jul  2 07:54:35.680710 ignition[1259]: INFO     : op(c): [finished] unmounting "/mnt/oem2097987119"
Jul  2 07:54:35.680710 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service"
Jul  2 07:54:35.680710 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [started]  writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw"
Jul  2 07:54:35.694427 ignition[1259]: INFO     : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.28.7-x86-64.raw: attempt #1
Jul  2 07:54:35.696558 systemd-networkd[1103]: eth0: Gained IPv6LL
Jul  2 07:54:36.041154 ignition[1259]: INFO     : GET result: OK
Jul  2 07:54:36.478694 ignition[1259]: INFO     : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.28.7-x86-64.raw"
Jul  2 07:54:36.478694 ignition[1259]: INFO     : files: op(c): [started]  processing unit "coreos-metadata-sshkeys@.service"
Jul  2 07:54:36.478694 ignition[1259]: INFO     : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service"
Jul  2 07:54:36.478694 ignition[1259]: INFO     : files: op(d): [started]  processing unit "amazon-ssm-agent.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(d): op(e): [started]  writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(d): op(e): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(d): [finished] processing unit "amazon-ssm-agent.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(f): [started]  processing unit "nvidia.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(f): [finished] processing unit "nvidia.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(10): [started]  processing unit "containerd.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(10): op(11): [started]  writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(10): op(11): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(10): [finished] processing unit "containerd.service"
Jul  2 07:54:36.485379 ignition[1259]: INFO     : files: op(12): [started]  setting preset to enabled for "coreos-metadata-sshkeys@.service "
Jul  2 07:54:36.502263 ignition[1259]: INFO     : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service "
Jul  2 07:54:36.502263 ignition[1259]: INFO     : files: op(13): [started]  setting preset to enabled for "amazon-ssm-agent.service"
Jul  2 07:54:36.502263 ignition[1259]: INFO     : files: op(13): [finished] setting preset to enabled for "amazon-ssm-agent.service"
Jul  2 07:54:36.502263 ignition[1259]: INFO     : files: op(14): [started]  setting preset to enabled for "nvidia.service"
Jul  2 07:54:36.502263 ignition[1259]: INFO     : files: op(14): [finished] setting preset to enabled for "nvidia.service"
Jul  2 07:54:36.512999 ignition[1259]: INFO     : files: createResultFile: createFiles: op(15): [started]  writing file "/sysroot/etc/.ignition-result.json"
Jul  2 07:54:36.514945 ignition[1259]: INFO     : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json"
Jul  2 07:54:36.514945 ignition[1259]: INFO     : files: files passed
Jul  2 07:54:36.514945 ignition[1259]: INFO     : Ignition finished successfully
Jul  2 07:54:36.519891 systemd[1]: Finished ignition-files.service.
Jul  2 07:54:36.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.525333 kernel: audit: type=1130 audit(1719906876.520:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.527366 systemd[1]: Starting initrd-setup-root-after-ignition.service...
Jul  2 07:54:36.530492 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile).
Jul  2 07:54:36.532765 systemd[1]: Starting ignition-quench.service...
Jul  2 07:54:36.543938 systemd[1]: ignition-quench.service: Deactivated successfully.
Jul  2 07:54:36.560716 kernel: audit: type=1130 audit(1719906876.548:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.560752 kernel: audit: type=1131 audit(1719906876.548:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.560869 initrd-setup-root-after-ignition[1284]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory
Jul  2 07:54:36.544089 systemd[1]: Finished ignition-quench.service.
Jul  2 07:54:36.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.561503 systemd[1]: Finished initrd-setup-root-after-ignition.service.
Jul  2 07:54:36.573359 kernel: audit: type=1130 audit(1719906876.563:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.563939 systemd[1]: Reached target ignition-complete.target.
Jul  2 07:54:36.574647 systemd[1]: Starting initrd-parse-etc.service...
Jul  2 07:54:36.599946 systemd[1]: initrd-parse-etc.service: Deactivated successfully.
Jul  2 07:54:36.600072 systemd[1]: Finished initrd-parse-etc.service.
Jul  2 07:54:36.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.602967 systemd[1]: Reached target initrd-fs.target.
Jul  2 07:54:36.619757 kernel: audit: type=1130 audit(1719906876.602:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.619792 kernel: audit: type=1131 audit(1719906876.602:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.619781 systemd[1]: Reached target initrd.target.
Jul  2 07:54:36.621084 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met.
Jul  2 07:54:36.623662 systemd[1]: Starting dracut-pre-pivot.service...
Jul  2 07:54:36.638100 systemd[1]: Finished dracut-pre-pivot.service.
Jul  2 07:54:36.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.641031 systemd[1]: Starting initrd-cleanup.service...
Jul  2 07:54:36.646025 kernel: audit: type=1130 audit(1719906876.639:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.679609 systemd[1]: Stopped target nss-lookup.target.
Jul  2 07:54:36.681529 systemd[1]: Stopped target remote-cryptsetup.target.
Jul  2 07:54:36.684138 systemd[1]: Stopped target timers.target.
Jul  2 07:54:36.685752 systemd[1]: dracut-pre-pivot.service: Deactivated successfully.
Jul  2 07:54:36.686826 systemd[1]: Stopped dracut-pre-pivot.service.
Jul  2 07:54:36.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.688620 systemd[1]: Stopped target initrd.target.
Jul  2 07:54:36.691414 systemd[1]: Stopped target basic.target.
Jul  2 07:54:36.692833 systemd[1]: Stopped target ignition-complete.target.
Jul  2 07:54:36.694520 systemd[1]: Stopped target ignition-diskful.target.
Jul  2 07:54:36.696857 systemd[1]: Stopped target initrd-root-device.target.
Jul  2 07:54:36.698565 systemd[1]: Stopped target remote-fs.target.
Jul  2 07:54:36.700661 systemd[1]: Stopped target remote-fs-pre.target.
Jul  2 07:54:36.702605 systemd[1]: Stopped target sysinit.target.
Jul  2 07:54:36.704349 systemd[1]: Stopped target local-fs.target.
Jul  2 07:54:36.707184 systemd[1]: Stopped target local-fs-pre.target.
Jul  2 07:54:36.708238 systemd[1]: Stopped target swap.target.
Jul  2 07:54:36.709771 systemd[1]: dracut-pre-mount.service: Deactivated successfully.
Jul  2 07:54:36.711876 systemd[1]: Stopped dracut-pre-mount.service.
Jul  2 07:54:36.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.714723 systemd[1]: Stopped target cryptsetup.target.
Jul  2 07:54:36.716732 systemd[1]: dracut-initqueue.service: Deactivated successfully.
Jul  2 07:54:36.716873 systemd[1]: Stopped dracut-initqueue.service.
Jul  2 07:54:36.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.719955 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully.
Jul  2 07:54:36.720120 systemd[1]: Stopped initrd-setup-root-after-ignition.service.
Jul  2 07:54:36.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.724037 systemd[1]: ignition-files.service: Deactivated successfully.
Jul  2 07:54:36.725131 systemd[1]: Stopped ignition-files.service.
Jul  2 07:54:36.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.728707 systemd[1]: Stopping ignition-mount.service...
Jul  2 07:54:36.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.731093 systemd[1]: Stopping iscsiuio.service...
Jul  2 07:54:36.735411 systemd[1]: kmod-static-nodes.service: Deactivated successfully.
Jul  2 07:54:36.735614 systemd[1]: Stopped kmod-static-nodes.service.
Jul  2 07:54:36.743104 systemd[1]: Stopping sysroot-boot.service...
Jul  2 07:54:36.750522 systemd[1]: systemd-udev-trigger.service: Deactivated successfully.
Jul  2 07:54:36.753312 systemd[1]: Stopped systemd-udev-trigger.service.
Jul  2 07:54:36.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.759033 systemd[1]: dracut-pre-trigger.service: Deactivated successfully.
Jul  2 07:54:36.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.770939 ignition[1298]: INFO     : Ignition 2.14.0
Jul  2 07:54:36.770939 ignition[1298]: INFO     : Stage: umount
Jul  2 07:54:36.770939 ignition[1298]: INFO     : reading system config file "/usr/lib/ignition/base.d/base.ign"
Jul  2 07:54:36.770939 ignition[1298]: DEBUG    : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b
Jul  2 07:54:36.759407 systemd[1]: Stopped dracut-pre-trigger.service.
Jul  2 07:54:36.768664 systemd[1]: iscsiuio.service: Deactivated successfully.
Jul  2 07:54:36.768980 systemd[1]: Stopped iscsiuio.service.
Jul  2 07:54:36.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.791048 systemd[1]: initrd-cleanup.service: Deactivated successfully.
Jul  2 07:54:36.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.791169 systemd[1]: Finished initrd-cleanup.service.
Jul  2 07:54:36.807384 systemd[1]: sysroot-boot.mount: Deactivated successfully.
Jul  2 07:54:36.810928 ignition[1298]: INFO     : no config dir at "/usr/lib/ignition/base.platform.d/aws"
Jul  2 07:54:36.812310 ignition[1298]: INFO     : PUT http://169.254.169.254/latest/api/token: attempt #1
Jul  2 07:54:36.814305 ignition[1298]: INFO     : PUT result: OK
Jul  2 07:54:36.817610 ignition[1298]: INFO     : umount: umount passed
Jul  2 07:54:36.821801 ignition[1298]: INFO     : Ignition finished successfully
Jul  2 07:54:36.823951 systemd[1]: ignition-mount.service: Deactivated successfully.
Jul  2 07:54:36.825169 systemd[1]: Stopped ignition-mount.service.
Jul  2 07:54:36.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.826982 systemd[1]: ignition-disks.service: Deactivated successfully.
Jul  2 07:54:36.827058 systemd[1]: Stopped ignition-disks.service.
Jul  2 07:54:36.829000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.829695 systemd[1]: ignition-kargs.service: Deactivated successfully.
Jul  2 07:54:36.829748 systemd[1]: Stopped ignition-kargs.service.
Jul  2 07:54:36.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.832204 systemd[1]: ignition-fetch.service: Deactivated successfully.
Jul  2 07:54:36.832253 systemd[1]: Stopped ignition-fetch.service.
Jul  2 07:54:36.833413 systemd[1]: Stopped target network.target.
Jul  2 07:54:36.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.834360 systemd[1]: ignition-fetch-offline.service: Deactivated successfully.
Jul  2 07:54:36.834413 systemd[1]: Stopped ignition-fetch-offline.service.
Jul  2 07:54:36.835519 systemd[1]: Stopped target paths.target.
Jul  2 07:54:36.840046 systemd[1]: systemd-ask-password-console.path: Deactivated successfully.
Jul  2 07:54:36.842597 systemd[1]: Stopped systemd-ask-password-console.path.
Jul  2 07:54:36.845048 systemd[1]: Stopped target slices.target.
Jul  2 07:54:36.852598 systemd[1]: Stopped target sockets.target.
Jul  2 07:54:36.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.853908 systemd[1]: iscsid.socket: Deactivated successfully.
Jul  2 07:54:36.853983 systemd[1]: Closed iscsid.socket.
Jul  2 07:54:36.855850 systemd[1]: iscsiuio.socket: Deactivated successfully.
Jul  2 07:54:36.856182 systemd[1]: Closed iscsiuio.socket.
Jul  2 07:54:36.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.857339 systemd[1]: ignition-setup.service: Deactivated successfully.
Jul  2 07:54:36.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.857469 systemd[1]: Stopped ignition-setup.service.
Jul  2 07:54:36.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.895000 audit: BPF prog-id=6 op=UNLOAD
Jul  2 07:54:36.859308 systemd[1]: Stopping systemd-networkd.service...
Jul  2 07:54:36.862543 systemd[1]: Stopping systemd-resolved.service...
Jul  2 07:54:36.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.863359 systemd-networkd[1103]: eth0: DHCPv6 lease lost
Jul  2 07:54:36.904000 audit: BPF prog-id=9 op=UNLOAD
Jul  2 07:54:36.866404 systemd[1]: systemd-networkd.service: Deactivated successfully.
Jul  2 07:54:36.867534 systemd[1]: Stopped systemd-networkd.service.
Jul  2 07:54:36.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.868911 systemd[1]: systemd-networkd.socket: Deactivated successfully.
Jul  2 07:54:36.868945 systemd[1]: Closed systemd-networkd.socket.
Jul  2 07:54:36.874693 systemd[1]: Stopping network-cleanup.service...
Jul  2 07:54:36.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.875825 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully.
Jul  2 07:54:36.875886 systemd[1]: Stopped parse-ip-for-networkd.service.
Jul  2 07:54:36.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.877769 systemd[1]: systemd-sysctl.service: Deactivated successfully.
Jul  2 07:54:36.877824 systemd[1]: Stopped systemd-sysctl.service.
Jul  2 07:54:36.881384 systemd[1]: systemd-modules-load.service: Deactivated successfully.
Jul  2 07:54:36.881457 systemd[1]: Stopped systemd-modules-load.service.
Jul  2 07:54:36.882505 systemd[1]: Stopping systemd-udevd.service...
Jul  2 07:54:36.891707 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully.
Jul  2 07:54:36.892498 systemd[1]: systemd-resolved.service: Deactivated successfully.
Jul  2 07:54:36.892647 systemd[1]: Stopped systemd-resolved.service.
Jul  2 07:54:36.901554 systemd[1]: network-cleanup.service: Deactivated successfully.
Jul  2 07:54:36.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.901712 systemd[1]: Stopped network-cleanup.service.
Jul  2 07:54:36.904588 systemd[1]: systemd-udevd.service: Deactivated successfully.
Jul  2 07:54:36.905690 systemd[1]: Stopped systemd-udevd.service.
Jul  2 07:54:36.909076 systemd[1]: systemd-udevd-control.socket: Deactivated successfully.
Jul  2 07:54:36.909129 systemd[1]: Closed systemd-udevd-control.socket.
Jul  2 07:54:36.911812 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully.
Jul  2 07:54:36.911859 systemd[1]: Closed systemd-udevd-kernel.socket.
Jul  2 07:54:36.913554 systemd[1]: dracut-pre-udev.service: Deactivated successfully.
Jul  2 07:54:36.913605 systemd[1]: Stopped dracut-pre-udev.service.
Jul  2 07:54:36.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.914478 systemd[1]: dracut-cmdline.service: Deactivated successfully.
Jul  2 07:54:36.914518 systemd[1]: Stopped dracut-cmdline.service.
Jul  2 07:54:36.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:36.916367 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully.
Jul  2 07:54:36.916413 systemd[1]: Stopped dracut-cmdline-ask.service.
Jul  2 07:54:36.924322 systemd[1]: Starting initrd-udevadm-cleanup-db.service...
Jul  2 07:54:36.937282 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully.
Jul  2 07:54:36.937382 systemd[1]: Stopped systemd-vconsole-setup.service.
Jul  2 07:54:36.944622 systemd[1]: sysroot-boot.service: Deactivated successfully.
Jul  2 07:54:36.945402 systemd[1]: Stopped sysroot-boot.service.
Jul  2 07:54:36.947505 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully.
Jul  2 07:54:36.947594 systemd[1]: Finished initrd-udevadm-cleanup-db.service.
Jul  2 07:54:36.948719 systemd[1]: Reached target initrd-switch-root.target.
Jul  2 07:54:36.949543 systemd[1]: initrd-setup-root.service: Deactivated successfully.
Jul  2 07:54:36.949591 systemd[1]: Stopped initrd-setup-root.service.
Jul  2 07:54:36.952872 systemd[1]: Starting initrd-switch-root.service...
Jul  2 07:54:36.976761 systemd[1]: Switching root.
Jul  2 07:54:36.981000 audit: BPF prog-id=8 op=UNLOAD
Jul  2 07:54:36.981000 audit: BPF prog-id=7 op=UNLOAD
Jul  2 07:54:36.981000 audit: BPF prog-id=5 op=UNLOAD
Jul  2 07:54:36.981000 audit: BPF prog-id=4 op=UNLOAD
Jul  2 07:54:36.981000 audit: BPF prog-id=3 op=UNLOAD
Jul  2 07:54:36.998001 iscsid[1108]: iscsid shutting down.
Jul  2 07:54:36.998940 systemd-journald[185]: Received SIGTERM from PID 1 (n/a).
Jul  2 07:54:36.999013 systemd-journald[185]: Journal stopped
Jul  2 07:54:42.322023 kernel: SELinux:  Class mctp_socket not defined in policy.
Jul  2 07:54:42.322091 kernel: SELinux:  Class anon_inode not defined in policy.
Jul  2 07:54:42.322109 kernel: SELinux: the above unknown classes and permissions will be allowed
Jul  2 07:54:42.322130 kernel: SELinux:  policy capability network_peer_controls=1
Jul  2 07:54:42.322157 kernel: SELinux:  policy capability open_perms=1
Jul  2 07:54:42.322175 kernel: SELinux:  policy capability extended_socket_class=1
Jul  2 07:54:42.322202 kernel: SELinux:  policy capability always_check_network=0
Jul  2 07:54:42.322219 kernel: SELinux:  policy capability cgroup_seclabel=1
Jul  2 07:54:42.322237 kernel: SELinux:  policy capability nnp_nosuid_transition=1
Jul  2 07:54:42.322254 kernel: SELinux:  policy capability genfs_seclabel_symlinks=0
Jul  2 07:54:42.322271 kernel: SELinux:  policy capability ioctl_skip_cloexec=0
Jul  2 07:54:42.322300 systemd[1]: Successfully loaded SELinux policy in 83.958ms.
Jul  2 07:54:42.322334 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.214ms.
Jul  2 07:54:42.322354 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified)
Jul  2 07:54:42.322376 systemd[1]: Detected virtualization amazon.
Jul  2 07:54:42.322395 systemd[1]: Detected architecture x86-64.
Jul  2 07:54:42.322413 systemd[1]: Detected first boot.
Jul  2 07:54:42.322431 systemd[1]: Initializing machine ID from VM UUID.
Jul  2 07:54:42.322449 kernel: SELinux:  Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped).
Jul  2 07:54:42.322468 systemd[1]: Populated /etc with preset unit settings.
Jul  2 07:54:42.322486 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Jul  2 07:54:42.322510 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Jul  2 07:54:42.322533 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Jul  2 07:54:42.322553 systemd[1]: Queued start job for default target multi-user.target.
Jul  2 07:54:42.322571 systemd[1]: Created slice system-addon\x2dconfig.slice.
Jul  2 07:54:42.322589 systemd[1]: Created slice system-addon\x2drun.slice.
Jul  2 07:54:42.322607 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice.
Jul  2 07:54:42.322625 systemd[1]: Created slice system-getty.slice.
Jul  2 07:54:42.322642 systemd[1]: Created slice system-modprobe.slice.
Jul  2 07:54:42.322667 systemd[1]: Created slice system-serial\x2dgetty.slice.
Jul  2 07:54:42.322689 systemd[1]: Created slice system-system\x2dcloudinit.slice.
Jul  2 07:54:42.322708 systemd[1]: Created slice system-systemd\x2dfsck.slice.
Jul  2 07:54:42.322728 systemd[1]: Created slice user.slice.
Jul  2 07:54:42.322745 systemd[1]: Started systemd-ask-password-console.path.
Jul  2 07:54:42.322763 systemd[1]: Started systemd-ask-password-wall.path.
Jul  2 07:54:42.322781 systemd[1]: Set up automount boot.automount.
Jul  2 07:54:42.322799 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount.
Jul  2 07:54:42.322817 systemd[1]: Reached target integritysetup.target.
Jul  2 07:54:42.322839 systemd[1]: Reached target remote-cryptsetup.target.
Jul  2 07:54:42.322857 systemd[1]: Reached target remote-fs.target.
Jul  2 07:54:42.322875 systemd[1]: Reached target slices.target.
Jul  2 07:54:42.322893 systemd[1]: Reached target swap.target.
Jul  2 07:54:42.322912 systemd[1]: Reached target torcx.target.
Jul  2 07:54:42.322930 systemd[1]: Reached target veritysetup.target.
Jul  2 07:54:42.322949 systemd[1]: Listening on systemd-coredump.socket.
Jul  2 07:54:42.322967 systemd[1]: Listening on systemd-initctl.socket.
Jul  2 07:54:42.322988 kernel: kauditd_printk_skb: 50 callbacks suppressed
Jul  2 07:54:42.323005 kernel: audit: type=1400 audit(1719906882.026:87): avc:  denied  { audit_read } for  pid=1 comm="systemd" capability=37  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Jul  2 07:54:42.323023 systemd[1]: Listening on systemd-journald-audit.socket.
Jul  2 07:54:42.323042 kernel: audit: type=1335 audit(1719906882.026:88): pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1
Jul  2 07:54:42.323060 systemd[1]: Listening on systemd-journald-dev-log.socket.
Jul  2 07:54:42.323077 systemd[1]: Listening on systemd-journald.socket.
Jul  2 07:54:42.323095 systemd[1]: Listening on systemd-networkd.socket.
Jul  2 07:54:42.323113 systemd[1]: Listening on systemd-udevd-control.socket.
Jul  2 07:54:42.323133 systemd[1]: Listening on systemd-udevd-kernel.socket.
Jul  2 07:54:42.323159 systemd[1]: Listening on systemd-userdbd.socket.
Jul  2 07:54:42.323177 systemd[1]: Mounting dev-hugepages.mount...
Jul  2 07:54:42.323196 systemd[1]: Mounting dev-mqueue.mount...
Jul  2 07:54:42.323213 systemd[1]: Mounting media.mount...
Jul  2 07:54:42.323232 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:42.323250 systemd[1]: Mounting sys-kernel-debug.mount...
Jul  2 07:54:42.323268 systemd[1]: Mounting sys-kernel-tracing.mount...
Jul  2 07:54:42.323286 systemd[1]: Mounting tmp.mount...
Jul  2 07:54:42.323317 systemd[1]: Starting flatcar-tmpfiles.service...
Jul  2 07:54:42.323335 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Jul  2 07:54:42.323353 systemd[1]: Starting kmod-static-nodes.service...
Jul  2 07:54:42.323370 systemd[1]: Starting modprobe@configfs.service...
Jul  2 07:54:42.323388 systemd[1]: Starting modprobe@dm_mod.service...
Jul  2 07:54:42.323406 systemd[1]: Starting modprobe@drm.service...
Jul  2 07:54:42.323425 systemd[1]: Starting modprobe@efi_pstore.service...
Jul  2 07:54:42.323549 systemd[1]: Starting modprobe@fuse.service...
Jul  2 07:54:42.323577 systemd[1]: Starting modprobe@loop.service...
Jul  2 07:54:42.323600 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf).
Jul  2 07:54:42.323620 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.
Jul  2 07:54:42.323639 systemd[1]: (This warning is only shown for the first unit using IP firewalling.)
Jul  2 07:54:42.323657 systemd[1]: Starting systemd-journald.service...
Jul  2 07:54:42.323675 systemd[1]: Starting systemd-modules-load.service...
Jul  2 07:54:42.323694 systemd[1]: Starting systemd-network-generator.service...
Jul  2 07:54:42.323713 systemd[1]: Starting systemd-remount-fs.service...
Jul  2 07:54:42.323731 systemd[1]: Starting systemd-udev-trigger.service...
Jul  2 07:54:42.323749 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:42.323771 systemd[1]: Mounted dev-hugepages.mount.
Jul  2 07:54:42.323789 systemd[1]: Mounted dev-mqueue.mount.
Jul  2 07:54:42.323808 systemd[1]: Mounted media.mount.
Jul  2 07:54:42.323826 systemd[1]: Mounted sys-kernel-debug.mount.
Jul  2 07:54:42.323845 systemd[1]: Mounted sys-kernel-tracing.mount.
Jul  2 07:54:42.323863 systemd[1]: Mounted tmp.mount.
Jul  2 07:54:42.323882 systemd[1]: Finished kmod-static-nodes.service.
Jul  2 07:54:42.323900 systemd[1]: modprobe@configfs.service: Deactivated successfully.
Jul  2 07:54:42.323920 kernel: audit: type=1130 audit(1719906882.260:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.323941 systemd[1]: Finished modprobe@configfs.service.
Jul  2 07:54:42.323960 kernel: audit: type=1130 audit(1719906882.270:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.323979 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul  2 07:54:42.323998 systemd[1]: Finished modprobe@dm_mod.service.
Jul  2 07:54:42.324017 kernel: audit: type=1131 audit(1719906882.270:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.324034 systemd[1]: modprobe@drm.service: Deactivated successfully.
Jul  2 07:54:42.324104 systemd[1]: Finished modprobe@drm.service.
Jul  2 07:54:42.324129 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Jul  2 07:54:42.324151 systemd[1]: Finished modprobe@efi_pstore.service.
Jul  2 07:54:42.324171 kernel: audit: type=1130 audit(1719906882.299:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.324188 systemd[1]: Finished systemd-network-generator.service.
Jul  2 07:54:42.324207 kernel: audit: type=1131 audit(1719906882.299:93): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.341312 kernel: audit: type=1130 audit(1719906882.304:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.341372 kernel: audit: type=1131 audit(1719906882.304:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.341400 kernel: audit: type=1130 audit(1719906882.316:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.341422 systemd[1]: Finished systemd-remount-fs.service.
Jul  2 07:54:42.341456 systemd-journald[1437]: Journal started
Jul  2 07:54:42.341541 systemd-journald[1437]: Runtime Journal (/run/log/journal/ec236d41dce3ad9a9fae55f0ed8878c3) is 4.8M, max 38.7M, 33.9M free.
Jul  2 07:54:42.026000 audit[1]: AVC avc:  denied  { audit_read } for  pid=1 comm="systemd" capability=37  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
Jul  2 07:54:42.026000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1
Jul  2 07:54:42.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.319000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1
Jul  2 07:54:42.319000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe5a8c6a70 a2=4000 a3=7ffe5a8c6b0c items=0 ppid=1 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:54:42.319000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald"
Jul  2 07:54:42.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.344207 kernel: loop: module loaded
Jul  2 07:54:42.344249 systemd[1]: Started systemd-journald.service.
Jul  2 07:54:42.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.354832 kernel: fuse: init (API version 7.34)
Jul  2 07:54:42.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.349008 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul  2 07:54:42.349498 systemd[1]: Finished modprobe@loop.service.
Jul  2 07:54:42.352009 systemd[1]: Finished systemd-modules-load.service.
Jul  2 07:54:42.353956 systemd[1]: Reached target network-pre.target.
Jul  2 07:54:42.360852 systemd[1]: Mounting sys-kernel-config.mount...
Jul  2 07:54:42.362434 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/).
Jul  2 07:54:42.365800 systemd[1]: Starting systemd-hwdb-update.service...
Jul  2 07:54:42.368873 systemd[1]: Starting systemd-journal-flush.service...
Jul  2 07:54:42.371010 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul  2 07:54:42.373393 systemd[1]: Starting systemd-random-seed.service...
Jul  2 07:54:42.375354 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Jul  2 07:54:42.386109 systemd[1]: Starting systemd-sysctl.service...
Jul  2 07:54:42.393851 systemd[1]: modprobe@fuse.service: Deactivated successfully.
Jul  2 07:54:42.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.397185 systemd[1]: Finished modprobe@fuse.service.
Jul  2 07:54:42.405187 systemd-journald[1437]: Time spent on flushing to /var/log/journal/ec236d41dce3ad9a9fae55f0ed8878c3 is 62.885ms for 1105 entries.
Jul  2 07:54:42.405187 systemd-journald[1437]: System Journal (/var/log/journal/ec236d41dce3ad9a9fae55f0ed8878c3) is 8.0M, max 195.6M, 187.6M free.
Jul  2 07:54:42.503643 systemd-journald[1437]: Received client request to flush runtime journal.
Jul  2 07:54:42.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.401899 systemd[1]: Mounted sys-kernel-config.mount.
Jul  2 07:54:42.405412 systemd[1]: Mounting sys-fs-fuse-connections.mount...
Jul  2 07:54:42.411595 systemd[1]: Mounted sys-fs-fuse-connections.mount.
Jul  2 07:54:42.428469 systemd[1]: Finished systemd-random-seed.service.
Jul  2 07:54:42.429653 systemd[1]: Reached target first-boot-complete.target.
Jul  2 07:54:42.461632 systemd[1]: Finished systemd-sysctl.service.
Jul  2 07:54:42.505147 systemd[1]: Finished systemd-journal-flush.service.
Jul  2 07:54:42.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.546162 systemd[1]: Finished flatcar-tmpfiles.service.
Jul  2 07:54:42.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.547713 systemd[1]: Finished systemd-udev-trigger.service.
Jul  2 07:54:42.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.550773 systemd[1]: Starting systemd-sysusers.service...
Jul  2 07:54:42.554482 systemd[1]: Starting systemd-udev-settle.service...
Jul  2 07:54:42.587346 udevadm[1497]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in.
Jul  2 07:54:42.697354 systemd[1]: Finished systemd-sysusers.service.
Jul  2 07:54:42.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.701196 systemd[1]: Starting systemd-tmpfiles-setup-dev.service...
Jul  2 07:54:42.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:42.795557 systemd[1]: Finished systemd-tmpfiles-setup-dev.service.
Jul  2 07:54:43.204632 systemd[1]: Finished systemd-hwdb-update.service.
Jul  2 07:54:43.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:43.207986 systemd[1]: Starting systemd-udevd.service...
Jul  2 07:54:43.233474 systemd-udevd[1504]: Using default interface naming scheme 'v252'.
Jul  2 07:54:43.307626 systemd[1]: Started systemd-udevd.service.
Jul  2 07:54:43.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:43.313076 systemd[1]: Starting systemd-networkd.service...
Jul  2 07:54:43.335402 systemd[1]: Starting systemd-userdbd.service...
Jul  2 07:54:43.399662 (udev-worker)[1519]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:54:43.407986 systemd[1]: Found device dev-ttyS0.device.
Jul  2 07:54:43.415300 systemd[1]: Started systemd-userdbd.service.
Jul  2 07:54:43.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:43.551318 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3
Jul  2 07:54:43.559321 kernel: ACPI: button: Power Button [PWRF]
Jul  2 07:54:43.563615 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4
Jul  2 07:54:43.565342 kernel: ACPI: button: Sleep Button [SLPF]
Jul  2 07:54:43.595347 systemd-networkd[1510]: lo: Link UP
Jul  2 07:54:43.595357 systemd-networkd[1510]: lo: Gained carrier
Jul  2 07:54:43.596057 systemd-networkd[1510]: Enumeration completed
Jul  2 07:54:43.596324 systemd[1]: Started systemd-networkd.service.
Jul  2 07:54:43.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:43.599855 systemd[1]: Starting systemd-networkd-wait-online.service...
Jul  2 07:54:43.601528 systemd-networkd[1510]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network.
Jul  2 07:54:43.607339 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Jul  2 07:54:43.607976 systemd-networkd[1510]: eth0: Link UP
Jul  2 07:54:43.608455 systemd-networkd[1510]: eth0: Gained carrier
Jul  2 07:54:43.617473 systemd-networkd[1510]: eth0: DHCPv4 address 172.31.22.44/20, gateway 172.31.16.1 acquired from 172.31.16.1
Jul  2 07:54:43.598000 audit[1505]: AVC avc:  denied  { confidentiality } for  pid=1505 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1
Jul  2 07:54:43.649318 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1520)
Jul  2 07:54:43.598000 audit[1505]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56136f64ecc0 a1=3207c a2=7fdc996f1bc5 a3=5 items=108 ppid=1504 pid=1505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:54:43.598000 audit: CWD cwd="/"
Jul  2 07:54:43.598000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=1 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=2 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=3 name=(null) inode=14739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=4 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=5 name=(null) inode=14740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=6 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=7 name=(null) inode=14741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=8 name=(null) inode=14741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=9 name=(null) inode=14742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=10 name=(null) inode=14741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=11 name=(null) inode=14743 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=12 name=(null) inode=14741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=13 name=(null) inode=14744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=14 name=(null) inode=14741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=15 name=(null) inode=14745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=16 name=(null) inode=14741 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=17 name=(null) inode=14746 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=18 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=19 name=(null) inode=14747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=20 name=(null) inode=14747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=21 name=(null) inode=14748 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=22 name=(null) inode=14747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=23 name=(null) inode=14749 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=24 name=(null) inode=14747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=25 name=(null) inode=14750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=26 name=(null) inode=14747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=27 name=(null) inode=14751 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=28 name=(null) inode=14747 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=29 name=(null) inode=14752 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=30 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=31 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=32 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=33 name=(null) inode=14754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=34 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=35 name=(null) inode=14755 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=36 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=37 name=(null) inode=14756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=38 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=39 name=(null) inode=14757 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=40 name=(null) inode=14753 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=41 name=(null) inode=14758 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=42 name=(null) inode=14738 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=43 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=44 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=45 name=(null) inode=14760 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=46 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=47 name=(null) inode=14761 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=48 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=49 name=(null) inode=14762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=50 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=51 name=(null) inode=14763 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=52 name=(null) inode=14759 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=53 name=(null) inode=14764 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=55 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=56 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=57 name=(null) inode=14766 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=58 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=59 name=(null) inode=14767 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=60 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=61 name=(null) inode=14768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=62 name=(null) inode=14768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=63 name=(null) inode=14769 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=64 name=(null) inode=14768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=65 name=(null) inode=14770 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=66 name=(null) inode=14768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=67 name=(null) inode=14771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=68 name=(null) inode=14768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=69 name=(null) inode=14772 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=70 name=(null) inode=14768 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=71 name=(null) inode=14773 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=72 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=73 name=(null) inode=14774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=74 name=(null) inode=14774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=75 name=(null) inode=14775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=76 name=(null) inode=14774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=77 name=(null) inode=14776 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=78 name=(null) inode=14774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=79 name=(null) inode=14777 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=80 name=(null) inode=14774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=81 name=(null) inode=14778 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=82 name=(null) inode=14774 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=83 name=(null) inode=14779 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=84 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=85 name=(null) inode=14780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=86 name=(null) inode=14780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=87 name=(null) inode=14781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=88 name=(null) inode=14780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=89 name=(null) inode=14782 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=90 name=(null) inode=14780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=91 name=(null) inode=14783 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=92 name=(null) inode=14780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=93 name=(null) inode=14784 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=94 name=(null) inode=14780 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=95 name=(null) inode=14785 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=96 name=(null) inode=14765 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=97 name=(null) inode=14786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=98 name=(null) inode=14786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=99 name=(null) inode=14787 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=100 name=(null) inode=14786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=101 name=(null) inode=14788 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=102 name=(null) inode=14786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=103 name=(null) inode=14789 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=104 name=(null) inode=14786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=105 name=(null) inode=14790 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=106 name=(null) inode=14786 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PATH item=107 name=(null) inode=14791 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:54:43.598000 audit: PROCTITLE proctitle="(udev-worker)"
Jul  2 07:54:43.681311 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0xb100, revision 255
Jul  2 07:54:43.702315 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input5
Jul  2 07:54:43.710313 kernel: mousedev: PS/2 mouse device common for all mice
Jul  2 07:54:43.799451 systemd[1]: dev-disk-by\x2dlabel-OEM.device was skipped because of an unmet condition check (ConditionPathExists=!/usr/.noupdate).
Jul  2 07:54:43.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:43.917042 systemd[1]: Finished systemd-udev-settle.service.
Jul  2 07:54:43.922497 systemd[1]: Starting lvm2-activation-early.service...
Jul  2 07:54:43.978688 lvm[1619]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Jul  2 07:54:44.024767 systemd[1]: Finished lvm2-activation-early.service.
Jul  2 07:54:44.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.025917 systemd[1]: Reached target cryptsetup.target.
Jul  2 07:54:44.031449 systemd[1]: Starting lvm2-activation.service...
Jul  2 07:54:44.044236 lvm[1621]:   WARNING: Failed to connect to lvmetad. Falling back to device scanning.
Jul  2 07:54:44.075618 systemd[1]: Finished lvm2-activation.service.
Jul  2 07:54:44.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.076701 systemd[1]: Reached target local-fs-pre.target.
Jul  2 07:54:44.081264 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw).
Jul  2 07:54:44.081323 systemd[1]: Reached target local-fs.target.
Jul  2 07:54:44.082274 systemd[1]: Reached target machines.target.
Jul  2 07:54:44.090721 systemd[1]: Starting ldconfig.service...
Jul  2 07:54:44.096744 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Jul  2 07:54:44.096847 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:44.098849 systemd[1]: Starting systemd-boot-update.service...
Jul  2 07:54:44.106043 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service...
Jul  2 07:54:44.110587 systemd[1]: Starting systemd-machine-id-commit.service...
Jul  2 07:54:44.113770 systemd[1]: Starting systemd-sysext.service...
Jul  2 07:54:44.129651 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1624 (bootctl)
Jul  2 07:54:44.132246 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service...
Jul  2 07:54:44.150563 systemd[1]: Unmounting usr-share-oem.mount...
Jul  2 07:54:44.164570 systemd[1]: usr-share-oem.mount: Deactivated successfully.
Jul  2 07:54:44.164912 systemd[1]: Unmounted usr-share-oem.mount.
Jul  2 07:54:44.188371 kernel: loop0: detected capacity change from 0 to 209816
Jul  2 07:54:44.189239 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service.
Jul  2 07:54:44.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.336318 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher
Jul  2 07:54:44.358316 kernel: loop1: detected capacity change from 0 to 209816
Jul  2 07:54:44.374443 (sd-sysext)[1640]: Using extensions 'kubernetes'.
Jul  2 07:54:44.374969 (sd-sysext)[1640]: Merged extensions into '/usr'.
Jul  2 07:54:44.380256 systemd-fsck[1637]: fsck.fat 4.2 (2021-01-31)
Jul  2 07:54:44.380256 systemd-fsck[1637]: /dev/nvme0n1p1: 789 files, 119238/258078 clusters
Jul  2 07:54:44.382077 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service.
Jul  2 07:54:44.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.385883 systemd[1]: Mounting boot.mount...
Jul  2 07:54:44.430900 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:44.434078 systemd[1]: Mounting usr-share-oem.mount...
Jul  2 07:54:44.436498 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Jul  2 07:54:44.441764 systemd[1]: Starting modprobe@dm_mod.service...
Jul  2 07:54:44.444660 systemd[1]: Starting modprobe@efi_pstore.service...
Jul  2 07:54:44.447825 systemd[1]: Starting modprobe@loop.service...
Jul  2 07:54:44.454211 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Jul  2 07:54:44.454556 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:44.454863 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:44.470604 systemd[1]: Mounted boot.mount.
Jul  2 07:54:44.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.471841 systemd[1]: Mounted usr-share-oem.mount.
Jul  2 07:54:44.473464 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul  2 07:54:44.473709 systemd[1]: Finished modprobe@dm_mod.service.
Jul  2 07:54:44.475413 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Jul  2 07:54:44.475634 systemd[1]: Finished modprobe@efi_pstore.service.
Jul  2 07:54:44.477456 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul  2 07:54:44.486777 systemd[1]: Finished systemd-sysext.service.
Jul  2 07:54:44.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:44.490379 systemd[1]: Starting ensure-sysext.service...
Jul  2 07:54:44.493610 systemd[1]: Starting systemd-tmpfiles-setup.service...
Jul  2 07:54:44.496671 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul  2 07:54:44.497038 systemd[1]: Finished modprobe@loop.service.
Jul  2 07:54:44.498170 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Jul  2 07:54:44.524610 systemd[1]: Reloading.
Jul  2 07:54:44.538737 systemd-tmpfiles[1663]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring.
Jul  2 07:54:44.552603 systemd-tmpfiles[1663]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring.
Jul  2 07:54:44.568281 systemd-tmpfiles[1663]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring.
Jul  2 07:54:44.700756 /usr/lib/systemd/system-generators/torcx-generator[1693]: time="2024-07-02T07:54:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]"
Jul  2 07:54:44.700794 /usr/lib/systemd/system-generators/torcx-generator[1693]: time="2024-07-02T07:54:44Z" level=info msg="torcx already run"
Jul  2 07:54:44.845505 systemd-networkd[1510]: eth0: Gained IPv6LL
Jul  2 07:54:44.907345 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Jul  2 07:54:44.907369 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Jul  2 07:54:44.956876 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Jul  2 07:54:45.049729 systemd[1]: etc-machine\x2did.mount: Deactivated successfully.
Jul  2 07:54:45.069257 systemd[1]: Finished systemd-networkd-wait-online.service.
Jul  2 07:54:45.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.071970 systemd[1]: Finished systemd-boot-update.service.
Jul  2 07:54:45.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.073278 systemd[1]: Finished systemd-machine-id-commit.service.
Jul  2 07:54:45.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.075573 systemd[1]: Finished systemd-tmpfiles-setup.service.
Jul  2 07:54:45.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.091994 systemd[1]: Starting audit-rules.service...
Jul  2 07:54:45.096043 systemd[1]: Starting clean-ca-certificates.service...
Jul  2 07:54:45.100442 systemd[1]: Starting systemd-journal-catalog-update.service...
Jul  2 07:54:45.104803 systemd[1]: Starting systemd-resolved.service...
Jul  2 07:54:45.110233 systemd[1]: Starting systemd-timesyncd.service...
Jul  2 07:54:45.122314 systemd[1]: Starting systemd-update-utmp.service...
Jul  2 07:54:45.127918 systemd[1]: Finished clean-ca-certificates.service.
Jul  2 07:54:45.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.136000 audit[1759]: SYSTEM_BOOT pid=1759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.149395 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:45.150004 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.152764 systemd[1]: Starting modprobe@dm_mod.service...
Jul  2 07:54:45.157143 systemd[1]: Starting modprobe@efi_pstore.service...
Jul  2 07:54:45.160387 systemd[1]: Starting modprobe@loop.service...
Jul  2 07:54:45.162119 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.162442 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:45.162737 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Jul  2 07:54:45.162929 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:45.166085 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul  2 07:54:45.167518 systemd[1]: Finished modprobe@dm_mod.service.
Jul  2 07:54:45.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.182711 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Jul  2 07:54:45.183198 systemd[1]: Finished modprobe@efi_pstore.service.
Jul  2 07:54:45.184928 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:45.187556 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.189986 systemd[1]: Starting modprobe@dm_mod.service...
Jul  2 07:54:45.191197 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.191393 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:45.191550 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul  2 07:54:45.191689 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Jul  2 07:54:45.191799 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:45.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.198243 systemd[1]: Finished systemd-update-utmp.service.
Jul  2 07:54:45.199954 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul  2 07:54:45.200173 systemd[1]: Finished modprobe@dm_mod.service.
Jul  2 07:54:45.215077 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:45.215656 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.219848 systemd[1]: Starting modprobe@dm_mod.service...
Jul  2 07:54:45.222781 systemd[1]: Starting modprobe@drm.service...
Jul  2 07:54:45.228060 systemd[1]: Starting modprobe@efi_pstore.service...
Jul  2 07:54:45.229606 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.229823 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:45.230031 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt).
Jul  2 07:54:45.230175 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen).
Jul  2 07:54:45.231696 systemd[1]: modprobe@loop.service: Deactivated successfully.
Jul  2 07:54:45.231924 systemd[1]: Finished modprobe@loop.service.
Jul  2 07:54:45.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.237702 systemd[1]: modprobe@dm_mod.service: Deactivated successfully.
Jul  2 07:54:45.237933 systemd[1]: Finished modprobe@dm_mod.service.
Jul  2 07:54:45.240551 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.247078 systemd[1]: Finished ensure-sysext.service.
Jul  2 07:54:45.249105 systemd[1]: modprobe@drm.service: Deactivated successfully.
Jul  2 07:54:45.249343 systemd[1]: Finished modprobe@drm.service.
Jul  2 07:54:45.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.260338 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully.
Jul  2 07:54:45.260897 systemd[1]: Finished modprobe@efi_pstore.service.
Jul  2 07:54:45.262237 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore).
Jul  2 07:54:45.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:45.327325 systemd[1]: Finished systemd-journal-catalog-update.service.
Jul  2 07:54:45.356000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1
Jul  2 07:54:45.356000 audit[1792]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe0cc9c7a0 a2=420 a3=0 items=0 ppid=1752 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:54:45.356000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573
Jul  2 07:54:45.357837 augenrules[1792]: No rules
Jul  2 07:54:45.358583 systemd[1]: Finished audit-rules.service.
Jul  2 07:54:45.407032 systemd-resolved[1755]: Positive Trust Anchors:
Jul  2 07:54:45.408223 systemd-resolved[1755]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d
Jul  2 07:54:45.408368 systemd-resolved[1755]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test
Jul  2 07:54:45.418387 systemd[1]: Started systemd-timesyncd.service.
Jul  2 07:54:45.419687 systemd[1]: Reached target time-set.target.
Jul  2 07:54:45.439645 ldconfig[1623]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start.
Jul  2 07:54:45.446642 systemd[1]: Finished ldconfig.service.
Jul  2 07:54:45.450631 systemd[1]: Starting systemd-update-done.service...
Jul  2 07:54:45.458053 systemd-resolved[1755]: Defaulting to hostname 'linux'.
Jul  2 07:54:45.461037 systemd[1]: Started systemd-resolved.service.
Jul  2 07:54:45.462351 systemd[1]: Reached target network.target.
Jul  2 07:54:45.463225 systemd[1]: Reached target network-online.target.
Jul  2 07:54:45.464332 systemd[1]: Reached target nss-lookup.target.
Jul  2 07:54:45.469628 systemd[1]: Finished systemd-update-done.service.
Jul  2 07:54:45.470714 systemd[1]: Reached target sysinit.target.
Jul  2 07:54:45.471770 systemd[1]: Started motdgen.path.
Jul  2 07:54:45.472661 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path.
Jul  2 07:54:45.474061 systemd[1]: Started logrotate.timer.
Jul  2 07:54:45.475100 systemd[1]: Started mdadm.timer.
Jul  2 07:54:45.475869 systemd[1]: Started systemd-tmpfiles-clean.timer.
Jul  2 07:54:45.476970 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate).
Jul  2 07:54:45.477005 systemd[1]: Reached target paths.target.
Jul  2 07:54:45.477875 systemd[1]: Reached target timers.target.
Jul  2 07:54:45.479519 systemd[1]: Listening on dbus.socket.
Jul  2 07:54:45.481781 systemd[1]: Starting docker.socket...
Jul  2 07:54:45.485016 systemd[1]: Listening on sshd.socket.
Jul  2 07:54:45.486245 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:45.487241 systemd[1]: Listening on docker.socket.
Jul  2 07:54:45.488316 systemd[1]: Reached target sockets.target.
Jul  2 07:54:45.489336 systemd[1]: Reached target basic.target.
Jul  2 07:54:45.490914 systemd[1]: System is tainted: cgroupsv1
Jul  2 07:54:45.491082 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.491226 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met.
Jul  2 07:54:45.493381 systemd[1]: Started amazon-ssm-agent.service.
Jul  2 07:54:46.426887 systemd-resolved[1755]: Clock change detected. Flushing caches.
Jul  2 07:54:46.427414 systemd-timesyncd[1756]: Contacted time server 69.10.223.130:123 (0.flatcar.pool.ntp.org).
Jul  2 07:54:46.427831 systemd-timesyncd[1756]: Initial clock synchronization to Tue 2024-07-02 07:54:46.426844 UTC.
Jul  2 07:54:46.433665 systemd[1]: Starting containerd.service...
Jul  2 07:54:46.444479 systemd[1]: Starting coreos-metadata-sshkeys@core.service...
Jul  2 07:54:46.448933 systemd[1]: Starting dbus.service...
Jul  2 07:54:46.467147 systemd[1]: Starting enable-oem-cloudinit.service...
Jul  2 07:54:46.474878 systemd[1]: Starting extend-filesystems.service...
Jul  2 07:54:46.477100 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment).
Jul  2 07:54:46.480074 systemd[1]: Starting kubelet.service...
Jul  2 07:54:46.483883 systemd[1]: Starting motdgen.service...
Jul  2 07:54:46.496250 systemd[1]: Started nvidia.service.
Jul  2 07:54:46.501686 systemd[1]: Starting ssh-key-proc-cmdline.service...
Jul  2 07:54:46.508424 systemd[1]: Starting sshd-keygen.service...
Jul  2 07:54:46.521583 systemd[1]: Starting systemd-logind.service...
Jul  2 07:54:46.526084 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f).
Jul  2 07:54:46.526163 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0).
Jul  2 07:54:46.528474 systemd[1]: Starting update-engine.service...
Jul  2 07:54:46.535286 systemd[1]: Starting update-ssh-keys-after-ignition.service...
Jul  2 07:54:46.631619 jq[1810]: false
Jul  2 07:54:46.631772 jq[1821]: true
Jul  2 07:54:46.627216 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully.
Jul  2 07:54:46.627691 systemd[1]: Finished ssh-key-proc-cmdline.service.
Jul  2 07:54:46.629615 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'.
Jul  2 07:54:46.629930 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped.
Jul  2 07:54:46.713269 jq[1832]: true
Jul  2 07:54:46.816302 extend-filesystems[1811]: Found loop1
Jul  2 07:54:46.819414 extend-filesystems[1811]: Found nvme0n1
Jul  2 07:54:46.820808 extend-filesystems[1811]: Found nvme0n1p1
Jul  2 07:54:46.822033 extend-filesystems[1811]: Found nvme0n1p2
Jul  2 07:54:46.824606 systemd[1]: motdgen.service: Deactivated successfully.
Jul  2 07:54:46.824943 systemd[1]: Finished motdgen.service.
Jul  2 07:54:46.827844 extend-filesystems[1811]: Found nvme0n1p3
Jul  2 07:54:46.829264 extend-filesystems[1811]: Found usr
Jul  2 07:54:46.830304 extend-filesystems[1811]: Found nvme0n1p4
Jul  2 07:54:46.831389 extend-filesystems[1811]: Found nvme0n1p6
Jul  2 07:54:46.840071 extend-filesystems[1811]: Found nvme0n1p7
Jul  2 07:54:46.841055 extend-filesystems[1811]: Found nvme0n1p9
Jul  2 07:54:46.842155 extend-filesystems[1811]: Checking size of /dev/nvme0n1p9
Jul  2 07:54:46.846597 dbus-daemon[1808]: [system] SELinux support is enabled
Jul  2 07:54:46.846856 systemd[1]: Started dbus.service.
Jul  2 07:54:46.855097 amazon-ssm-agent[1804]: 2024/07/02 07:54:46 Failed to load instance info from vault. RegistrationKey does not exist.
Jul  2 07:54:46.851397 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml).
Jul  2 07:54:46.851433 systemd[1]: Reached target system-config.target.
Jul  2 07:54:46.853298 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url).
Jul  2 07:54:46.853330 systemd[1]: Reached target user-config.target.
Jul  2 07:54:46.880547 env[1824]: time="2024-07-02T07:54:46.877042867Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16
Jul  2 07:54:46.893491 extend-filesystems[1811]: Resized partition /dev/nvme0n1p9
Jul  2 07:54:46.894747 dbus-daemon[1808]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1510 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0")
Jul  2 07:54:46.896695 bash[1879]: Updated "/home/core/.ssh/authorized_keys"
Jul  2 07:54:46.896876 amazon-ssm-agent[1804]: Initializing new seelog logger
Jul  2 07:54:46.896876 amazon-ssm-agent[1804]: New Seelog Logger Creation Complete
Jul  2 07:54:46.896876 amazon-ssm-agent[1804]: 2024/07/02 07:54:46 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json.
Jul  2 07:54:46.896876 amazon-ssm-agent[1804]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json.
Jul  2 07:54:46.898869 amazon-ssm-agent[1804]: 2024/07/02 07:54:46 processing appconfig overrides
Jul  2 07:54:46.897664 systemd[1]: Finished update-ssh-keys-after-ignition.service.
Jul  2 07:54:46.899404 dbus-daemon[1808]: [system] Successfully activated service 'org.freedesktop.systemd1'
Jul  2 07:54:46.904947 systemd[1]: Starting systemd-hostnamed.service...
Jul  2 07:54:46.918227 extend-filesystems[1888]: resize2fs 1.46.5 (30-Dec-2021)
Jul  2 07:54:46.931048 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks
Jul  2 07:54:46.995281 env[1824]: time="2024-07-02T07:54:46.995162805Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1
Jul  2 07:54:46.995640 env[1824]: time="2024-07-02T07:54:46.995612583Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1
Jul  2 07:54:47.002303 env[1824]: time="2024-07-02T07:54:47.002226609Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1
Jul  2 07:54:47.002512 env[1824]: time="2024-07-02T07:54:47.002490161Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021492 env[1824]: time="2024-07-02T07:54:47.021042598Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021492 env[1824]: time="2024-07-02T07:54:47.021101827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021492 env[1824]: time="2024-07-02T07:54:47.021124680Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured"
Jul  2 07:54:47.021492 env[1824]: time="2024-07-02T07:54:47.021140118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021492 env[1824]: time="2024-07-02T07:54:47.021286678Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021781 env[1824]: time="2024-07-02T07:54:47.021581514Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021885 env[1824]: time="2024-07-02T07:54:47.021849415Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1
Jul  2 07:54:47.021885 env[1824]: time="2024-07-02T07:54:47.021878224Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1
Jul  2 07:54:47.021993 env[1824]: time="2024-07-02T07:54:47.021952760Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured"
Jul  2 07:54:47.022038 env[1824]: time="2024-07-02T07:54:47.021990245Z" level=info msg="metadata content store policy set" policy=shared
Jul  2 07:54:47.036060 update_engine[1820]: I0702 07:54:47.031535  1820 main.cc:92] Flatcar Update Engine starting
Jul  2 07:54:47.041743 systemd[1]: Started update-engine.service.
Jul  2 07:54:47.056563 update_engine[1820]: I0702 07:54:47.041802  1820 update_check_scheduler.cc:74] Next update check in 10m46s
Jul  2 07:54:47.045283 systemd[1]: Started locksmithd.service.
Jul  2 07:54:47.075992 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915
Jul  2 07:54:47.093044 extend-filesystems[1888]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required
Jul  2 07:54:47.093044 extend-filesystems[1888]: old_desc_blocks = 1, new_desc_blocks = 1
Jul  2 07:54:47.093044 extend-filesystems[1888]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long.
Jul  2 07:54:47.100724 extend-filesystems[1811]: Resized filesystem in /dev/nvme0n1p9
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096008786Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096055925Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096074612Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096117453Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096136648Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096155795Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096173510Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096192910Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096212826Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096230635Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096250603Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096268307Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096411642Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2
Jul  2 07:54:47.101831 env[1824]: time="2024-07-02T07:54:47.096508230Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1
Jul  2 07:54:47.094146 systemd[1]: extend-filesystems.service: Deactivated successfully.
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097379863Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097429465Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097448835Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097507800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097527531Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097543968Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097561577Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097581318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097601397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097618375Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097637209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097658890Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097820055Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097904607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.102525 env[1824]: time="2024-07-02T07:54:47.097926649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.094460 systemd[1]: Finished extend-filesystems.service.
Jul  2 07:54:47.103252 env[1824]: time="2024-07-02T07:54:47.097942703Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1
Jul  2 07:54:47.103252 env[1824]: time="2024-07-02T07:54:47.097978477Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1
Jul  2 07:54:47.103252 env[1824]: time="2024-07-02T07:54:47.097996830Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1
Jul  2 07:54:47.103252 env[1824]: time="2024-07-02T07:54:47.098020735Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin"
Jul  2 07:54:47.103252 env[1824]: time="2024-07-02T07:54:47.098063675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1
Jul  2 07:54:47.103458 env[1824]: time="2024-07-02T07:54:47.098326100Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}"
Jul  2 07:54:47.103458 env[1824]: time="2024-07-02T07:54:47.098406172Z" level=info msg="Connect containerd service"
Jul  2 07:54:47.103458 env[1824]: time="2024-07-02T07:54:47.098460991Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\""
Jul  2 07:54:47.107506 env[1824]: time="2024-07-02T07:54:47.105800830Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Jul  2 07:54:47.107941 env[1824]: time="2024-07-02T07:54:47.107885165Z" level=info msg="Start subscribing containerd event"
Jul  2 07:54:47.108288 env[1824]: time="2024-07-02T07:54:47.108213142Z" level=info msg="Start recovering state"
Jul  2 07:54:47.108669 env[1824]: time="2024-07-02T07:54:47.108642962Z" level=info msg="Start event monitor"
Jul  2 07:54:47.108913 env[1824]: time="2024-07-02T07:54:47.108863104Z" level=info msg="Start snapshots syncer"
Jul  2 07:54:47.109129 env[1824]: time="2024-07-02T07:54:47.109108808Z" level=info msg="Start cni network conf syncer for default"
Jul  2 07:54:47.109214 env[1824]: time="2024-07-02T07:54:47.109201277Z" level=info msg="Start streaming server"
Jul  2 07:54:47.114006 env[1824]: time="2024-07-02T07:54:47.113957061Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc
Jul  2 07:54:47.114232 env[1824]: time="2024-07-02T07:54:47.114214561Z" level=info msg=serving... address=/run/containerd/containerd.sock
Jul  2 07:54:47.114396 env[1824]: time="2024-07-02T07:54:47.114378439Z" level=info msg="containerd successfully booted in 0.243665s"
Jul  2 07:54:47.114815 systemd[1]: Started containerd.service.
Jul  2 07:54:47.378072 systemd-logind[1819]: Watching system buttons on /dev/input/event1 (Power Button)
Jul  2 07:54:47.378114 systemd-logind[1819]: Watching system buttons on /dev/input/event2 (Sleep Button)
Jul  2 07:54:47.378139 systemd-logind[1819]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard)
Jul  2 07:54:47.384102 systemd-logind[1819]: New seat seat0.
Jul  2 07:54:47.391891 systemd[1]: Started systemd-logind.service.
Jul  2 07:54:47.424792 systemd[1]: nvidia.service: Deactivated successfully.
Jul  2 07:54:47.526155 dbus-daemon[1808]: [system] Successfully activated service 'org.freedesktop.hostname1'
Jul  2 07:54:47.526344 systemd[1]: Started systemd-hostnamed.service.
Jul  2 07:54:47.526856 dbus-daemon[1808]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1889 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0")
Jul  2 07:54:47.532459 systemd[1]: Starting polkit.service...
Jul  2 07:54:47.552483 polkitd[1964]: Started polkitd version 121
Jul  2 07:54:47.575036 polkitd[1964]: Loading rules from directory /etc/polkit-1/rules.d
Jul  2 07:54:47.575117 polkitd[1964]: Loading rules from directory /usr/share/polkit-1/rules.d
Jul  2 07:54:47.577217 polkitd[1964]: Finished loading, compiling and executing 2 rules
Jul  2 07:54:47.578020 systemd[1]: Started polkit.service.
Jul  2 07:54:47.577787 dbus-daemon[1808]: [system] Successfully activated service 'org.freedesktop.PolicyKit1'
Jul  2 07:54:47.578440 polkitd[1964]: Acquired the name org.freedesktop.PolicyKit1 on the system bus
Jul  2 07:54:47.594756 systemd-hostnamed[1889]: Hostname set to <ip-172-31-22-44> (transient)
Jul  2 07:54:47.594757 systemd-resolved[1755]: System hostname changed to 'ip-172-31-22-44'.
Jul  2 07:54:47.605906 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Create new startup processor
Jul  2 07:54:47.606135 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [LongRunningPluginsManager] registered plugins: {}
Jul  2 07:54:47.606200 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing bookkeeping folders
Jul  2 07:54:47.606200 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO removing the completed state files
Jul  2 07:54:47.606200 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing bookkeeping folders for long running plugins
Jul  2 07:54:47.606200 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing replies folder for MDS reply requests that couldn't reach the service
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing healthcheck folders for long running plugins
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing locations for inventory plugin
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing default location for custom inventory
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing default location for file inventory
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Initializing default location for role inventory
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Init the cloudwatchlogs publisher
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:runDockerAction
Jul  2 07:54:47.606343 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:refreshAssociation
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:downloadContent
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:softwareInventory
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:runPowerShellScript
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:updateSsmAgent
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:configureDocker
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:configurePackage
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform independent plugin aws:runDocument
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Successfully loaded platform dependent plugin aws:runShellScript
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0
Jul  2 07:54:47.606632 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO OS: linux, Arch: amd64
Jul  2 07:54:47.608878 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] Starting document processing engine...
Jul  2 07:54:47.630339 amazon-ssm-agent[1804]: datastore file /var/lib/amazon/ssm/i-0c010cd22e431a4ca/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute
Jul  2 07:54:47.652214 coreos-metadata[1807]: Jul 02 07:54:47.650 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Jul  2 07:54:47.654463 coreos-metadata[1807]: Jul 02 07:54:47.654 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1
Jul  2 07:54:47.655240 coreos-metadata[1807]: Jul 02 07:54:47.655 INFO Fetch successful
Jul  2 07:54:47.655240 coreos-metadata[1807]: Jul 02 07:54:47.655 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1
Jul  2 07:54:47.656082 coreos-metadata[1807]: Jul 02 07:54:47.655 INFO Fetch successful
Jul  2 07:54:47.659054 unknown[1807]: wrote ssh authorized keys file for user: core
Jul  2 07:54:47.681242 update-ssh-keys[1989]: Updated "/home/core/.ssh/authorized_keys"
Jul  2 07:54:47.680776 systemd[1]: Finished coreos-metadata-sshkeys@core.service.
Jul  2 07:54:47.724780 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [EngineProcessor] Starting
Jul  2 07:54:47.820409 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing
Jul  2 07:54:47.913670 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] Starting message polling
Jul  2 07:54:48.008365 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] Starting send replies to MDS
Jul  2 07:54:48.103377 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [instanceID=i-0c010cd22e431a4ca] Starting association polling
Jul  2 07:54:48.135757 locksmithd[1901]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot"
Jul  2 07:54:48.205342 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting
Jul  2 07:54:48.298622 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [Association] Launching response handler
Jul  2 07:54:48.395020 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing
Jul  2 07:54:48.490883 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service
Jul  2 07:54:48.586923 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized
Jul  2 07:54:48.682758 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [HealthCheck] HealthCheck reporting agent health.
Jul  2 07:54:48.769569 systemd[1]: Started kubelet.service.
Jul  2 07:54:48.779078 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [OfflineService] Starting document processing engine...
Jul  2 07:54:48.875538 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [OfflineService] [EngineProcessor] Starting
Jul  2 07:54:48.972230 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [OfflineService] [EngineProcessor] Initial processing
Jul  2 07:54:49.069404 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [OfflineService] Starting message polling
Jul  2 07:54:49.164294 sshd_keygen[1859]: ssh-keygen: generating new host keys: RSA ECDSA ED25519
Jul  2 07:54:49.166709 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [OfflineService] Starting send replies to MDS
Jul  2 07:54:49.204613 systemd[1]: Finished sshd-keygen.service.
Jul  2 07:54:49.209439 systemd[1]: Starting issuegen.service...
Jul  2 07:54:49.225483 systemd[1]: issuegen.service: Deactivated successfully.
Jul  2 07:54:49.225920 systemd[1]: Finished issuegen.service.
Jul  2 07:54:49.237522 systemd[1]: Starting systemd-user-sessions.service...
Jul  2 07:54:49.249311 systemd[1]: Finished systemd-user-sessions.service.
Jul  2 07:54:49.253036 systemd[1]: Started getty@tty1.service.
Jul  2 07:54:49.257605 systemd[1]: Started serial-getty@ttyS0.service.
Jul  2 07:54:49.258854 systemd[1]: Reached target getty.target.
Jul  2 07:54:49.260133 systemd[1]: Reached target multi-user.target.
Jul  2 07:54:49.263402 systemd[1]: Starting systemd-update-utmp-runlevel.service...
Jul  2 07:54:49.264522 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] Starting session document processing engine...
Jul  2 07:54:49.275169 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully.
Jul  2 07:54:49.275491 systemd[1]: Finished systemd-update-utmp-runlevel.service.
Jul  2 07:54:49.288787 systemd[1]: Startup finished in 7.595s (kernel) + 10.662s (userspace) = 18.258s.
Jul  2 07:54:49.362035 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] [EngineProcessor] Starting
Jul  2 07:54:49.459804 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module.
Jul  2 07:54:49.557681 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0c010cd22e431a4ca, requestId: 984d2b48-8cae-4865-a372-487fc5047255
Jul  2 07:54:49.655982 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [LongRunningPluginsManager] starting long running plugin manager
Jul  2 07:54:49.754108 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute
Jul  2 07:54:49.852853 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] listening reply.
Jul  2 07:54:49.951720 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck
Jul  2 07:54:50.027861 kubelet[2037]: E0702 07:54:50.027778    2037 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory"
Jul  2 07:54:50.032897 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE
Jul  2 07:54:50.033335 systemd[1]: kubelet.service: Failed with result 'exit-code'.
Jul  2 07:54:50.050486 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [StartupProcessor] Executing startup processor tasks
Jul  2 07:54:50.149694 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running
Jul  2 07:54:50.249041 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk
Jul  2 07:54:50.348463 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.5
Jul  2 07:54:50.448161 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c010cd22e431a4ca?role=subscribe&stream=input
Jul  2 07:54:50.548171 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0c010cd22e431a4ca?role=subscribe&stream=input
Jul  2 07:54:50.648098 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] Starting receiving message from control channel
Jul  2 07:54:50.748312 amazon-ssm-agent[1804]: 2024-07-02 07:54:47 INFO [MessageGatewayService] [EngineProcessor] Initial processing
Jul  2 07:54:55.236394 systemd[1]: Created slice system-sshd.slice.
Jul  2 07:54:55.240720 systemd[1]: Started sshd@0-172.31.22.44:22-139.178.89.65:50934.service.
Jul  2 07:54:55.434138 sshd[2063]: Accepted publickey for core from 139.178.89.65 port 50934 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:55.441427 sshd[2063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:55.459894 systemd[1]: Created slice user-500.slice.
Jul  2 07:54:55.461455 systemd[1]: Starting user-runtime-dir@500.service...
Jul  2 07:54:55.468864 systemd-logind[1819]: New session 1 of user core.
Jul  2 07:54:55.490613 systemd[1]: Finished user-runtime-dir@500.service.
Jul  2 07:54:55.492939 systemd[1]: Starting user@500.service...
Jul  2 07:54:55.501538 (systemd)[2068]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:55.634309 systemd[2068]: Queued start job for default target default.target.
Jul  2 07:54:55.635270 systemd[2068]: Reached target paths.target.
Jul  2 07:54:55.635305 systemd[2068]: Reached target sockets.target.
Jul  2 07:54:55.635323 systemd[2068]: Reached target timers.target.
Jul  2 07:54:55.635339 systemd[2068]: Reached target basic.target.
Jul  2 07:54:55.635510 systemd[1]: Started user@500.service.
Jul  2 07:54:55.636507 systemd[2068]: Reached target default.target.
Jul  2 07:54:55.636684 systemd[2068]: Startup finished in 100ms.
Jul  2 07:54:55.637179 systemd[1]: Started session-1.scope.
Jul  2 07:54:55.780091 systemd[1]: Started sshd@1-172.31.22.44:22-139.178.89.65:50950.service.
Jul  2 07:54:55.949499 sshd[2077]: Accepted publickey for core from 139.178.89.65 port 50950 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:55.951048 sshd[2077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:55.957166 systemd-logind[1819]: New session 2 of user core.
Jul  2 07:54:55.960538 systemd[1]: Started session-2.scope.
Jul  2 07:54:56.092634 sshd[2077]: pam_unix(sshd:session): session closed for user core
Jul  2 07:54:56.096457 systemd[1]: sshd@1-172.31.22.44:22-139.178.89.65:50950.service: Deactivated successfully.
Jul  2 07:54:56.098422 systemd[1]: session-2.scope: Deactivated successfully.
Jul  2 07:54:56.100101 systemd-logind[1819]: Session 2 logged out. Waiting for processes to exit.
Jul  2 07:54:56.101670 systemd-logind[1819]: Removed session 2.
Jul  2 07:54:56.122746 systemd[1]: Started sshd@2-172.31.22.44:22-139.178.89.65:50964.service.
Jul  2 07:54:56.293981 sshd[2084]: Accepted publickey for core from 139.178.89.65 port 50964 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:56.295787 sshd[2084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:56.302427 systemd-logind[1819]: New session 3 of user core.
Jul  2 07:54:56.303182 systemd[1]: Started session-3.scope.
Jul  2 07:54:56.424213 sshd[2084]: pam_unix(sshd:session): session closed for user core
Jul  2 07:54:56.428325 systemd[1]: sshd@2-172.31.22.44:22-139.178.89.65:50964.service: Deactivated successfully.
Jul  2 07:54:56.430065 systemd-logind[1819]: Session 3 logged out. Waiting for processes to exit.
Jul  2 07:54:56.430164 systemd[1]: session-3.scope: Deactivated successfully.
Jul  2 07:54:56.432315 systemd-logind[1819]: Removed session 3.
Jul  2 07:54:56.449517 systemd[1]: Started sshd@3-172.31.22.44:22-139.178.89.65:50972.service.
Jul  2 07:54:56.611989 sshd[2091]: Accepted publickey for core from 139.178.89.65 port 50972 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:56.613452 sshd[2091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:56.621052 systemd-logind[1819]: New session 4 of user core.
Jul  2 07:54:56.622274 systemd[1]: Started session-4.scope.
Jul  2 07:54:56.754348 sshd[2091]: pam_unix(sshd:session): session closed for user core
Jul  2 07:54:56.757952 systemd[1]: sshd@3-172.31.22.44:22-139.178.89.65:50972.service: Deactivated successfully.
Jul  2 07:54:56.759047 systemd[1]: session-4.scope: Deactivated successfully.
Jul  2 07:54:56.760243 systemd-logind[1819]: Session 4 logged out. Waiting for processes to exit.
Jul  2 07:54:56.761662 systemd-logind[1819]: Removed session 4.
Jul  2 07:54:56.781035 systemd[1]: Started sshd@4-172.31.22.44:22-139.178.89.65:50984.service.
Jul  2 07:54:56.947217 sshd[2098]: Accepted publickey for core from 139.178.89.65 port 50984 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:56.948659 sshd[2098]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:56.957671 systemd[1]: Started session-5.scope.
Jul  2 07:54:56.958075 systemd-logind[1819]: New session 5 of user core.
Jul  2 07:54:57.111150 sudo[2102]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1
Jul  2 07:54:57.111622 sudo[2102]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Jul  2 07:54:57.121220 dbus-daemon[1808]: \xd0-b\xe5.V:  received setenforce notice (enforcing=-1767563632)
Jul  2 07:54:57.123340 sudo[2102]: pam_unix(sudo:session): session closed for user root
Jul  2 07:54:57.147846 sshd[2098]: pam_unix(sshd:session): session closed for user core
Jul  2 07:54:57.151559 systemd[1]: sshd@4-172.31.22.44:22-139.178.89.65:50984.service: Deactivated successfully.
Jul  2 07:54:57.152997 systemd-logind[1819]: Session 5 logged out. Waiting for processes to exit.
Jul  2 07:54:57.153090 systemd[1]: session-5.scope: Deactivated successfully.
Jul  2 07:54:57.154645 systemd-logind[1819]: Removed session 5.
Jul  2 07:54:57.172826 systemd[1]: Started sshd@5-172.31.22.44:22-139.178.89.65:50996.service.
Jul  2 07:54:57.335879 sshd[2106]: Accepted publickey for core from 139.178.89.65 port 50996 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:57.337488 sshd[2106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:57.344025 systemd-logind[1819]: New session 6 of user core.
Jul  2 07:54:57.344815 systemd[1]: Started session-6.scope.
Jul  2 07:54:57.448929 sudo[2111]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules
Jul  2 07:54:57.449977 sudo[2111]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Jul  2 07:54:57.453687 sudo[2111]: pam_unix(sudo:session): session closed for user root
Jul  2 07:54:57.460675 sudo[2110]:     core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules
Jul  2 07:54:57.461037 sudo[2110]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Jul  2 07:54:57.472530 systemd[1]: Stopping audit-rules.service...
Jul  2 07:54:57.473000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Jul  2 07:54:57.475181 auditctl[2114]: No rules
Jul  2 07:54:57.475677 kernel: kauditd_printk_skb: 173 callbacks suppressed
Jul  2 07:54:57.475717 kernel: audit: type=1305 audit(1719906897.473:155): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1
Jul  2 07:54:57.473000 audit[2114]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc2cfa0f0 a2=420 a3=0 items=0 ppid=1 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:54:57.477304 systemd[1]: audit-rules.service: Deactivated successfully.
Jul  2 07:54:57.477612 systemd[1]: Stopped audit-rules.service.
Jul  2 07:54:57.482578 systemd[1]: Starting audit-rules.service...
Jul  2 07:54:57.487142 kernel: audit: type=1300 audit(1719906897.473:155): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc2cfa0f0 a2=420 a3=0 items=0 ppid=1 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:54:57.487219 kernel: audit: type=1327 audit(1719906897.473:155): proctitle=2F7362696E2F617564697463746C002D44
Jul  2 07:54:57.487250 kernel: audit: type=1131 audit(1719906897.476:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.473000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44
Jul  2 07:54:57.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.539776 augenrules[2132]: No rules
Jul  2 07:54:57.547145 kernel: audit: type=1130 audit(1719906897.539:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.540598 systemd[1]: Finished audit-rules.service.
Jul  2 07:54:57.542164 sudo[2110]: pam_unix(sudo:session): session closed for user root
Jul  2 07:54:57.541000 audit[2110]: USER_END pid=2110 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.541000 audit[2110]: CRED_DISP pid=2110 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.556298 kernel: audit: type=1106 audit(1719906897.541:158): pid=2110 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.556415 kernel: audit: type=1104 audit(1719906897.541:159): pid=2110 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.570078 sshd[2106]: pam_unix(sshd:session): session closed for user core
Jul  2 07:54:57.570000 audit[2106]: USER_END pid=2106 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.573815 systemd[1]: sshd@5-172.31.22.44:22-139.178.89.65:50996.service: Deactivated successfully.
Jul  2 07:54:57.575011 systemd[1]: session-6.scope: Deactivated successfully.
Jul  2 07:54:57.576781 systemd-logind[1819]: Session 6 logged out. Waiting for processes to exit.
Jul  2 07:54:57.570000 audit[2106]: CRED_DISP pid=2106 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.578100 systemd-logind[1819]: Removed session 6.
Jul  2 07:54:57.582292 kernel: audit: type=1106 audit(1719906897.570:160): pid=2106 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.582385 kernel: audit: type=1104 audit(1719906897.570:161): pid=2106 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.44:22-139.178.89.65:50996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.586548 kernel: audit: type=1131 audit(1719906897.573:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.22.44:22-139.178.89.65:50996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.593706 systemd[1]: Started sshd@6-172.31.22.44:22-139.178.89.65:51004.service.
Jul  2 07:54:57.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.44:22-139.178.89.65:51004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.748000 audit[2139]: USER_ACCT pid=2139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.750000 audit[2139]: CRED_ACQ pid=2139 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.750000 audit[2139]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea56e2c50 a2=3 a3=0 items=0 ppid=1 pid=2139 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:54:57.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D
Jul  2 07:54:57.751843 sshd[2139]: Accepted publickey for core from 139.178.89.65 port 51004 ssh2: RSA SHA256:rTbb9lmT4XUn8uDXgmoYGo7iZpmooGlUi2cnCdowCs4
Jul  2 07:54:57.751768 sshd[2139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0)
Jul  2 07:54:57.757348 systemd[1]: Started session-7.scope.
Jul  2 07:54:57.757612 systemd-logind[1819]: New session 7 of user core.
Jul  2 07:54:57.764000 audit[2139]: USER_START pid=2139 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.766000 audit[2142]: CRED_ACQ pid=2142 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:54:57.858000 audit[2143]: USER_ACCT pid=2143 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.860086 sudo[2143]:     core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh
Jul  2 07:54:57.859000 audit[2143]: CRED_REFR pid=2143 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.860482 sudo[2143]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500)
Jul  2 07:54:57.861000 audit[2143]: USER_START pid=2143 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.877171 systemd[1]: Starting coreos-metadata.service...
Jul  2 07:54:57.962092 coreos-metadata[2147]: Jul 02 07:54:57.961 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1
Jul  2 07:54:57.963095 coreos-metadata[2147]: Jul 02 07:54:57.963 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-id: Attempt #1
Jul  2 07:54:57.963679 coreos-metadata[2147]: Jul 02 07:54:57.963 INFO Fetch successful
Jul  2 07:54:57.963775 coreos-metadata[2147]: Jul 02 07:54:57.963 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/instance-type: Attempt #1
Jul  2 07:54:57.964731 coreos-metadata[2147]: Jul 02 07:54:57.964 INFO Fetch successful
Jul  2 07:54:57.964871 coreos-metadata[2147]: Jul 02 07:54:57.964 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/local-ipv4: Attempt #1
Jul  2 07:54:57.965395 coreos-metadata[2147]: Jul 02 07:54:57.965 INFO Fetch successful
Jul  2 07:54:57.965505 coreos-metadata[2147]: Jul 02 07:54:57.965 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-ipv4: Attempt #1
Jul  2 07:54:57.966056 coreos-metadata[2147]: Jul 02 07:54:57.966 INFO Fetch successful
Jul  2 07:54:57.966227 coreos-metadata[2147]: Jul 02 07:54:57.966 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/placement/availability-zone: Attempt #1
Jul  2 07:54:57.966918 coreos-metadata[2147]: Jul 02 07:54:57.966 INFO Fetch successful
Jul  2 07:54:57.966918 coreos-metadata[2147]: Jul 02 07:54:57.966 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/hostname: Attempt #1
Jul  2 07:54:57.967514 coreos-metadata[2147]: Jul 02 07:54:57.967 INFO Fetch successful
Jul  2 07:54:57.967602 coreos-metadata[2147]: Jul 02 07:54:57.967 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-hostname: Attempt #1
Jul  2 07:54:57.968130 coreos-metadata[2147]: Jul 02 07:54:57.968 INFO Fetch successful
Jul  2 07:54:57.968130 coreos-metadata[2147]: Jul 02 07:54:57.968 INFO Fetching http://169.254.169.254/2019-10-01/dynamic/instance-identity/document: Attempt #1
Jul  2 07:54:57.969013 coreos-metadata[2147]: Jul 02 07:54:57.968 INFO Fetch successful
Jul  2 07:54:57.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:57.982419 systemd[1]: Finished coreos-metadata.service.
Jul  2 07:54:59.127099 systemd[1]: Stopped kubelet.service.
Jul  2 07:54:59.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:59.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:59.129945 systemd[1]: Starting kubelet.service...
Jul  2 07:54:59.177204 systemd[1]: Reloading.
Jul  2 07:54:59.333578 /usr/lib/systemd/system-generators/torcx-generator[2209]: time="2024-07-02T07:54:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]"
Jul  2 07:54:59.333618 /usr/lib/systemd/system-generators/torcx-generator[2209]: time="2024-07-02T07:54:59Z" level=info msg="torcx already run"
Jul  2 07:54:59.491782 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon.
Jul  2 07:54:59.491803 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon.
Jul  2 07:54:59.511413 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly.
Jul  2 07:54:59.622847 systemd[1]: Started kubelet.service.
Jul  2 07:54:59.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:59.626417 systemd[1]: Stopping kubelet.service...
Jul  2 07:54:59.628668 systemd[1]: kubelet.service: Deactivated successfully.
Jul  2 07:54:59.629355 systemd[1]: Stopped kubelet.service.
Jul  2 07:54:59.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:59.633446 systemd[1]: Starting kubelet.service...
Jul  2 07:54:59.797705 systemd[1]: Started kubelet.service.
Jul  2 07:54:59.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:54:59.873139 kubelet[2283]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Jul  2 07:54:59.873788 kubelet[2283]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI.
Jul  2 07:54:59.873832 kubelet[2283]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information.
Jul  2 07:54:59.873949 kubelet[2283]: I0702 07:54:59.873922    2283 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime"
Jul  2 07:55:00.546998 kubelet[2283]: I0702 07:55:00.546944    2283 server.go:467] "Kubelet version" kubeletVersion="v1.28.7"
Jul  2 07:55:00.547201 kubelet[2283]: I0702 07:55:00.547180    2283 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK=""
Jul  2 07:55:00.547461 kubelet[2283]: I0702 07:55:00.547440    2283 server.go:895] "Client rotation is on, will bootstrap in background"
Jul  2 07:55:00.587784 kubelet[2283]: I0702 07:55:00.587735    2283 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt"
Jul  2 07:55:00.616538 kubelet[2283]: I0702 07:55:00.616502    2283 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified.  defaulting to /"
Jul  2 07:55:00.619841 kubelet[2283]: I0702 07:55:00.619806    2283 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[]
Jul  2 07:55:00.620232 kubelet[2283]: I0702 07:55:00.620211    2283 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null}
Jul  2 07:55:00.620483 kubelet[2283]: I0702 07:55:00.620242    2283 topology_manager.go:138] "Creating topology manager with none policy"
Jul  2 07:55:00.620483 kubelet[2283]: I0702 07:55:00.620256    2283 container_manager_linux.go:301] "Creating device plugin manager"
Jul  2 07:55:00.621951 kubelet[2283]: I0702 07:55:00.621792    2283 state_mem.go:36] "Initialized new in-memory state store"
Jul  2 07:55:00.623985 kubelet[2283]: I0702 07:55:00.623946    2283 kubelet.go:393] "Attempting to sync node with API server"
Jul  2 07:55:00.624071 kubelet[2283]: I0702 07:55:00.623993    2283 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests"
Jul  2 07:55:00.624071 kubelet[2283]: I0702 07:55:00.624028    2283 kubelet.go:309] "Adding apiserver pod source"
Jul  2 07:55:00.624071 kubelet[2283]: I0702 07:55:00.624043    2283 apiserver.go:42] "Waiting for node sync before watching apiserver pods"
Jul  2 07:55:00.632100 kubelet[2283]: E0702 07:55:00.632074    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:00.632322 kubelet[2283]: E0702 07:55:00.632307    2283 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:00.632628 kubelet[2283]: I0702 07:55:00.632612    2283 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1"
Jul  2 07:55:00.634728 kubelet[2283]: W0702 07:55:00.634704    2283 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating.
Jul  2 07:55:00.635343 kubelet[2283]: I0702 07:55:00.635321    2283 server.go:1232] "Started kubelet"
Jul  2 07:55:00.635512 kubelet[2283]: I0702 07:55:00.635488    2283 server.go:162] "Starting to listen" address="0.0.0.0" port=10250
Jul  2 07:55:00.636729 kubelet[2283]: I0702 07:55:00.636548    2283 server.go:462] "Adding debug handlers to kubelet server"
Jul  2 07:55:00.638687 kubelet[2283]: I0702 07:55:00.638667    2283 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10
Jul  2 07:55:00.639071 kubelet[2283]: I0702 07:55:00.639058    2283 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock"
Jul  2 07:55:00.638000 audit[2283]: AVC avc:  denied  { mac_admin } for  pid=2283 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:00.638000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Jul  2 07:55:00.638000 audit[2283]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002239b0 a1=c00007a330 a2=c000223950 a3=25 items=0 ppid=1 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.638000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Jul  2 07:55:00.639000 audit[2283]: AVC avc:  denied  { mac_admin } for  pid=2283 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:00.639000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Jul  2 07:55:00.639000 audit[2283]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000292d00 a1=c00007a510 a2=c000223ad0 a3=25 items=0 ppid=1 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.639000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Jul  2 07:55:00.640631 kubelet[2283]: I0702 07:55:00.640102    2283 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument"
Jul  2 07:55:00.640631 kubelet[2283]: I0702 07:55:00.640169    2283 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument"
Jul  2 07:55:00.640631 kubelet[2283]: I0702 07:55:00.640275    2283 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer"
Jul  2 07:55:00.641728 kubelet[2283]: E0702 07:55:00.641706    2283 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs"
Jul  2 07:55:00.641802 kubelet[2283]: E0702 07:55:00.641736    2283 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem"
Jul  2 07:55:00.644776 kubelet[2283]: E0702 07:55:00.644217    2283 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.31.22.44\" not found"
Jul  2 07:55:00.644776 kubelet[2283]: I0702 07:55:00.644257    2283 volume_manager.go:291] "Starting Kubelet Volume Manager"
Jul  2 07:55:00.644776 kubelet[2283]: I0702 07:55:00.644361    2283 desired_state_of_world_populator.go:151] "Desired state populator starts to run"
Jul  2 07:55:00.644776 kubelet[2283]: I0702 07:55:00.644499    2283 reconciler_new.go:29] "Reconciler: start to sync state"
Jul  2 07:55:00.648095 kubelet[2283]: E0702 07:55:00.647890    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b31c21ac", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 635296172, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 635296172, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.649469 kubelet[2283]: W0702 07:55:00.649417    2283 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Jul  2 07:55:00.649469 kubelet[2283]: E0702 07:55:00.649469    2283 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope
Jul  2 07:55:00.649634 kubelet[2283]: W0702 07:55:00.649524    2283 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.31.22.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Jul  2 07:55:00.649634 kubelet[2283]: E0702 07:55:00.649538    2283 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.31.22.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope
Jul  2 07:55:00.651160 kubelet[2283]: W0702 07:55:00.651054    2283 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Jul  2 07:55:00.651160 kubelet[2283]: E0702 07:55:00.651081    2283 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope
Jul  2 07:55:00.651307 kubelet[2283]: E0702 07:55:00.651194    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms"
Jul  2 07:55:00.651367 kubelet[2283]: E0702 07:55:00.651244    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b37e2e9d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 641722013, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 641722013, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.705160 kubelet[2283]: I0702 07:55:00.705136    2283 cpu_manager.go:214] "Starting CPU manager" policy="none"
Jul  2 07:55:00.705328 kubelet[2283]: I0702 07:55:00.705318    2283 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s"
Jul  2 07:55:00.705404 kubelet[2283]: I0702 07:55:00.705396    2283 state_mem.go:36] "Initialized new in-memory state store"
Jul  2 07:55:00.706565 kubelet[2283]: E0702 07:55:00.706270    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735e06f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704092271, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704092271, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.707982 kubelet[2283]: I0702 07:55:00.707522    2283 policy_none.go:49] "None policy: Start"
Jul  2 07:55:00.709208 kubelet[2283]: I0702 07:55:00.708308    2283 memory_manager.go:169] "Starting memorymanager" policy="None"
Jul  2 07:55:00.709208 kubelet[2283]: I0702 07:55:00.708340    2283 state_mem.go:35] "Initializing new in-memory state store"
Jul  2 07:55:00.709208 kubelet[2283]: E0702 07:55:00.708824    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735fdaf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704099759, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704099759, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.719637 kubelet[2283]: E0702 07:55:00.719544    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b7362aa4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704111268, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704111268, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.720153 kubelet[2283]: I0702 07:55:00.720137    2283 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found"
Jul  2 07:55:00.719000 audit[2283]: AVC avc:  denied  { mac_admin } for  pid=2283 comm="kubelet" capability=33  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:00.719000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0"
Jul  2 07:55:00.719000 audit[2283]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007e1860 a1=c0007d4f78 a2=c0007e1830 a3=25 items=0 ppid=1 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.719000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669
Jul  2 07:55:00.720573 kubelet[2283]: I0702 07:55:00.720560    2283 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument"
Jul  2 07:55:00.720810 kubelet[2283]: I0702 07:55:00.720799    2283 plugin_manager.go:118] "Starting Kubelet Plugin Manager"
Jul  2 07:55:00.728562 kubelet[2283]: E0702 07:55:00.728495    2283 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.31.22.44\" not found"
Jul  2 07:55:00.727000 audit[2298]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.727000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca9c1bb70 a2=0 a3=7ffca9c1bb5c items=0 ppid=2283 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Jul  2 07:55:00.729000 audit[2301]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.729000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe46cca680 a2=0 a3=7ffe46cca66c items=0 ppid=2283 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Jul  2 07:55:00.736818 kubelet[2283]: E0702 07:55:00.736743    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b88f9b74", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 726750068, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 726750068, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.745869 kubelet[2283]: I0702 07:55:00.745844    2283 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.44"
Jul  2 07:55:00.731000 audit[2303]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.731000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe9745e750 a2=0 a3=7ffe9745e73c items=0 ppid=2283 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Jul  2 07:55:00.751831 kubelet[2283]: E0702 07:55:00.751698    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735e06f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704092271, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 745785608, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b735e06f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.752243 kubelet[2283]: E0702 07:55:00.752222    2283 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.44"
Jul  2 07:55:00.753096 kubelet[2283]: E0702 07:55:00.753007    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735fdaf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704099759, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 745792137, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b735fdaf" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.754242 kubelet[2283]: E0702 07:55:00.754174    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b7362aa4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704111268, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 745796856, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b7362aa4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.753000 audit[2308]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.753000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca4d9f4e0 a2=0 a3=7ffca4d9f4cc items=0 ppid=2283 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Jul  2 07:55:00.829000 audit[2313]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.829000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd76156d90 a2=0 a3=7ffd76156d7c items=0 ppid=2283 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38
Jul  2 07:55:00.831217 kubelet[2283]: I0702 07:55:00.831194    2283 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4"
Jul  2 07:55:00.832000 audit[2314]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.832000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebddbbca0 a2=0 a3=7ffebddbbc8c items=0 ppid=2283 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Jul  2 07:55:00.835000 audit[2315]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:00.835000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcad5e26f0 a2=0 a3=7ffcad5e26dc items=0 ppid=2283 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65
Jul  2 07:55:00.836641 kubelet[2283]: I0702 07:55:00.836586    2283 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6"
Jul  2 07:55:00.836641 kubelet[2283]: I0702 07:55:00.836614    2283 status_manager.go:217] "Starting to sync pod status with apiserver"
Jul  2 07:55:00.836641 kubelet[2283]: I0702 07:55:00.836639    2283 kubelet.go:2303] "Starting kubelet main sync loop"
Jul  2 07:55:00.836768 kubelet[2283]: E0702 07:55:00.836762    2283 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful"
Jul  2 07:55:00.836000 audit[2316]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.836000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe983f7720 a2=0 a3=7ffe983f770c items=0 ppid=2283 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Jul  2 07:55:00.838522 kubelet[2283]: W0702 07:55:00.838501    2283 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Jul  2 07:55:00.838679 kubelet[2283]: E0702 07:55:00.838535    2283 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope
Jul  2 07:55:00.839000 audit[2317]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:00.839000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe78f22200 a2=0 a3=7ffe78f221ec items=0 ppid=2283 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65
Jul  2 07:55:00.839000 audit[2318]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:00.839000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcba485ed0 a2=0 a3=7ffcba485ebc items=0 ppid=2283 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Jul  2 07:55:00.841000 audit[2319]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:00.841000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff296d31c0 a2=0 a3=7fff296d31ac items=0 ppid=2283 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.841000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174
Jul  2 07:55:00.842000 audit[2320]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:00.842000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe3a565c70 a2=0 a3=7ffe3a565c5c items=0 ppid=2283 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:00.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572
Jul  2 07:55:00.853769 kubelet[2283]: E0702 07:55:00.853741    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms"
Jul  2 07:55:00.954123 kubelet[2283]: I0702 07:55:00.954094    2283 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.44"
Jul  2 07:55:00.967339 kubelet[2283]: E0702 07:55:00.967307    2283 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.44"
Jul  2 07:55:00.967513 kubelet[2283]: E0702 07:55:00.967314    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735e06f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704092271, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 953926478, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b735e06f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.971500 kubelet[2283]: E0702 07:55:00.971396    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735fdaf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704099759, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 953937654, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b735fdaf" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:00.974952 kubelet[2283]: E0702 07:55:00.974846    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b7362aa4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704111268, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 953942208, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b7362aa4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:01.258136 kubelet[2283]: E0702 07:55:01.258014    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.31.22.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms"
Jul  2 07:55:01.368481 kubelet[2283]: I0702 07:55:01.368451    2283 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.44"
Jul  2 07:55:01.370345 kubelet[2283]: E0702 07:55:01.370235    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735e06f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.31.22.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704092271, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 1, 368343866, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b735e06f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:01.370759 kubelet[2283]: E0702 07:55:01.370738    2283 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.31.22.44"
Jul  2 07:55:01.375475 kubelet[2283]: E0702 07:55:01.375372    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b735fdaf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.31.22.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704099759, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 1, 368350823, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b735fdaf" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:01.378367 kubelet[2283]: E0702 07:55:01.378266    2283 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44.17de5636b7362aa4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.31.22.44", UID:"172.31.22.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.31.22.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.31.22.44"}, FirstTimestamp:time.Date(2024, time.July, 2, 7, 55, 0, 704111268, time.Local), LastTimestamp:time.Date(2024, time.July, 2, 7, 55, 1, 368355184, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.31.22.44"}': 'events "172.31.22.44.17de5636b7362aa4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!)
Jul  2 07:55:01.549437 kubelet[2283]: I0702 07:55:01.549229    2283 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials"
Jul  2 07:55:01.632888 kubelet[2283]: E0702 07:55:01.632844    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:02.076463 kubelet[2283]: E0702 07:55:02.076429    2283 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.31.22.44\" not found" node="172.31.22.44"
Jul  2 07:55:02.124547 kubelet[2283]: E0702 07:55:02.124512    2283 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.31.22.44" not found
Jul  2 07:55:02.171944 kubelet[2283]: I0702 07:55:02.171902    2283 kubelet_node_status.go:70] "Attempting to register node" node="172.31.22.44"
Jul  2 07:55:02.225080 kubelet[2283]: I0702 07:55:02.224535    2283 kubelet_node_status.go:73] "Successfully registered node" node="172.31.22.44"
Jul  2 07:55:02.326452 kubelet[2283]: I0702 07:55:02.326423    2283 kuberuntime_manager.go:1528] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24"
Jul  2 07:55:02.327194 env[1824]: time="2024-07-02T07:55:02.326928345Z" level=info msg="No cni config template is specified, wait for other system components to drop the config."
Jul  2 07:55:02.327593 kubelet[2283]: I0702 07:55:02.327252    2283 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24"
Jul  2 07:55:02.350762 sudo[2143]: pam_unix(sudo:session): session closed for user root
Jul  2 07:55:02.350000 audit[2143]: USER_END pid=2143 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:55:02.350000 audit[2143]: CRED_DISP pid=2143 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success'
Jul  2 07:55:02.376921 sshd[2139]: pam_unix(sshd:session): session closed for user core
Jul  2 07:55:02.378000 audit[2139]: USER_END pid=2139 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:55:02.378000 audit[2139]: CRED_DISP pid=2139 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success'
Jul  2 07:55:02.386101 systemd[1]: sshd@6-172.31.22.44:22-139.178.89.65:51004.service: Deactivated successfully.
Jul  2 07:55:02.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.22.44:22-139.178.89.65:51004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:55:02.391822 systemd[1]: session-7.scope: Deactivated successfully.
Jul  2 07:55:02.395633 systemd-logind[1819]: Session 7 logged out. Waiting for processes to exit.
Jul  2 07:55:02.415192 systemd-logind[1819]: Removed session 7.
Jul  2 07:55:02.631298 kubelet[2283]: I0702 07:55:02.631117    2283 apiserver.go:52] "Watching apiserver"
Jul  2 07:55:02.633418 kubelet[2283]: E0702 07:55:02.633377    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:02.712321 kubelet[2283]: I0702 07:55:02.712289    2283 topology_manager.go:215] "Topology Admit Handler" podUID="9f532b39-0252-4a97-a8b2-eebd501d6333" podNamespace="kube-system" podName="kube-proxy-9b56h"
Jul  2 07:55:02.719481 kubelet[2283]: I0702 07:55:02.719443    2283 topology_manager.go:215] "Topology Admit Handler" podUID="47c08e3c-0466-4643-8378-b5668672fd55" podNamespace="calico-system" podName="calico-node-gn5sb"
Jul  2 07:55:02.722389 kubelet[2283]: I0702 07:55:02.722361    2283 topology_manager.go:215] "Topology Admit Handler" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de" podNamespace="calico-system" podName="csi-node-driver-9v9fh"
Jul  2 07:55:02.722620 kubelet[2283]: E0702 07:55:02.722601    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:02.744880 kubelet[2283]: I0702 07:55:02.744849    2283 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world"
Jul  2 07:55:02.754533 kubelet[2283]: I0702 07:55:02.754501    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-xtables-lock\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.754714 kubelet[2283]: I0702 07:55:02.754555    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-cni-log-dir\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.754714 kubelet[2283]: I0702 07:55:02.754583    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-policysync\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.754714 kubelet[2283]: I0702 07:55:02.754618    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/47c08e3c-0466-4643-8378-b5668672fd55-node-certs\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.754714 kubelet[2283]: I0702 07:55:02.754645    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5b4d1a94-4482-4b3f-8a91-b62d2cc745de-kubelet-dir\") pod \"csi-node-driver-9v9fh\" (UID: \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\") " pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:02.754714 kubelet[2283]: I0702 07:55:02.754676    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nmtct\" (UniqueName: \"kubernetes.io/projected/5b4d1a94-4482-4b3f-8a91-b62d2cc745de-kube-api-access-nmtct\") pod \"csi-node-driver-9v9fh\" (UID: \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\") " pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:02.754983 kubelet[2283]: I0702 07:55:02.754700    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9f532b39-0252-4a97-a8b2-eebd501d6333-kube-proxy\") pod \"kube-proxy-9b56h\" (UID: \"9f532b39-0252-4a97-a8b2-eebd501d6333\") " pod="kube-system/kube-proxy-9b56h"
Jul  2 07:55:02.754983 kubelet[2283]: I0702 07:55:02.754729    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9f532b39-0252-4a97-a8b2-eebd501d6333-xtables-lock\") pod \"kube-proxy-9b56h\" (UID: \"9f532b39-0252-4a97-a8b2-eebd501d6333\") " pod="kube-system/kube-proxy-9b56h"
Jul  2 07:55:02.754983 kubelet[2283]: I0702 07:55:02.754760    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9f532b39-0252-4a97-a8b2-eebd501d6333-lib-modules\") pod \"kube-proxy-9b56h\" (UID: \"9f532b39-0252-4a97-a8b2-eebd501d6333\") " pod="kube-system/kube-proxy-9b56h"
Jul  2 07:55:02.754983 kubelet[2283]: I0702 07:55:02.754797    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-px572\" (UniqueName: \"kubernetes.io/projected/9f532b39-0252-4a97-a8b2-eebd501d6333-kube-api-access-px572\") pod \"kube-proxy-9b56h\" (UID: \"9f532b39-0252-4a97-a8b2-eebd501d6333\") " pod="kube-system/kube-proxy-9b56h"
Jul  2 07:55:02.754983 kubelet[2283]: I0702 07:55:02.754828    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-var-run-calico\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755195 kubelet[2283]: I0702 07:55:02.754859    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-cni-bin-dir\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755195 kubelet[2283]: I0702 07:55:02.754889    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-flexvol-driver-host\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755195 kubelet[2283]: I0702 07:55:02.754922    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h9drg\" (UniqueName: \"kubernetes.io/projected/47c08e3c-0466-4643-8378-b5668672fd55-kube-api-access-h9drg\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755195 kubelet[2283]: I0702 07:55:02.754976    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5b4d1a94-4482-4b3f-8a91-b62d2cc745de-varrun\") pod \"csi-node-driver-9v9fh\" (UID: \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\") " pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:02.755195 kubelet[2283]: I0702 07:55:02.755019    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5b4d1a94-4482-4b3f-8a91-b62d2cc745de-socket-dir\") pod \"csi-node-driver-9v9fh\" (UID: \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\") " pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:02.755399 kubelet[2283]: I0702 07:55:02.755061    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5b4d1a94-4482-4b3f-8a91-b62d2cc745de-registration-dir\") pod \"csi-node-driver-9v9fh\" (UID: \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\") " pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:02.755399 kubelet[2283]: I0702 07:55:02.755105    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/47c08e3c-0466-4643-8378-b5668672fd55-tigera-ca-bundle\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755399 kubelet[2283]: I0702 07:55:02.755134    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-lib-modules\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755399 kubelet[2283]: I0702 07:55:02.755164    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-var-lib-calico\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.755399 kubelet[2283]: I0702 07:55:02.755195    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/47c08e3c-0466-4643-8378-b5668672fd55-cni-net-dir\") pod \"calico-node-gn5sb\" (UID: \"47c08e3c-0466-4643-8378-b5668672fd55\") " pod="calico-system/calico-node-gn5sb"
Jul  2 07:55:02.875173 kubelet[2283]: E0702 07:55:02.875068    2283 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Jul  2 07:55:02.875173 kubelet[2283]: W0702 07:55:02.875168    2283 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Jul  2 07:55:02.875430 kubelet[2283]: E0702 07:55:02.875200    2283 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Jul  2 07:55:02.952040 kubelet[2283]: E0702 07:55:02.951897    2283 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Jul  2 07:55:02.952040 kubelet[2283]: W0702 07:55:02.951923    2283 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Jul  2 07:55:02.952040 kubelet[2283]: E0702 07:55:02.951950    2283 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Jul  2 07:55:02.960659 kubelet[2283]: E0702 07:55:02.959651    2283 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Jul  2 07:55:02.960659 kubelet[2283]: W0702 07:55:02.959691    2283 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Jul  2 07:55:02.960659 kubelet[2283]: E0702 07:55:02.959830    2283 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Jul  2 07:55:02.960659 kubelet[2283]: E0702 07:55:02.960275    2283 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Jul  2 07:55:02.960659 kubelet[2283]: W0702 07:55:02.960315    2283 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Jul  2 07:55:02.960659 kubelet[2283]: E0702 07:55:02.960355    2283 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Jul  2 07:55:02.962676 kubelet[2283]: E0702 07:55:02.962655    2283 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Jul  2 07:55:02.962676 kubelet[2283]: W0702 07:55:02.962674    2283 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Jul  2 07:55:02.962852 kubelet[2283]: E0702 07:55:02.962693    2283 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Jul  2 07:55:02.972407 kubelet[2283]: E0702 07:55:02.972366    2283 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input
Jul  2 07:55:02.972407 kubelet[2283]: W0702 07:55:02.972392    2283 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: ""
Jul  2 07:55:02.972621 kubelet[2283]: E0702 07:55:02.972417    2283 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input"
Jul  2 07:55:03.027529 env[1824]: time="2024-07-02T07:55:03.027482029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9b56h,Uid:9f532b39-0252-4a97-a8b2-eebd501d6333,Namespace:kube-system,Attempt:0,}"
Jul  2 07:55:03.032853 env[1824]: time="2024-07-02T07:55:03.032797603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gn5sb,Uid:47c08e3c-0466-4643-8378-b5668672fd55,Namespace:calico-system,Attempt:0,}"
Jul  2 07:55:03.571942 env[1824]: time="2024-07-02T07:55:03.571882369Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.573384 env[1824]: time="2024-07-02T07:55:03.573343496Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.574562 env[1824]: time="2024-07-02T07:55:03.574524179Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.576423 env[1824]: time="2024-07-02T07:55:03.576389652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.577292 env[1824]: time="2024-07-02T07:55:03.577256968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.577833 env[1824]: time="2024-07-02T07:55:03.577811943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.583214 env[1824]: time="2024-07-02T07:55:03.583168441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.585162 env[1824]: time="2024-07-02T07:55:03.585126430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:03.611417 env[1824]: time="2024-07-02T07:55:03.608553779Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:55:03.611417 env[1824]: time="2024-07-02T07:55:03.608591088Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:55:03.611417 env[1824]: time="2024-07-02T07:55:03.608601819Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:55:03.611417 env[1824]: time="2024-07-02T07:55:03.608720875Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fdc75facee77f183f8495bd8a8d892cb09d1328672c7595800159b368f4054a pid=2349 runtime=io.containerd.runc.v2
Jul  2 07:55:03.611715 env[1824]: time="2024-07-02T07:55:03.608584794Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:55:03.611715 env[1824]: time="2024-07-02T07:55:03.608616096Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:55:03.611715 env[1824]: time="2024-07-02T07:55:03.608626682Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:55:03.611715 env[1824]: time="2024-07-02T07:55:03.608766331Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea pid=2348 runtime=io.containerd.runc.v2
Jul  2 07:55:03.633511 kubelet[2283]: E0702 07:55:03.633475    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:03.695483 env[1824]: time="2024-07-02T07:55:03.695407201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gn5sb,Uid:47c08e3c-0466-4643-8378-b5668672fd55,Namespace:calico-system,Attempt:0,} returns sandbox id \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\""
Jul  2 07:55:03.697095 env[1824]: time="2024-07-02T07:55:03.697044982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9b56h,Uid:9f532b39-0252-4a97-a8b2-eebd501d6333,Namespace:kube-system,Attempt:0,} returns sandbox id \"5fdc75facee77f183f8495bd8a8d892cb09d1328672c7595800159b368f4054a\""
Jul  2 07:55:03.699946 env[1824]: time="2024-07-02T07:55:03.699904499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\""
Jul  2 07:55:03.837288 kubelet[2283]: E0702 07:55:03.837134    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:03.873786 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3708689841.mount: Deactivated successfully.
Jul  2 07:55:04.634269 kubelet[2283]: E0702 07:55:04.634194    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:05.277741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount837335571.mount: Deactivated successfully.
Jul  2 07:55:05.480016 env[1824]: time="2024-07-02T07:55:05.479940511Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:05.482440 env[1824]: time="2024-07-02T07:55:05.482378756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:05.484481 env[1824]: time="2024-07-02T07:55:05.484443104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:05.486203 env[1824]: time="2024-07-02T07:55:05.486093716Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:05.486714 env[1824]: time="2024-07-02T07:55:05.486668810Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\""
Jul  2 07:55:05.488188 env[1824]: time="2024-07-02T07:55:05.488156838Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\""
Jul  2 07:55:05.489943 env[1824]: time="2024-07-02T07:55:05.489906119Z" level=info msg="CreateContainer within sandbox \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}"
Jul  2 07:55:05.517637 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount649761181.mount: Deactivated successfully.
Jul  2 07:55:05.547339 env[1824]: time="2024-07-02T07:55:05.546827802Z" level=info msg="CreateContainer within sandbox \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"a69b891e348181c2181a9776a101fa50fec79eaf5af31ee4b4180d13b4531d1a\""
Jul  2 07:55:05.547954 env[1824]: time="2024-07-02T07:55:05.547866602Z" level=info msg="StartContainer for \"a69b891e348181c2181a9776a101fa50fec79eaf5af31ee4b4180d13b4531d1a\""
Jul  2 07:55:05.632787 env[1824]: time="2024-07-02T07:55:05.632693615Z" level=info msg="StartContainer for \"a69b891e348181c2181a9776a101fa50fec79eaf5af31ee4b4180d13b4531d1a\" returns successfully"
Jul  2 07:55:05.634423 kubelet[2283]: E0702 07:55:05.634351    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:05.710481 env[1824]: time="2024-07-02T07:55:05.710272909Z" level=info msg="shim disconnected" id=a69b891e348181c2181a9776a101fa50fec79eaf5af31ee4b4180d13b4531d1a
Jul  2 07:55:05.710481 env[1824]: time="2024-07-02T07:55:05.710480970Z" level=warning msg="cleaning up after shim disconnected" id=a69b891e348181c2181a9776a101fa50fec79eaf5af31ee4b4180d13b4531d1a namespace=k8s.io
Jul  2 07:55:05.710788 env[1824]: time="2024-07-02T07:55:05.710495104Z" level=info msg="cleaning up dead shim"
Jul  2 07:55:05.723525 env[1824]: time="2024-07-02T07:55:05.723480960Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2464 runtime=io.containerd.runc.v2\n"
Jul  2 07:55:05.837019 kubelet[2283]: E0702 07:55:05.836893    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:06.225395 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a69b891e348181c2181a9776a101fa50fec79eaf5af31ee4b4180d13b4531d1a-rootfs.mount: Deactivated successfully.
Jul  2 07:55:06.635349 kubelet[2283]: E0702 07:55:06.635240    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:06.734162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount916110083.mount: Deactivated successfully.
Jul  2 07:55:07.484186 env[1824]: time="2024-07-02T07:55:07.484126628Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:07.486793 env[1824]: time="2024-07-02T07:55:07.486750911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:07.493203 env[1824]: time="2024-07-02T07:55:07.493158205Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.11,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:07.496168 env[1824]: time="2024-07-02T07:55:07.496124553Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ae4b671d4cfc23dd75030bb4490207cd939b3b11a799bcb4119698cd712eb5b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:07.497038 env[1824]: time="2024-07-02T07:55:07.496904795Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.11\" returns image reference \"sha256:a3eea76ce409e136fe98838847fda217ce169eb7d1ceef544671d75f68e5a29c\""
Jul  2 07:55:07.500568 env[1824]: time="2024-07-02T07:55:07.500167692Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\""
Jul  2 07:55:07.501483 env[1824]: time="2024-07-02T07:55:07.501443904Z" level=info msg="CreateContainer within sandbox \"5fdc75facee77f183f8495bd8a8d892cb09d1328672c7595800159b368f4054a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}"
Jul  2 07:55:07.521552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3184534032.mount: Deactivated successfully.
Jul  2 07:55:07.531479 env[1824]: time="2024-07-02T07:55:07.531420994Z" level=info msg="CreateContainer within sandbox \"5fdc75facee77f183f8495bd8a8d892cb09d1328672c7595800159b368f4054a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a03588618bd0fefbf20b803cc4da6cf1e0d1b2eaa7c4cc9a7eba056294978a87\""
Jul  2 07:55:07.532297 env[1824]: time="2024-07-02T07:55:07.532253707Z" level=info msg="StartContainer for \"a03588618bd0fefbf20b803cc4da6cf1e0d1b2eaa7c4cc9a7eba056294978a87\""
Jul  2 07:55:07.637712 kubelet[2283]: E0702 07:55:07.636352    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:07.640233 env[1824]: time="2024-07-02T07:55:07.640153455Z" level=info msg="StartContainer for \"a03588618bd0fefbf20b803cc4da6cf1e0d1b2eaa7c4cc9a7eba056294978a87\" returns successfully"
Jul  2 07:55:07.717869 kernel: kauditd_printk_skb: 70 callbacks suppressed
Jul  2 07:55:07.718196 kernel: audit: type=1325 audit(1719906907.712:198): table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:07.712000 audit[2538]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:07.712000 audit[2538]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3a3fe850 a2=0 a3=7ffd3a3fe83c items=0 ppid=2498 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.725079 kernel: audit: type=1300 audit(1719906907.712:198): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3a3fe850 a2=0 a3=7ffd3a3fe83c items=0 ppid=2498 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Jul  2 07:55:07.717000 audit[2540]: NETFILTER_CFG table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.731228 kernel: audit: type=1327 audit(1719906907.712:198): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Jul  2 07:55:07.731332 kernel: audit: type=1325 audit(1719906907.717:199): table=mangle:15 family=2 entries=1 op=nft_register_chain pid=2540 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.731366 kernel: audit: type=1300 audit(1719906907.717:199): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2ccb6a90 a2=0 a3=7ffd2ccb6a7c items=0 ppid=2498 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.717000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2ccb6a90 a2=0 a3=7ffd2ccb6a7c items=0 ppid=2498 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.740825 kernel: audit: type=1327 audit(1719906907.717:199): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Jul  2 07:55:07.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65
Jul  2 07:55:07.749993 kernel: audit: type=1325 audit(1719906907.717:200): table=nat:16 family=2 entries=1 op=nft_register_chain pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.717000 audit[2541]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.717000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc0008900 a2=0 a3=7ffdc00088ec items=0 ppid=2498 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Jul  2 07:55:07.763753 kernel: audit: type=1300 audit(1719906907.717:200): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc0008900 a2=0 a3=7ffdc00088ec items=0 ppid=2498 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.763820 kernel: audit: type=1327 audit(1719906907.717:200): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Jul  2 07:55:07.763859 kernel: audit: type=1325 audit(1719906907.717:201): table=filter:17 family=2 entries=1 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.717000 audit[2542]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.717000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff85f8b950 a2=0 a3=7fff85f8b93c items=0 ppid=2498 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Jul  2 07:55:07.722000 audit[2539]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2539 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:07.722000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc0cfc45b0 a2=0 a3=7ffc0cfc459c items=0 ppid=2498 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174
Jul  2 07:55:07.726000 audit[2543]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2543 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:07.726000 audit[2543]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdb4dfe30 a2=0 a3=7fffdb4dfe1c items=0 ppid=2498 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.726000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572
Jul  2 07:55:07.821000 audit[2544]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.821000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffebad36c40 a2=0 a3=7ffebad36c2c items=0 ppid=2498 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.821000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Jul  2 07:55:07.829000 audit[2546]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.829000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffec183500 a2=0 a3=7fffec1834ec items=0 ppid=2498 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365
Jul  2 07:55:07.838830 kubelet[2283]: E0702 07:55:07.837452    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:07.836000 audit[2549]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.836000 audit[2549]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffee40dfa30 a2=0 a3=7ffee40dfa1c items=0 ppid=2498 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669
Jul  2 07:55:07.839000 audit[2550]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2550 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.839000 audit[2550]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed8b65ba0 a2=0 a3=7ffed8b65b8c items=0 ppid=2498 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.839000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Jul  2 07:55:07.842000 audit[2552]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2552 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.842000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde33fb4f0 a2=0 a3=7ffde33fb4dc items=0 ppid=2498 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Jul  2 07:55:07.843000 audit[2553]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2553 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.843000 audit[2553]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee9f305f0 a2=0 a3=7ffee9f305dc items=0 ppid=2498 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.843000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Jul  2 07:55:07.847000 audit[2555]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2555 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.847000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcd6dcf90 a2=0 a3=7fffcd6dcf7c items=0 ppid=2498 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Jul  2 07:55:07.852000 audit[2558]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2558 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.852000 audit[2558]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd60955860 a2=0 a3=7ffd6095584c items=0 ppid=2498 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.852000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53
Jul  2 07:55:07.853000 audit[2559]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.853000 audit[2559]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff72dec0e0 a2=0 a3=7fff72dec0cc items=0 ppid=2498 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Jul  2 07:55:07.856000 audit[2561]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2561 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.856000 audit[2561]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc91931700 a2=0 a3=7ffc919316ec items=0 ppid=2498 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Jul  2 07:55:07.858000 audit[2562]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2562 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.858000 audit[2562]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff23b623d0 a2=0 a3=7fff23b623bc items=0 ppid=2498 pid=2562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Jul  2 07:55:07.861000 audit[2564]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2564 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.861000 audit[2564]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe70bf8510 a2=0 a3=7ffe70bf84fc items=0 ppid=2498 pid=2564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.861000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Jul  2 07:55:07.881000 audit[2567]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.881000 audit[2567]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5c0140d0 a2=0 a3=7ffe5c0140bc items=0 ppid=2498 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Jul  2 07:55:07.898283 kubelet[2283]: I0702 07:55:07.897880    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-9b56h" podStartSLOduration=2.098711805 podCreationTimestamp="2024-07-02 07:55:02 +0000 UTC" firstStartedPulling="2024-07-02 07:55:03.69925523 +0000 UTC m=+3.888177076" lastFinishedPulling="2024-07-02 07:55:07.498347948 +0000 UTC m=+7.687269799" observedRunningTime="2024-07-02 07:55:07.897469821 +0000 UTC m=+8.086391708" watchObservedRunningTime="2024-07-02 07:55:07.897804528 +0000 UTC m=+8.086726387"
Jul  2 07:55:07.897000 audit[2570]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2570 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.897000 audit[2570]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeff46b490 a2=0 a3=7ffeff46b47c items=0 ppid=2498 pid=2570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Jul  2 07:55:07.899000 audit[2571]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.899000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff203191c0 a2=0 a3=7fff203191ac items=0 ppid=2498 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Jul  2 07:55:07.903000 audit[2573]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2573 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.903000 audit[2573]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff69fb11e0 a2=0 a3=7fff69fb11cc items=0 ppid=2498 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Jul  2 07:55:07.955000 audit[2578]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.955000 audit[2578]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff6c909b00 a2=0 a3=7fff6c909aec items=0 ppid=2498 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Jul  2 07:55:07.957000 audit[2579]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2579 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.957000 audit[2579]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc36d16c00 a2=0 a3=7ffc36d16bec items=0 ppid=2498 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.957000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Jul  2 07:55:07.960000 audit[2581]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2581 subj=system_u:system_r:kernel_t:s0 comm="iptables"
Jul  2 07:55:07.960000 audit[2581]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffad88fa10 a2=0 a3=7fffad88f9fc items=0 ppid=2498 pid=2581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Jul  2 07:55:07.978000 audit[2587]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:07.978000 audit[2587]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd3b4a56f0 a2=0 a3=7ffd3b4a56dc items=0 ppid=2498 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:07.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:08.036000 audit[2587]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2587 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:08.036000 audit[2587]: SYSCALL arch=c000003e syscall=46 success=yes exit=25476 a0=3 a1=7ffd3b4a56f0 a2=0 a3=7ffd3b4a56dc items=0 ppid=2498 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:08.056000 audit[2596]: NETFILTER_CFG table=filter:41 family=2 entries=8 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:08.056000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc149a5250 a2=0 a3=7ffc149a523c items=0 ppid=2498 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:08.057000 audit[2596]: NETFILTER_CFG table=nat:42 family=2 entries=20 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:08.057000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc149a5250 a2=0 a3=7ffc149a523c items=0 ppid=2498 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:08.062000 audit[2597]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2597 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.062000 audit[2597]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd5f30c060 a2=0 a3=7ffd5f30c04c items=0 ppid=2498 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572
Jul  2 07:55:08.066000 audit[2599]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=2599 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.066000 audit[2599]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc5968050 a2=0 a3=7ffcc596803c items=0 ppid=2498 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963
Jul  2 07:55:08.074000 audit[2602]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2602 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.074000 audit[2602]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda91a97e0 a2=0 a3=7ffda91a97cc items=0 ppid=2498 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276
Jul  2 07:55:08.076000 audit[2603]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2603 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.076000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd37ff09a0 a2=0 a3=7ffd37ff098c items=0 ppid=2498 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572
Jul  2 07:55:08.080000 audit[2605]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.080000 audit[2605]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5cf4d7c0 a2=0 a3=7ffe5cf4d7ac items=0 ppid=2498 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.080000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453
Jul  2 07:55:08.082000 audit[2606]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2606 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.082000 audit[2606]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe275f8d10 a2=0 a3=7ffe275f8cfc items=0 ppid=2498 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572
Jul  2 07:55:08.085000 audit[2608]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2608 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.085000 audit[2608]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb64cbce0 a2=0 a3=7ffeb64cbccc items=0 ppid=2498 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245
Jul  2 07:55:08.090000 audit[2611]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2611 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.090000 audit[2611]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdc78112d0 a2=0 a3=7ffdc78112bc items=0 ppid=2498 pid=2611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D
Jul  2 07:55:08.092000 audit[2612]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.092000 audit[2612]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc11e892a0 a2=0 a3=7ffc11e8928c items=0 ppid=2498 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.092000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572
Jul  2 07:55:08.096000 audit[2614]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2614 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.096000 audit[2614]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc570dc70 a2=0 a3=7ffdc570dc5c items=0 ppid=2498 pid=2614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244
Jul  2 07:55:08.099000 audit[2615]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2615 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.099000 audit[2615]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeff272790 a2=0 a3=7ffeff27277c items=0 ppid=2498 pid=2615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572
Jul  2 07:55:08.103000 audit[2617]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2617 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.103000 audit[2617]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd97007d0 a2=0 a3=7fffd97007bc items=0 ppid=2498 pid=2617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A
Jul  2 07:55:08.108000 audit[2620]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2620 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.108000 audit[2620]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb145aef0 a2=0 a3=7ffeb145aedc items=0 ppid=2498 pid=2620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D
Jul  2 07:55:08.112000 audit[2623]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2623 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.112000 audit[2623]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7edb5550 a2=0 a3=7ffe7edb553c items=0 ppid=2498 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.112000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C
Jul  2 07:55:08.114000 audit[2624]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2624 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.114000 audit[2624]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec724aa70 a2=0 a3=7ffec724aa5c items=0 ppid=2498 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174
Jul  2 07:55:08.118000 audit[2626]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=2626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.118000 audit[2626]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9a3a7f00 a2=0 a3=7ffc9a3a7eec items=0 ppid=2498 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Jul  2 07:55:08.126000 audit[2629]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.126000 audit[2629]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcd8dbd010 a2=0 a3=7ffcd8dbcffc items=0 ppid=2498 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553
Jul  2 07:55:08.128000 audit[2630]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2630 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.128000 audit[2630]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe82c63a60 a2=0 a3=7ffe82c63a4c items=0 ppid=2498 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174
Jul  2 07:55:08.130000 audit[2632]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.130000 audit[2632]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffda982780 a2=0 a3=7fffda98276c items=0 ppid=2498 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47
Jul  2 07:55:08.132000 audit[2633]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.132000 audit[2633]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdeea8d720 a2=0 a3=7ffdeea8d70c items=0 ppid=2498 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572
Jul  2 07:55:08.135000 audit[2635]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=2635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.135000 audit[2635]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff7e786d10 a2=0 a3=7fff7e786cfc items=0 ppid=2498 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.135000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Jul  2 07:55:08.141000 audit[2638]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2638 subj=system_u:system_r:kernel_t:s0 comm="ip6tables"
Jul  2 07:55:08.141000 audit[2638]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3148f910 a2=0 a3=7ffe3148f8fc items=0 ppid=2498 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C
Jul  2 07:55:08.144000 audit[2640]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=2640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Jul  2 07:55:08.144000 audit[2640]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc2c3e9770 a2=0 a3=7ffc2c3e975c items=0 ppid=2498 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.144000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:08.145000 audit[2640]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=2640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto"
Jul  2 07:55:08.145000 audit[2640]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc2c3e9770 a2=0 a3=7ffc2c3e975c items=0 ppid=2498 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:08.145000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:08.515329 systemd[1]: run-containerd-runc-k8s.io-a03588618bd0fefbf20b803cc4da6cf1e0d1b2eaa7c4cc9a7eba056294978a87-runc.bIhlnB.mount: Deactivated successfully.
Jul  2 07:55:08.636540 kubelet[2283]: E0702 07:55:08.636508    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:09.637707 kubelet[2283]: E0702 07:55:09.637556    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:09.837494 kubelet[2283]: E0702 07:55:09.837398    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:10.638865 kubelet[2283]: E0702 07:55:10.638782    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:11.639181 kubelet[2283]: E0702 07:55:11.639141    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:11.837907 kubelet[2283]: E0702 07:55:11.837870    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:12.639826 kubelet[2283]: E0702 07:55:12.639756    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:13.047879 env[1824]: time="2024-07-02T07:55:13.047173489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:13.051177 env[1824]: time="2024-07-02T07:55:13.051135826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:13.054444 env[1824]: time="2024-07-02T07:55:13.054405267Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:13.057489 env[1824]: time="2024-07-02T07:55:13.057447121Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:13.058219 env[1824]: time="2024-07-02T07:55:13.058104712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\""
Jul  2 07:55:13.079533 env[1824]: time="2024-07-02T07:55:13.079488165Z" level=info msg="CreateContainer within sandbox \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}"
Jul  2 07:55:13.113256 env[1824]: time="2024-07-02T07:55:13.113168798Z" level=info msg="CreateContainer within sandbox \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381\""
Jul  2 07:55:13.114049 env[1824]: time="2024-07-02T07:55:13.114015626Z" level=info msg="StartContainer for \"9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381\""
Jul  2 07:55:13.163772 systemd[1]: run-containerd-runc-k8s.io-9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381-runc.TgVlBb.mount: Deactivated successfully.
Jul  2 07:55:13.215000 env[1824]: time="2024-07-02T07:55:13.213178923Z" level=info msg="StartContainer for \"9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381\" returns successfully"
Jul  2 07:55:13.641125 kubelet[2283]: E0702 07:55:13.641018    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:13.837387 kubelet[2283]: E0702 07:55:13.837330    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:13.913012 env[1824]: time="2024-07-02T07:55:13.912875281Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"
Jul  2 07:55:13.942105 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381-rootfs.mount: Deactivated successfully.
Jul  2 07:55:14.013703 kubelet[2283]: I0702 07:55:14.013673    2283 kubelet_node_status.go:493] "Fast updating node status as it just became ready"
Jul  2 07:55:14.234841 env[1824]: time="2024-07-02T07:55:14.234429469Z" level=info msg="shim disconnected" id=9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381
Jul  2 07:55:14.234841 env[1824]: time="2024-07-02T07:55:14.234484148Z" level=warning msg="cleaning up after shim disconnected" id=9f9e5f83c8fc40f421c85d1157216715cb6620bb40e56c424526ecec3e981381 namespace=k8s.io
Jul  2 07:55:14.234841 env[1824]: time="2024-07-02T07:55:14.234496451Z" level=info msg="cleaning up dead shim"
Jul  2 07:55:14.245186 env[1824]: time="2024-07-02T07:55:14.245081581Z" level=warning msg="cleanup warnings time=\"2024-07-02T07:55:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2687 runtime=io.containerd.runc.v2\n"
Jul  2 07:55:14.642638 kubelet[2283]: E0702 07:55:14.642514    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:14.899030 env[1824]: time="2024-07-02T07:55:14.898896577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\""
Jul  2 07:55:15.643003 kubelet[2283]: E0702 07:55:15.642948    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:15.796147 amazon-ssm-agent[1804]: 2024-07-02 07:55:15 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds.
Jul  2 07:55:15.841184 env[1824]: time="2024-07-02T07:55:15.841128298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9v9fh,Uid:5b4d1a94-4482-4b3f-8a91-b62d2cc745de,Namespace:calico-system,Attempt:0,}"
Jul  2 07:55:15.963649 env[1824]: time="2024-07-02T07:55:15.960609378Z" level=error msg="Failed to destroy network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:15.963579 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a-shm.mount: Deactivated successfully.
Jul  2 07:55:15.965351 env[1824]: time="2024-07-02T07:55:15.965293486Z" level=error msg="encountered an error cleaning up failed sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:15.965457 env[1824]: time="2024-07-02T07:55:15.965366302Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9v9fh,Uid:5b4d1a94-4482-4b3f-8a91-b62d2cc745de,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:15.965734 kubelet[2283]: E0702 07:55:15.965707    2283 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:15.965826 kubelet[2283]: E0702 07:55:15.965794    2283 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:15.965826 kubelet[2283]: E0702 07:55:15.965823    2283 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9v9fh"
Jul  2 07:55:15.966186 kubelet[2283]: E0702 07:55:15.966152    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9v9fh_calico-system(5b4d1a94-4482-4b3f-8a91-b62d2cc745de)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9v9fh_calico-system(5b4d1a94-4482-4b3f-8a91-b62d2cc745de)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:16.643178 kubelet[2283]: E0702 07:55:16.643105    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:16.899487 kubelet[2283]: I0702 07:55:16.899379    2283 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:55:16.900317 env[1824]: time="2024-07-02T07:55:16.900279079Z" level=info msg="StopPodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\""
Jul  2 07:55:16.989344 env[1824]: time="2024-07-02T07:55:16.989270362Z" level=error msg="StopPodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" failed" error="failed to destroy network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:16.989669 kubelet[2283]: E0702 07:55:16.989640    2283 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:55:16.989778 kubelet[2283]: E0702 07:55:16.989758    2283 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"}
Jul  2 07:55:16.989845 kubelet[2283]: E0702 07:55:16.989832    2283 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Jul  2 07:55:16.989942 kubelet[2283]: E0702 07:55:16.989884    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5b4d1a94-4482-4b3f-8a91-b62d2cc745de\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9v9fh" podUID="5b4d1a94-4482-4b3f-8a91-b62d2cc745de"
Jul  2 07:55:17.637744 kernel: kauditd_printk_skb: 149 callbacks suppressed
Jul  2 07:55:17.637903 kernel: audit: type=1131 audit(1719906917.628:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:55:17.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'
Jul  2 07:55:17.629109 systemd[1]: systemd-hostnamed.service: Deactivated successfully.
Jul  2 07:55:17.644158 kubelet[2283]: E0702 07:55:17.644123    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:18.420105 kubelet[2283]: I0702 07:55:18.419909    2283 topology_manager.go:215] "Topology Admit Handler" podUID="e9d1bab7-c102-46ac-9072-9604ce9b81b8" podNamespace="default" podName="nginx-deployment-6d5f899847-mjg64"
Jul  2 07:55:18.509363 kubelet[2283]: I0702 07:55:18.509330    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kn9ks\" (UniqueName: \"kubernetes.io/projected/e9d1bab7-c102-46ac-9072-9604ce9b81b8-kube-api-access-kn9ks\") pod \"nginx-deployment-6d5f899847-mjg64\" (UID: \"e9d1bab7-c102-46ac-9072-9604ce9b81b8\") " pod="default/nginx-deployment-6d5f899847-mjg64"
Jul  2 07:55:18.645412 kubelet[2283]: E0702 07:55:18.645379    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:18.725877 env[1824]: time="2024-07-02T07:55:18.725668227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mjg64,Uid:e9d1bab7-c102-46ac-9072-9604ce9b81b8,Namespace:default,Attempt:0,}"
Jul  2 07:55:18.910247 env[1824]: time="2024-07-02T07:55:18.910151561Z" level=error msg="Failed to destroy network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:18.913926 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16-shm.mount: Deactivated successfully.
Jul  2 07:55:18.915310 env[1824]: time="2024-07-02T07:55:18.915227609Z" level=error msg="encountered an error cleaning up failed sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:18.915415 env[1824]: time="2024-07-02T07:55:18.915315686Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mjg64,Uid:e9d1bab7-c102-46ac-9072-9604ce9b81b8,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:18.916215 kubelet[2283]: E0702 07:55:18.915687    2283 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:18.916215 kubelet[2283]: E0702 07:55:18.915749    2283 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-mjg64"
Jul  2 07:55:18.916215 kubelet[2283]: E0702 07:55:18.915780    2283 kuberuntime_manager.go:1171] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-mjg64"
Jul  2 07:55:18.916533 kubelet[2283]: E0702 07:55:18.915848    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-mjg64_default(e9d1bab7-c102-46ac-9072-9604ce9b81b8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-mjg64_default(e9d1bab7-c102-46ac-9072-9604ce9b81b8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-mjg64" podUID="e9d1bab7-c102-46ac-9072-9604ce9b81b8"
Jul  2 07:55:19.646246 kubelet[2283]: E0702 07:55:19.646184    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:19.912419 kubelet[2283]: I0702 07:55:19.909067    2283 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:55:19.912785 env[1824]: time="2024-07-02T07:55:19.912749596Z" level=info msg="StopPodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\""
Jul  2 07:55:20.003095 env[1824]: time="2024-07-02T07:55:20.002983096Z" level=error msg="StopPodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" failed" error="failed to destroy network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/"
Jul  2 07:55:20.003419 kubelet[2283]: E0702 07:55:20.003398    2283 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:55:20.003503 kubelet[2283]: E0702 07:55:20.003467    2283 kuberuntime_manager.go:1380] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"}
Jul  2 07:55:20.003553 kubelet[2283]: E0702 07:55:20.003541    2283 kuberuntime_manager.go:1080] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e9d1bab7-c102-46ac-9072-9604ce9b81b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\""
Jul  2 07:55:20.003643 kubelet[2283]: E0702 07:55:20.003583    2283 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e9d1bab7-c102-46ac-9072-9604ce9b81b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-mjg64" podUID="e9d1bab7-c102-46ac-9072-9604ce9b81b8"
Jul  2 07:55:20.624906 kubelet[2283]: E0702 07:55:20.624841    2283 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:20.646797 kubelet[2283]: E0702 07:55:20.646723    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:21.647354 kubelet[2283]: E0702 07:55:21.647314    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:22.648272 kubelet[2283]: E0702 07:55:22.648183    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:23.185726 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3641897228.mount: Deactivated successfully.
Jul  2 07:55:23.225120 env[1824]: time="2024-07-02T07:55:23.225067185Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:23.227237 env[1824]: time="2024-07-02T07:55:23.227195130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:23.229869 env[1824]: time="2024-07-02T07:55:23.229823993Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:23.231582 env[1824]: time="2024-07-02T07:55:23.231494615Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:23.232333 env[1824]: time="2024-07-02T07:55:23.232295549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\""
Jul  2 07:55:23.253724 env[1824]: time="2024-07-02T07:55:23.253670926Z" level=info msg="CreateContainer within sandbox \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}"
Jul  2 07:55:23.288587 env[1824]: time="2024-07-02T07:55:23.288532584Z" level=info msg="CreateContainer within sandbox \"ec45ef32db767114cb0afe8d73d8422ea1e4d6fe56f836fb94030f9be57dd8ea\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"343c22de3f46268c2c02e0a6e8b3b75596c90279af260d0de2b66f0b0d550e7e\""
Jul  2 07:55:23.289314 env[1824]: time="2024-07-02T07:55:23.289281285Z" level=info msg="StartContainer for \"343c22de3f46268c2c02e0a6e8b3b75596c90279af260d0de2b66f0b0d550e7e\""
Jul  2 07:55:23.381935 env[1824]: time="2024-07-02T07:55:23.381861600Z" level=info msg="StartContainer for \"343c22de3f46268c2c02e0a6e8b3b75596c90279af260d0de2b66f0b0d550e7e\" returns successfully"
Jul  2 07:55:23.508336 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Jul  2 07:55:23.508518 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Jul  2 07:55:23.649536 kubelet[2283]: E0702 07:55:23.649487    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:23.962366 kubelet[2283]: I0702 07:55:23.961643    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gn5sb" podStartSLOduration=2.4281550530000002 podCreationTimestamp="2024-07-02 07:55:02 +0000 UTC" firstStartedPulling="2024-07-02 07:55:03.699221619 +0000 UTC m=+3.888143464" lastFinishedPulling="2024-07-02 07:55:23.232640734 +0000 UTC m=+23.421562586" observedRunningTime="2024-07-02 07:55:23.96149568 +0000 UTC m=+24.150417540" watchObservedRunningTime="2024-07-02 07:55:23.961574175 +0000 UTC m=+24.150496034"
Jul  2 07:55:24.649708 kubelet[2283]: E0702 07:55:24.649660    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:24.977380 systemd[1]: run-containerd-runc-k8s.io-343c22de3f46268c2c02e0a6e8b3b75596c90279af260d0de2b66f0b0d550e7e-runc.OdiJhG.mount: Deactivated successfully.
Jul  2 07:55:25.076000 audit[2952]: AVC avc:  denied  { write } for  pid=2952 comm="tee" name="fd" dev="proc" ino=20677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.082095 kernel: audit: type=1400 audit(1719906925.076:252): avc:  denied  { write } for  pid=2952 comm="tee" name="fd" dev="proc" ino=20677 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.076000 audit[2952]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe59913a0d a2=241 a3=1b6 items=1 ppid=2932 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.088992 kernel: audit: type=1300 audit(1719906925.076:252): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe59913a0d a2=241 a3=1b6 items=1 ppid=2932 pid=2952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.076000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Jul  2 07:55:25.096191 kernel: audit: type=1307 audit(1719906925.076:252): cwd="/etc/service/enabled/allocate-tunnel-addrs/log"
Jul  2 07:55:25.076000 audit: PATH item=0 name="/dev/fd/63" inode=20662 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.103001 kernel: audit: type=1302 audit(1719906925.076:252): item=0 name="/dev/fd/63" inode=20662 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.113065 kernel: audit: type=1327 audit(1719906925.076:252): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.128000 audit[2960]: AVC avc:  denied  { write } for  pid=2960 comm="tee" name="fd" dev="proc" ino=19802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.134067 kernel: audit: type=1400 audit(1719906925.128:253): avc:  denied  { write } for  pid=2960 comm="tee" name="fd" dev="proc" ino=19802 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.149910 kernel: audit: type=1300 audit(1719906925.128:253): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdce2e9a1e a2=241 a3=1b6 items=1 ppid=2933 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.150060 kernel: audit: type=1307 audit(1719906925.128:253): cwd="/etc/service/enabled/bird/log"
Jul  2 07:55:25.128000 audit[2960]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdce2e9a1e a2=241 a3=1b6 items=1 ppid=2933 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.128000 audit: CWD cwd="/etc/service/enabled/bird/log"
Jul  2 07:55:25.128000 audit: PATH item=0 name="/dev/fd/63" inode=20683 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.159079 kernel: audit: type=1302 audit(1719906925.128:253): item=0 name="/dev/fd/63" inode=20683 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.128000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.171053 kernel: audit: type=1327 audit(1719906925.128:253): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.147000 audit[2966]: AVC avc:  denied  { write } for  pid=2966 comm="tee" name="fd" dev="proc" ino=20710 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.147000 audit[2966]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf9c2da1d a2=241 a3=1b6 items=1 ppid=2935 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.147000 audit: CWD cwd="/etc/service/enabled/bird6/log"
Jul  2 07:55:25.147000 audit: PATH item=0 name="/dev/fd/63" inode=20690 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.147000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.160000 audit[2989]: AVC avc:  denied  { write } for  pid=2989 comm="tee" name="fd" dev="proc" ino=20718 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.160000 audit[2989]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8b25ca1d a2=241 a3=1b6 items=1 ppid=2928 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.160000 audit: CWD cwd="/etc/service/enabled/felix/log"
Jul  2 07:55:25.160000 audit: PATH item=0 name="/dev/fd/63" inode=20707 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.160000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.162000 audit[2970]: AVC avc:  denied  { write } for  pid=2970 comm="tee" name="fd" dev="proc" ino=20720 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.162000 audit[2970]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffede9aaa1f a2=241 a3=1b6 items=1 ppid=2930 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.162000 audit: CWD cwd="/etc/service/enabled/cni/log"
Jul  2 07:55:25.162000 audit: PATH item=0 name="/dev/fd/63" inode=20699 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.162000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.164000 audit[2986]: AVC avc:  denied  { write } for  pid=2986 comm="tee" name="fd" dev="proc" ino=20724 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.164000 audit[2986]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3f124a1d a2=241 a3=1b6 items=1 ppid=2926 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.164000 audit: CWD cwd="/etc/service/enabled/confd/log"
Jul  2 07:55:25.164000 audit: PATH item=0 name="/dev/fd/63" inode=20704 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.185000 audit[2992]: AVC avc:  denied  { write } for  pid=2992 comm="tee" name="fd" dev="proc" ino=20732 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0
Jul  2 07:55:25.185000 audit[2992]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbd0d9a0e a2=241 a3=1b6 items=1 ppid=2940 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.185000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log"
Jul  2 07:55:25.185000 audit: PATH item=0 name="/dev/fd/63" inode=20708 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:55:25.185000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633
Jul  2 07:55:25.544081 kernel: Initializing XFRM netlink socket
Jul  2 07:55:25.650030 kubelet[2283]: E0702 07:55:25.649905    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:25.664300 systemd-networkd[1510]: vxlan.calico: Link UP
Jul  2 07:55:25.664309 systemd-networkd[1510]: vxlan.calico: Gained carrier
Jul  2 07:55:25.666394 (udev-worker)[2850]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit: BPF prog-id=10 op=LOAD
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc220c1cd0 a2=70 a3=7f9ff2af6000 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.755000 audit: BPF prog-id=10 op=UNLOAD
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit: BPF prog-id=11 op=LOAD
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc220c1cd0 a2=70 a3=6f items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.755000 audit: BPF prog-id=11 op=UNLOAD
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc220c1c80 a2=70 a3=7ffc220c1cd0 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit: BPF prog-id=12 op=LOAD
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc220c1c60 a2=70 a3=7ffc220c1cd0 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.755000 audit: BPF prog-id=12 op=UNLOAD
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc220c1d40 a2=70 a3=0 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc220c1d30 a2=70 a3=0 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.755000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.755000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc220c1ca0 a2=70 a3=0 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.755000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.757000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.757000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc220c1d70 a2=70 a3=1dfba00 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.757000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.757000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc220c1d70 a2=70 a3=1df8880 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.757000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { perfmon } for  pid=3068 comm="bpftool" capability=38  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit[3068]: AVC avc:  denied  { bpf } for  pid=3068 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.759000 audit: BPF prog-id=13 op=LOAD
Jul  2 07:55:25.759000 audit[3068]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc220c1c90 a2=70 a3=0 items=0 ppid=2929 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.759000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470
Jul  2 07:55:25.764000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.764000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8e9c4ca0 a2=70 a3=fff80800 items=0 ppid=2929 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Jul  2 07:55:25.764000 audit[3070]: AVC avc:  denied  { bpf } for  pid=3070 comm="bpftool" capability=39  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0
Jul  2 07:55:25.764000 audit[3070]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd8e9c4b70 a2=70 a3=3 items=0 ppid=2929 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.764000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41
Jul  2 07:55:25.768364 (udev-worker)[2852]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:55:25.773000 audit: BPF prog-id=13 op=UNLOAD
Jul  2 07:55:25.773000 audit[2929]: SYSCALL arch=c000003e syscall=45 success=no exit=-4 a0=a a1=c000a2fe98 a2=10000 a3=0 items=0 ppid=2919 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="calico-node" exe="/usr/bin/calico-node" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.773000 audit: PROCTITLE proctitle=63616C69636F2D6E6F6465002D66656C6978
Jul  2 07:55:25.880000 audit[3097]: NETFILTER_CFG table=mangle:67 family=2 entries=16 op=nft_register_chain pid=3097 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:25.880000 audit[3097]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffcf70ecf90 a2=0 a3=7ffcf70ecf7c items=0 ppid=2929 pid=3097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.880000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:25.899000 audit[3096]: NETFILTER_CFG table=nat:68 family=2 entries=15 op=nft_register_chain pid=3096 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:25.899000 audit[3096]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff468fce80 a2=0 a3=7fff468fce6c items=0 ppid=2929 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.899000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:25.905000 audit[3095]: NETFILTER_CFG table=raw:69 family=2 entries=19 op=nft_register_chain pid=3095 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:25.905000 audit[3095]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffe13ae9e80 a2=0 a3=7ffe13ae9e6c items=0 ppid=2929 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.905000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:25.913000 audit[3098]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:25.913000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe068b65b0 a2=0 a3=7ffe068b659c items=0 ppid=2929 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:25.913000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:26.650218 kubelet[2283]: E0702 07:55:26.650163    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:26.802253 systemd-networkd[1510]: vxlan.calico: Gained IPv6LL
Jul  2 07:55:27.650575 kubelet[2283]: E0702 07:55:27.650515    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:28.650698 kubelet[2283]: E0702 07:55:28.650646    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:29.651825 kubelet[2283]: E0702 07:55:29.651772    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:30.652726 kubelet[2283]: E0702 07:55:30.652680    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:31.653229 kubelet[2283]: E0702 07:55:31.653178    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:31.837789 env[1824]: time="2024-07-02T07:55:31.837715221Z" level=info msg="StopPodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\""
Jul  2 07:55:32.044761 update_engine[1820]: I0702 07:55:32.044302  1820 update_attempter.cc:509] Updating boot flags...
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:31.944 [INFO][3149] k8s.go 608: Cleaning up netns ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:31.944 [INFO][3149] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" iface="eth0" netns="/var/run/netns/cni-ba856fd6-067a-95a2-7f64-621069a4cdcd"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:31.944 [INFO][3149] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" iface="eth0" netns="/var/run/netns/cni-ba856fd6-067a-95a2-7f64-621069a4cdcd"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:31.945 [INFO][3149] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" iface="eth0" netns="/var/run/netns/cni-ba856fd6-067a-95a2-7f64-621069a4cdcd"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:31.945 [INFO][3149] k8s.go 615: Releasing IP address(es) ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:31.945 [INFO][3149] utils.go 188: Calico CNI releasing IP address ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.051 [INFO][3155] ipam_plugin.go 411: Releasing address using handleID ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.051 [INFO][3155] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.051 [INFO][3155] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.066 [WARNING][3155] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.066 [INFO][3155] ipam_plugin.go 439: Releasing address using workloadID ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.071 [INFO][3155] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:55:32.076148 env[1824]: 2024-07-02 07:55:32.073 [INFO][3149] k8s.go 621: Teardown processing complete. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:55:32.083235 systemd[1]: run-netns-cni\x2dba856fd6\x2d067a\x2d95a2\x2d7f64\x2d621069a4cdcd.mount: Deactivated successfully.
Jul  2 07:55:32.085368 env[1824]: time="2024-07-02T07:55:32.085288802Z" level=info msg="TearDown network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" successfully"
Jul  2 07:55:32.085478 env[1824]: time="2024-07-02T07:55:32.085377687Z" level=info msg="StopPodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" returns successfully"
Jul  2 07:55:32.086180 env[1824]: time="2024-07-02T07:55:32.086144789Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9v9fh,Uid:5b4d1a94-4482-4b3f-8a91-b62d2cc745de,Namespace:calico-system,Attempt:1,}"
Jul  2 07:55:32.502081 systemd-networkd[1510]: cali80a975f6c82: Link UP
Jul  2 07:55:32.505137 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Jul  2 07:55:32.505227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali80a975f6c82: link becomes ready
Jul  2 07:55:32.505375 systemd-networkd[1510]: cali80a975f6c82: Gained carrier
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.270 [INFO][3180] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.44-k8s-csi--node--driver--9v9fh-eth0 csi-node-driver- calico-system  5b4d1a94-4482-4b3f-8a91-b62d2cc745de 911 0 2024-07-02 07:55:02 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  172.31.22.44  csi-node-driver-9v9fh eth0 default [] []   [kns.calico-system ksa.calico-system.default] cali80a975f6c82  [] []}} ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.271 [INFO][3180] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.400 [INFO][3260] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" HandleID="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.425 [INFO][3260] ipam_plugin.go 264: Auto assigning IP ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" HandleID="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a220), Attrs:map[string]string{"namespace":"calico-system", "node":"172.31.22.44", "pod":"csi-node-driver-9v9fh", "timestamp":"2024-07-02 07:55:32.40028831 +0000 UTC"}, Hostname:"172.31.22.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.425 [INFO][3260] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.425 [INFO][3260] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.425 [INFO][3260] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.44'
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.433 [INFO][3260] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.450 [INFO][3260] ipam.go 372: Looking up existing affinities for host host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.463 [INFO][3260] ipam.go 489: Trying affinity for 192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.467 [INFO][3260] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.471 [INFO][3260] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.471 [INFO][3260] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.474 [INFO][3260] ipam.go 1685: Creating new handle: k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.480 [INFO][3260] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.494 [INFO][3260] ipam.go 1216: Successfully claimed IPs: [192.168.11.1/26] block=192.168.11.0/26 handle="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.494 [INFO][3260] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.1/26] handle="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" host="172.31.22.44"
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.494 [INFO][3260] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:55:32.535249 env[1824]: 2024-07-02 07:55:32.494 [INFO][3260] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.11.1/26] IPv6=[] ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" HandleID="k8s-pod-network.dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.549476 env[1824]: 2024-07-02 07:55:32.498 [INFO][3180] k8s.go 386: Populated endpoint ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-csi--node--driver--9v9fh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b4d1a94-4482-4b3f-8a91-b62d2cc745de", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 2, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"", Pod:"csi-node-driver-9v9fh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80a975f6c82", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:32.549476 env[1824]: 2024-07-02 07:55:32.499 [INFO][3180] k8s.go 387: Calico CNI using IPs: [192.168.11.1/32] ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.549476 env[1824]: 2024-07-02 07:55:32.499 [INFO][3180] dataplane_linux.go 68: Setting the host side veth name to cali80a975f6c82 ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.549476 env[1824]: 2024-07-02 07:55:32.506 [INFO][3180] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.549476 env[1824]: 2024-07-02 07:55:32.508 [INFO][3180] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-csi--node--driver--9v9fh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b4d1a94-4482-4b3f-8a91-b62d2cc745de", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 2, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26", Pod:"csi-node-driver-9v9fh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80a975f6c82", MAC:"3e:fc:7a:39:05:14", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:32.549476 env[1824]: 2024-07-02 07:55:32.532 [INFO][3180] k8s.go 500: Wrote updated endpoint to datastore ContainerID="dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26" Namespace="calico-system" Pod="csi-node-driver-9v9fh" WorkloadEndpoint="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:55:32.569642 kernel: kauditd_printk_skb: 116 callbacks suppressed
Jul  2 07:55:32.569770 kernel: audit: type=1325 audit(1719906932.554:279): table=filter:71 family=2 entries=34 op=nft_register_chain pid=3343 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:32.569805 kernel: audit: type=1300 audit(1719906932.554:279): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff1d4aef10 a2=0 a3=7fff1d4aeefc items=0 ppid=2929 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:32.554000 audit[3343]: NETFILTER_CFG table=filter:71 family=2 entries=34 op=nft_register_chain pid=3343 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:32.554000 audit[3343]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff1d4aef10 a2=0 a3=7fff1d4aeefc items=0 ppid=2929 pid=3343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:32.566909 (udev-worker)[3313]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:55:32.594439 kernel: audit: type=1327 audit(1719906932.554:279): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:32.554000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:32.603633 env[1824]: time="2024-07-02T07:55:32.603551056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:55:32.604073 env[1824]: time="2024-07-02T07:55:32.604029094Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:55:32.604230 env[1824]: time="2024-07-02T07:55:32.604203644Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:55:32.604603 env[1824]: time="2024-07-02T07:55:32.604567898Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26 pid=3370 runtime=io.containerd.runc.v2
Jul  2 07:55:32.653878 kubelet[2283]: E0702 07:55:32.653680    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:32.764200 env[1824]: time="2024-07-02T07:55:32.760144531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9v9fh,Uid:5b4d1a94-4482-4b3f-8a91-b62d2cc745de,Namespace:calico-system,Attempt:1,} returns sandbox id \"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26\""
Jul  2 07:55:32.768526 env[1824]: time="2024-07-02T07:55:32.765687254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\""
Jul  2 07:55:32.844141 env[1824]: time="2024-07-02T07:55:32.843940167Z" level=info msg="StopPodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\""
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.016 [INFO][3472] k8s.go 608: Cleaning up netns ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.017 [INFO][3472] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" iface="eth0" netns="/var/run/netns/cni-73180f45-41af-d385-2673-1e1b79aeed2e"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.018 [INFO][3472] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" iface="eth0" netns="/var/run/netns/cni-73180f45-41af-d385-2673-1e1b79aeed2e"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.018 [INFO][3472] dataplane_linux.go 568: Workload's veth was already gone.  Nothing to do. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" iface="eth0" netns="/var/run/netns/cni-73180f45-41af-d385-2673-1e1b79aeed2e"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.018 [INFO][3472] k8s.go 615: Releasing IP address(es) ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.018 [INFO][3472] utils.go 188: Calico CNI releasing IP address ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.058 [INFO][3520] ipam_plugin.go 411: Releasing address using handleID ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.058 [INFO][3520] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.059 [INFO][3520] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.071 [WARNING][3520] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.071 [INFO][3520] ipam_plugin.go 439: Releasing address using workloadID ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.073 [INFO][3520] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:55:33.087386 env[1824]: 2024-07-02 07:55:33.074 [INFO][3472] k8s.go 621: Teardown processing complete. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:55:33.087386 env[1824]: time="2024-07-02T07:55:33.085353266Z" level=info msg="TearDown network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" successfully"
Jul  2 07:55:33.087386 env[1824]: time="2024-07-02T07:55:33.085434068Z" level=info msg="StopPodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" returns successfully"
Jul  2 07:55:33.087386 env[1824]: time="2024-07-02T07:55:33.086690568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mjg64,Uid:e9d1bab7-c102-46ac-9072-9604ce9b81b8,Namespace:default,Attempt:1,}"
Jul  2 07:55:33.083609 systemd[1]: run-containerd-runc-k8s.io-dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26-runc.XIPg0p.mount: Deactivated successfully.
Jul  2 07:55:33.088436 systemd[1]: run-netns-cni\x2d73180f45\x2d41af\x2dd385\x2d2673\x2d1e1b79aeed2e.mount: Deactivated successfully.
Jul  2 07:55:33.276833 systemd-networkd[1510]: cali2533f26f37e: Link UP
Jul  2 07:55:33.279098 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2533f26f37e: link becomes ready
Jul  2 07:55:33.279826 systemd-networkd[1510]: cali2533f26f37e: Gained carrier
Jul  2 07:55:33.280608 (udev-worker)[3174]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.164 [INFO][3527] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0 nginx-deployment-6d5f899847- default  e9d1bab7-c102-46ac-9072-9604ce9b81b8 922 0 2024-07-02 07:55:18 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  172.31.22.44  nginx-deployment-6d5f899847-mjg64 eth0 default [] []   [kns.default ksa.default.default] cali2533f26f37e  [] []}} ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.164 [INFO][3527] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.207 [INFO][3539] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" HandleID="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.229 [INFO][3539] ipam_plugin.go 264: Auto assigning IP ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" HandleID="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031c640), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.44", "pod":"nginx-deployment-6d5f899847-mjg64", "timestamp":"2024-07-02 07:55:33.206994321 +0000 UTC"}, Hostname:"172.31.22.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.230 [INFO][3539] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.230 [INFO][3539] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.230 [INFO][3539] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.44'
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.235 [INFO][3539] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.244 [INFO][3539] ipam.go 372: Looking up existing affinities for host host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.251 [INFO][3539] ipam.go 489: Trying affinity for 192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.255 [INFO][3539] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.258 [INFO][3539] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.258 [INFO][3539] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.260 [INFO][3539] ipam.go 1685: Creating new handle: k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.265 [INFO][3539] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.271 [INFO][3539] ipam.go 1216: Successfully claimed IPs: [192.168.11.2/26] block=192.168.11.0/26 handle="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.271 [INFO][3539] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.2/26] handle="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" host="172.31.22.44"
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.271 [INFO][3539] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:55:33.307639 env[1824]: 2024-07-02 07:55:33.271 [INFO][3539] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.11.2/26] IPv6=[] ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" HandleID="k8s-pod-network.52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.309527 env[1824]: 2024-07-02 07:55:33.273 [INFO][3527] k8s.go 386: Populated endpoint ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e9d1bab7-c102-46ac-9072-9604ce9b81b8", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"", Pod:"nginx-deployment-6d5f899847-mjg64", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2533f26f37e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:33.309527 env[1824]: 2024-07-02 07:55:33.273 [INFO][3527] k8s.go 387: Calico CNI using IPs: [192.168.11.2/32] ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.309527 env[1824]: 2024-07-02 07:55:33.273 [INFO][3527] dataplane_linux.go 68: Setting the host side veth name to cali2533f26f37e ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.309527 env[1824]: 2024-07-02 07:55:33.277 [INFO][3527] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.309527 env[1824]: 2024-07-02 07:55:33.282 [INFO][3527] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e9d1bab7-c102-46ac-9072-9604ce9b81b8", ResourceVersion:"922", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31", Pod:"nginx-deployment-6d5f899847-mjg64", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2533f26f37e", MAC:"ea:e4:47:6e:c1:1a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:33.309527 env[1824]: 2024-07-02 07:55:33.304 [INFO][3527] k8s.go 500: Wrote updated endpoint to datastore ContainerID="52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31" Namespace="default" Pod="nginx-deployment-6d5f899847-mjg64" WorkloadEndpoint="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:55:33.324000 audit[3550]: NETFILTER_CFG table=filter:72 family=2 entries=38 op=nft_register_chain pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:33.324000 audit[3550]: SYSCALL arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc750e5d10 a2=0 a3=7ffc750e5cfc items=0 ppid=2929 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:33.338844 kernel: audit: type=1325 audit(1719906933.324:280): table=filter:72 family=2 entries=38 op=nft_register_chain pid=3550 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:33.339692 kernel: audit: type=1300 audit(1719906933.324:280): arch=c000003e syscall=46 success=yes exit=20312 a0=3 a1=7ffc750e5d10 a2=0 a3=7ffc750e5cfc items=0 ppid=2929 pid=3550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:33.339736 kernel: audit: type=1327 audit(1719906933.324:280): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:33.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:33.356108 env[1824]: time="2024-07-02T07:55:33.356028367Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:55:33.356108 env[1824]: time="2024-07-02T07:55:33.356069857Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:55:33.356340 env[1824]: time="2024-07-02T07:55:33.356086110Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:55:33.356340 env[1824]: time="2024-07-02T07:55:33.356299266Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31 pid=3568 runtime=io.containerd.runc.v2
Jul  2 07:55:33.450338 env[1824]: time="2024-07-02T07:55:33.450287905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-mjg64,Uid:e9d1bab7-c102-46ac-9072-9604ce9b81b8,Namespace:default,Attempt:1,} returns sandbox id \"52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31\""
Jul  2 07:55:33.654448 kubelet[2283]: E0702 07:55:33.654330    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:33.844784 systemd-networkd[1510]: cali80a975f6c82: Gained IPv6LL
Jul  2 07:55:34.076838 env[1824]: time="2024-07-02T07:55:34.076718512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:34.082113 env[1824]: time="2024-07-02T07:55:34.082067132Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:34.087448 env[1824]: time="2024-07-02T07:55:34.087302907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:34.089696 env[1824]: time="2024-07-02T07:55:34.089658233Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:34.090149 env[1824]: time="2024-07-02T07:55:34.090113228Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\""
Jul  2 07:55:34.091657 env[1824]: time="2024-07-02T07:55:34.091616298Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Jul  2 07:55:34.092753 env[1824]: time="2024-07-02T07:55:34.092716169Z" level=info msg="CreateContainer within sandbox \"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}"
Jul  2 07:55:34.112653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3519372441.mount: Deactivated successfully.
Jul  2 07:55:34.122101 env[1824]: time="2024-07-02T07:55:34.122059832Z" level=info msg="CreateContainer within sandbox \"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3ef2146eebe8d80bf0fcdd2522f40d91ff0828e0d339e437a3c2c9f2d39c7504\""
Jul  2 07:55:34.123408 env[1824]: time="2024-07-02T07:55:34.123369069Z" level=info msg="StartContainer for \"3ef2146eebe8d80bf0fcdd2522f40d91ff0828e0d339e437a3c2c9f2d39c7504\""
Jul  2 07:55:34.231663 env[1824]: time="2024-07-02T07:55:34.231573757Z" level=info msg="StartContainer for \"3ef2146eebe8d80bf0fcdd2522f40d91ff0828e0d339e437a3c2c9f2d39c7504\" returns successfully"
Jul  2 07:55:34.655366 kubelet[2283]: E0702 07:55:34.655318    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:34.674212 systemd-networkd[1510]: cali2533f26f37e: Gained IPv6LL
Jul  2 07:55:35.082853 systemd[1]: run-containerd-runc-k8s.io-3ef2146eebe8d80bf0fcdd2522f40d91ff0828e0d339e437a3c2c9f2d39c7504-runc.JGusES.mount: Deactivated successfully.
Jul  2 07:55:35.656423 kubelet[2283]: E0702 07:55:35.656353    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:36.658636 kubelet[2283]: E0702 07:55:36.658566    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:36.902847 systemd[1]: run-containerd-runc-k8s.io-343c22de3f46268c2c02e0a6e8b3b75596c90279af260d0de2b66f0b0d550e7e-runc.Us6JVD.mount: Deactivated successfully.
Jul  2 07:55:37.403997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount519598817.mount: Deactivated successfully.
Jul  2 07:55:37.659514 kubelet[2283]: E0702 07:55:37.659140    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:38.660053 kubelet[2283]: E0702 07:55:38.659893    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:39.092194 env[1824]: time="2024-07-02T07:55:39.092110790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:39.095000 env[1824]: time="2024-07-02T07:55:39.094938285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:39.104284 env[1824]: time="2024-07-02T07:55:39.104238276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:39.111030 env[1824]: time="2024-07-02T07:55:39.110979183Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:39.111990 env[1824]: time="2024-07-02T07:55:39.111936812Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\""
Jul  2 07:55:39.113513 env[1824]: time="2024-07-02T07:55:39.113102157Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\""
Jul  2 07:55:39.116531 env[1824]: time="2024-07-02T07:55:39.116413091Z" level=info msg="CreateContainer within sandbox \"52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31\" for container &ContainerMetadata{Name:nginx,Attempt:0,}"
Jul  2 07:55:39.135440 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2969891393.mount: Deactivated successfully.
Jul  2 07:55:39.146266 env[1824]: time="2024-07-02T07:55:39.146213597Z" level=info msg="CreateContainer within sandbox \"52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"49e1501d86dd06f41c0fe83399ad1ee44642fcc01ef4490e4cf69697d2e1a660\""
Jul  2 07:55:39.147185 env[1824]: time="2024-07-02T07:55:39.147152262Z" level=info msg="StartContainer for \"49e1501d86dd06f41c0fe83399ad1ee44642fcc01ef4490e4cf69697d2e1a660\""
Jul  2 07:55:39.247564 env[1824]: time="2024-07-02T07:55:39.247047029Z" level=info msg="StartContainer for \"49e1501d86dd06f41c0fe83399ad1ee44642fcc01ef4490e4cf69697d2e1a660\" returns successfully"
Jul  2 07:55:39.660577 kubelet[2283]: E0702 07:55:39.660524    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:40.130017 systemd[1]: run-containerd-runc-k8s.io-49e1501d86dd06f41c0fe83399ad1ee44642fcc01ef4490e4cf69697d2e1a660-runc.lp4QVY.mount: Deactivated successfully.
Jul  2 07:55:40.542906 env[1824]: time="2024-07-02T07:55:40.542008112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:40.545434 env[1824]: time="2024-07-02T07:55:40.545384290Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:40.547773 env[1824]: time="2024-07-02T07:55:40.547737410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:40.549059 env[1824]: time="2024-07-02T07:55:40.549027674Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:40.549824 env[1824]: time="2024-07-02T07:55:40.549787542Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\""
Jul  2 07:55:40.552801 env[1824]: time="2024-07-02T07:55:40.552773421Z" level=info msg="CreateContainer within sandbox \"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}"
Jul  2 07:55:40.581914 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1928141720.mount: Deactivated successfully.
Jul  2 07:55:40.595736 env[1824]: time="2024-07-02T07:55:40.595398124Z" level=info msg="CreateContainer within sandbox \"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3d09e1c37227c9c138bcac576cc279c35bfff4d60f19e528e5e2d73a3dfd470f\""
Jul  2 07:55:40.596726 env[1824]: time="2024-07-02T07:55:40.596672661Z" level=info msg="StartContainer for \"3d09e1c37227c9c138bcac576cc279c35bfff4d60f19e528e5e2d73a3dfd470f\""
Jul  2 07:55:40.625176 kubelet[2283]: E0702 07:55:40.625148    2283 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:40.666996 kubelet[2283]: E0702 07:55:40.661631    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:40.705064 env[1824]: time="2024-07-02T07:55:40.704985026Z" level=info msg="StartContainer for \"3d09e1c37227c9c138bcac576cc279c35bfff4d60f19e528e5e2d73a3dfd470f\" returns successfully"
Jul  2 07:55:40.762317 kubelet[2283]: I0702 07:55:40.762017    2283 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0
Jul  2 07:55:40.762317 kubelet[2283]: I0702 07:55:40.762050    2283 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock
Jul  2 07:55:41.029374 kubelet[2283]: I0702 07:55:41.029337    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-mjg64" podStartSLOduration=17.368591978 podCreationTimestamp="2024-07-02 07:55:18 +0000 UTC" firstStartedPulling="2024-07-02 07:55:33.452159618 +0000 UTC m=+33.641081468" lastFinishedPulling="2024-07-02 07:55:39.112869244 +0000 UTC m=+39.301791094" observedRunningTime="2024-07-02 07:55:39.991223294 +0000 UTC m=+40.180145152" watchObservedRunningTime="2024-07-02 07:55:41.029301604 +0000 UTC m=+41.218223461"
Jul  2 07:55:41.662503 kubelet[2283]: E0702 07:55:41.662457    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:42.479000 audit[3767]: NETFILTER_CFG table=filter:73 family=2 entries=9 op=nft_register_rule pid=3767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.487599 kernel: audit: type=1325 audit(1719906942.479:281): table=filter:73 family=2 entries=9 op=nft_register_rule pid=3767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.487787 kernel: audit: type=1300 audit(1719906942.479:281): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffff0147840 a2=0 a3=7ffff014782c items=0 ppid=2498 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.479000 audit[3767]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffff0147840 a2=0 a3=7ffff014782c items=0 ppid=2498 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.497000 audit[3767]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.508810 kubelet[2283]: I0702 07:55:42.508776    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-9v9fh" podStartSLOduration=32.723223244 podCreationTimestamp="2024-07-02 07:55:02 +0000 UTC" firstStartedPulling="2024-07-02 07:55:32.76484685 +0000 UTC m=+32.953768701" lastFinishedPulling="2024-07-02 07:55:40.550332428 +0000 UTC m=+40.739254280" observedRunningTime="2024-07-02 07:55:41.033160543 +0000 UTC m=+41.222082403" watchObservedRunningTime="2024-07-02 07:55:42.508708823 +0000 UTC m=+42.697630682"
Jul  2 07:55:42.510382 kubelet[2283]: I0702 07:55:42.510359    2283 topology_manager.go:215] "Topology Admit Handler" podUID="acfa3c1c-d47c-45ec-885a-3e6ff315f221" podNamespace="calico-apiserver" podName="calico-apiserver-6fb78f445f-wf7rq"
Jul  2 07:55:42.512698 kernel: audit: type=1327 audit(1719906942.479:281): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.512772 kernel: audit: type=1325 audit(1719906942.497:282): table=nat:74 family=2 entries=20 op=nft_register_rule pid=3767 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.512810 kernel: audit: type=1300 audit(1719906942.497:282): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffff0147840 a2=0 a3=7ffff014782c items=0 ppid=2498 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.497000 audit[3767]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffff0147840 a2=0 a3=7ffff014782c items=0 ppid=2498 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.523004 kernel: audit: type=1327 audit(1719906942.497:282): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.531000 audit[3771]: NETFILTER_CFG table=filter:75 family=2 entries=10 op=nft_register_rule pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.531000 audit[3771]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcef3c9ee0 a2=0 a3=7ffcef3c9ecc items=0 ppid=2498 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.540121 kernel: audit: type=1325 audit(1719906942.531:283): table=filter:75 family=2 entries=10 op=nft_register_rule pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.540222 kernel: audit: type=1300 audit(1719906942.531:283): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcef3c9ee0 a2=0 a3=7ffcef3c9ecc items=0 ppid=2498 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.540259 kernel: audit: type=1327 audit(1719906942.531:283): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.542452 kernel: audit: type=1325 audit(1719906942.531:284): table=nat:76 family=2 entries=20 op=nft_register_rule pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.531000 audit[3771]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=3771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:42.531000 audit[3771]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcef3c9ee0 a2=0 a3=7ffcef3c9ecc items=0 ppid=2498 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:42.531000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:42.662767 kubelet[2283]: E0702 07:55:42.662729    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:42.701233 kubelet[2283]: I0702 07:55:42.701188    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/acfa3c1c-d47c-45ec-885a-3e6ff315f221-calico-apiserver-certs\") pod \"calico-apiserver-6fb78f445f-wf7rq\" (UID: \"acfa3c1c-d47c-45ec-885a-3e6ff315f221\") " pod="calico-apiserver/calico-apiserver-6fb78f445f-wf7rq"
Jul  2 07:55:42.701415 kubelet[2283]: I0702 07:55:42.701303    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hh6vf\" (UniqueName: \"kubernetes.io/projected/acfa3c1c-d47c-45ec-885a-3e6ff315f221-kube-api-access-hh6vf\") pod \"calico-apiserver-6fb78f445f-wf7rq\" (UID: \"acfa3c1c-d47c-45ec-885a-3e6ff315f221\") " pod="calico-apiserver/calico-apiserver-6fb78f445f-wf7rq"
Jul  2 07:55:42.803500 kubelet[2283]: E0702 07:55:42.803079    2283 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found
Jul  2 07:55:42.804490 kubelet[2283]: E0702 07:55:42.804456    2283 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/acfa3c1c-d47c-45ec-885a-3e6ff315f221-calico-apiserver-certs podName:acfa3c1c-d47c-45ec-885a-3e6ff315f221 nodeName:}" failed. No retries permitted until 2024-07-02 07:55:43.303152274 +0000 UTC m=+43.492074128 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/acfa3c1c-d47c-45ec-885a-3e6ff315f221-calico-apiserver-certs") pod "calico-apiserver-6fb78f445f-wf7rq" (UID: "acfa3c1c-d47c-45ec-885a-3e6ff315f221") : secret "calico-apiserver-certs" not found
Jul  2 07:55:43.423636 env[1824]: time="2024-07-02T07:55:43.423513722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fb78f445f-wf7rq,Uid:acfa3c1c-d47c-45ec-885a-3e6ff315f221,Namespace:calico-apiserver,Attempt:0,}"
Jul  2 07:55:43.663711 kubelet[2283]: E0702 07:55:43.663654    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:43.666134 (udev-worker)[3769]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:55:43.676162 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Jul  2 07:55:43.676293 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf9e4be1678: link becomes ready
Jul  2 07:55:43.675185 systemd-networkd[1510]: califf9e4be1678: Link UP
Jul  2 07:55:43.680198 systemd-networkd[1510]: califf9e4be1678: Gained carrier
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.499 [INFO][3776] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0 calico-apiserver-6fb78f445f- calico-apiserver  acfa3c1c-d47c-45ec-885a-3e6ff315f221 1005 0 2024-07-02 07:55:42 +0000 UTC <nil> <nil> map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6fb78f445f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s  172.31.22.44  calico-apiserver-6fb78f445f-wf7rq eth0 calico-apiserver [] []   [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] califf9e4be1678  [] []}} ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.499 [INFO][3776] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.571 [INFO][3788] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" HandleID="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Workload="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.592 [INFO][3788] ipam_plugin.go 264: Auto assigning IP ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" HandleID="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Workload="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a11f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.31.22.44", "pod":"calico-apiserver-6fb78f445f-wf7rq", "timestamp":"2024-07-02 07:55:43.571620438 +0000 UTC"}, Hostname:"172.31.22.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.593 [INFO][3788] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.593 [INFO][3788] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.593 [INFO][3788] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.44'
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.597 [INFO][3788] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.606 [INFO][3788] ipam.go 372: Looking up existing affinities for host host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.628 [INFO][3788] ipam.go 489: Trying affinity for 192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.630 [INFO][3788] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.636 [INFO][3788] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.636 [INFO][3788] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.639 [INFO][3788] ipam.go 1685: Creating new handle: k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.647 [INFO][3788] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.658 [INFO][3788] ipam.go 1216: Successfully claimed IPs: [192.168.11.3/26] block=192.168.11.0/26 handle="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.658 [INFO][3788] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.3/26] handle="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" host="172.31.22.44"
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.658 [INFO][3788] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:55:43.702985 env[1824]: 2024-07-02 07:55:43.658 [INFO][3788] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.11.3/26] IPv6=[] ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" HandleID="k8s-pod-network.660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Workload="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.706168 env[1824]: 2024-07-02 07:55:43.660 [INFO][3776] k8s.go 386: Populated endpoint ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0", GenerateName:"calico-apiserver-6fb78f445f-", Namespace:"calico-apiserver", SelfLink:"", UID:"acfa3c1c-d47c-45ec-885a-3e6ff315f221", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 42, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fb78f445f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"", Pod:"calico-apiserver-6fb78f445f-wf7rq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf9e4be1678", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:43.706168 env[1824]: 2024-07-02 07:55:43.660 [INFO][3776] k8s.go 387: Calico CNI using IPs: [192.168.11.3/32] ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.706168 env[1824]: 2024-07-02 07:55:43.660 [INFO][3776] dataplane_linux.go 68: Setting the host side veth name to califf9e4be1678 ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.706168 env[1824]: 2024-07-02 07:55:43.683 [INFO][3776] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.706168 env[1824]: 2024-07-02 07:55:43.684 [INFO][3776] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0", GenerateName:"calico-apiserver-6fb78f445f-", Namespace:"calico-apiserver", SelfLink:"", UID:"acfa3c1c-d47c-45ec-885a-3e6ff315f221", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 42, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6fb78f445f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897", Pod:"calico-apiserver-6fb78f445f-wf7rq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.11.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"califf9e4be1678", MAC:"e2:a0:29:5d:1c:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:43.706168 env[1824]: 2024-07-02 07:55:43.698 [INFO][3776] k8s.go 500: Wrote updated endpoint to datastore ContainerID="660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897" Namespace="calico-apiserver" Pod="calico-apiserver-6fb78f445f-wf7rq" WorkloadEndpoint="172.31.22.44-k8s-calico--apiserver--6fb78f445f--wf7rq-eth0"
Jul  2 07:55:43.733000 audit[3810]: NETFILTER_CFG table=filter:77 family=2 entries=47 op=nft_register_chain pid=3810 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:43.733000 audit[3810]: SYSCALL arch=c000003e syscall=46 success=yes exit=25088 a0=3 a1=7ffe04dd5000 a2=0 a3=7ffe04dd4fec items=0 ppid=2929 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:43.733000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:43.742504 env[1824]: time="2024-07-02T07:55:43.742415917Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:55:43.742694 env[1824]: time="2024-07-02T07:55:43.742461899Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:55:43.742694 env[1824]: time="2024-07-02T07:55:43.742477287Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:55:43.742905 env[1824]: time="2024-07-02T07:55:43.742712024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897 pid=3820 runtime=io.containerd.runc.v2
Jul  2 07:55:43.827784 env[1824]: time="2024-07-02T07:55:43.827745738Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6fb78f445f-wf7rq,Uid:acfa3c1c-d47c-45ec-885a-3e6ff315f221,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897\""
Jul  2 07:55:43.830025 env[1824]: time="2024-07-02T07:55:43.829798648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\""
Jul  2 07:55:44.544000 audit[3855]: NETFILTER_CFG table=filter:78 family=2 entries=22 op=nft_register_rule pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:44.544000 audit[3855]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffd134271a0 a2=0 a3=7ffd1342718c items=0 ppid=2498 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:44.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:44.547000 audit[3855]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:44.547000 audit[3855]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd134271a0 a2=0 a3=0 items=0 ppid=2498 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:44.547000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:44.558000 audit[3857]: NETFILTER_CFG table=filter:80 family=2 entries=34 op=nft_register_rule pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:44.558000 audit[3857]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff19127650 a2=0 a3=7fff1912763c items=0 ppid=2498 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:44.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:44.559000 audit[3857]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=3857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:44.559000 audit[3857]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff19127650 a2=0 a3=0 items=0 ppid=2498 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:44.559000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:44.648318 kubelet[2283]: I0702 07:55:44.648282    2283 topology_manager.go:215] "Topology Admit Handler" podUID="14bfc8ee-a6ba-427f-a371-1d5b37cb9af2" podNamespace="default" podName="nfs-server-provisioner-0"
Jul  2 07:55:44.664819 kubelet[2283]: E0702 07:55:44.664751    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:44.719507 kubelet[2283]: I0702 07:55:44.719468    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2w4vx\" (UniqueName: \"kubernetes.io/projected/14bfc8ee-a6ba-427f-a371-1d5b37cb9af2-kube-api-access-2w4vx\") pod \"nfs-server-provisioner-0\" (UID: \"14bfc8ee-a6ba-427f-a371-1d5b37cb9af2\") " pod="default/nfs-server-provisioner-0"
Jul  2 07:55:44.719669 kubelet[2283]: I0702 07:55:44.719521    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/14bfc8ee-a6ba-427f-a371-1d5b37cb9af2-data\") pod \"nfs-server-provisioner-0\" (UID: \"14bfc8ee-a6ba-427f-a371-1d5b37cb9af2\") " pod="default/nfs-server-provisioner-0"
Jul  2 07:55:44.955321 env[1824]: time="2024-07-02T07:55:44.955270893Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:14bfc8ee-a6ba-427f-a371-1d5b37cb9af2,Namespace:default,Attempt:0,}"
Jul  2 07:55:45.182499 (udev-worker)[3809]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:55:45.187267 systemd-networkd[1510]: cali60e51b789ff: Link UP
Jul  2 07:55:45.190150 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Jul  2 07:55:45.191276 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready
Jul  2 07:55:45.190451 systemd-networkd[1510]: cali60e51b789ff: Gained carrier
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.043 [INFO][3859] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.44-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default  14bfc8ee-a6ba-427f-a371-1d5b37cb9af2 1044 0 2024-07-02 07:55:44 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s  172.31.22.44  nfs-server-provisioner-0 eth0 nfs-server-provisioner [] []   [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff  [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.043 [INFO][3859] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.103 [INFO][3871] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" HandleID="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Workload="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.113 [INFO][3871] ipam_plugin.go 264: Auto assigning IP ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" HandleID="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Workload="172.31.22.44-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029b240), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.44", "pod":"nfs-server-provisioner-0", "timestamp":"2024-07-02 07:55:45.103372396 +0000 UTC"}, Hostname:"172.31.22.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.113 [INFO][3871] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.113 [INFO][3871] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.113 [INFO][3871] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.44'
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.116 [INFO][3871] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.121 [INFO][3871] ipam.go 372: Looking up existing affinities for host host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.129 [INFO][3871] ipam.go 489: Trying affinity for 192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.132 [INFO][3871] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.142 [INFO][3871] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.142 [INFO][3871] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.146 [INFO][3871] ipam.go 1685: Creating new handle: k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.152 [INFO][3871] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.168 [INFO][3871] ipam.go 1216: Successfully claimed IPs: [192.168.11.4/26] block=192.168.11.0/26 handle="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.168 [INFO][3871] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.4/26] handle="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" host="172.31.22.44"
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.169 [INFO][3871] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:55:45.209010 env[1824]: 2024-07-02 07:55:45.169 [INFO][3871] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.11.4/26] IPv6=[] ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" HandleID="k8s-pod-network.15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Workload="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.210446 env[1824]: 2024-07-02 07:55:45.180 [INFO][3859] k8s.go 386: Populated endpoint ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"14bfc8ee-a6ba-427f-a371-1d5b37cb9af2", ResourceVersion:"1044", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.11.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:45.210446 env[1824]: 2024-07-02 07:55:45.180 [INFO][3859] k8s.go 387: Calico CNI using IPs: [192.168.11.4/32] ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.210446 env[1824]: 2024-07-02 07:55:45.180 [INFO][3859] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.210446 env[1824]: 2024-07-02 07:55:45.193 [INFO][3859] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.210867 env[1824]: 2024-07-02 07:55:45.193 [INFO][3859] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"14bfc8ee-a6ba-427f-a371-1d5b37cb9af2", ResourceVersion:"1044", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 44, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.11.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"fa:22:dc:ff:7c:f6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:55:45.210867 env[1824]: 2024-07-02 07:55:45.206 [INFO][3859] k8s.go 500: Wrote updated endpoint to datastore ContainerID="15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.31.22.44-k8s-nfs--server--provisioner--0-eth0"
Jul  2 07:55:45.231000 audit[3887]: NETFILTER_CFG table=filter:82 family=2 entries=42 op=nft_register_chain pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:55:45.231000 audit[3887]: SYSCALL arch=c000003e syscall=46 success=yes exit=21008 a0=3 a1=7ffff9f77520 a2=0 a3=7ffff9f7750c items=0 ppid=2929 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:45.231000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:55:45.234304 systemd-networkd[1510]: califf9e4be1678: Gained IPv6LL
Jul  2 07:55:45.336426 env[1824]: time="2024-07-02T07:55:45.336343362Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:55:45.336729 env[1824]: time="2024-07-02T07:55:45.336689381Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:55:45.336912 env[1824]: time="2024-07-02T07:55:45.336884695Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:55:45.337610 env[1824]: time="2024-07-02T07:55:45.337462630Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790 pid=3900 runtime=io.containerd.runc.v2
Jul  2 07:55:45.462624 env[1824]: time="2024-07-02T07:55:45.462414695Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:14bfc8ee-a6ba-427f-a371-1d5b37cb9af2,Namespace:default,Attempt:0,} returns sandbox id \"15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790\""
Jul  2 07:55:45.669995 kubelet[2283]: E0702 07:55:45.669911    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:45.826431 amazon-ssm-agent[1804]: 2024-07-02 07:55:45 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated
Jul  2 07:55:46.671014 kubelet[2283]: E0702 07:55:46.670974    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:46.881065 env[1824]: time="2024-07-02T07:55:46.881006076Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:46.883321 env[1824]: time="2024-07-02T07:55:46.883188638Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:46.886019 env[1824]: time="2024-07-02T07:55:46.885090842Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:46.891640 env[1824]: time="2024-07-02T07:55:46.891589089Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:46.892310 env[1824]: time="2024-07-02T07:55:46.892265842Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\""
Jul  2 07:55:46.893804 env[1824]: time="2024-07-02T07:55:46.893777992Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\""
Jul  2 07:55:46.894665 env[1824]: time="2024-07-02T07:55:46.894624882Z" level=info msg="CreateContainer within sandbox \"660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}"
Jul  2 07:55:46.909971 env[1824]: time="2024-07-02T07:55:46.909910748Z" level=info msg="CreateContainer within sandbox \"660e4f1bd3afc6c9cd15ef4270a3d6663bb25d1ce37646ef03a13855b7591897\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"82fdaa0138d5bbf82c5e910feed7438db0af0a7a157f532ed9b836195757b8af\""
Jul  2 07:55:46.910678 env[1824]: time="2024-07-02T07:55:46.910654315Z" level=info msg="StartContainer for \"82fdaa0138d5bbf82c5e910feed7438db0af0a7a157f532ed9b836195757b8af\""
Jul  2 07:55:47.042341 env[1824]: time="2024-07-02T07:55:47.041520955Z" level=info msg="StartContainer for \"82fdaa0138d5bbf82c5e910feed7438db0af0a7a157f532ed9b836195757b8af\" returns successfully"
Jul  2 07:55:47.218702 systemd-networkd[1510]: cali60e51b789ff: Gained IPv6LL
Jul  2 07:55:47.675084 kubelet[2283]: E0702 07:55:47.675042    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:48.307286 kernel: kauditd_printk_skb: 20 callbacks suppressed
Jul  2 07:55:48.307470 kernel: audit: type=1325 audit(1719906948.301:291): table=filter:83 family=2 entries=34 op=nft_register_rule pid=3986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.301000 audit[3986]: NETFILTER_CFG table=filter:83 family=2 entries=34 op=nft_register_rule pid=3986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.313910 kernel: audit: type=1300 audit(1719906948.301:291): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe44af64d0 a2=0 a3=7ffe44af64bc items=0 ppid=2498 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.301000 audit[3986]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7ffe44af64d0 a2=0 a3=7ffe44af64bc items=0 ppid=2498 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.317979 kernel: audit: type=1327 audit(1719906948.301:291): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.302000 audit[3986]: NETFILTER_CFG table=nat:84 family=2 entries=20 op=nft_register_rule pid=3986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.327307 kernel: audit: type=1325 audit(1719906948.302:292): table=nat:84 family=2 entries=20 op=nft_register_rule pid=3986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.302000 audit[3986]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe44af64d0 a2=0 a3=0 items=0 ppid=2498 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.337559 kernel: audit: type=1300 audit(1719906948.302:292): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe44af64d0 a2=0 a3=0 items=0 ppid=2498 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.356015 kernel: audit: type=1327 audit(1719906948.302:292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.302000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.344000 audit[3988]: NETFILTER_CFG table=filter:85 family=2 entries=34 op=nft_register_rule pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.361990 kernel: audit: type=1325 audit(1719906948.344:293): table=filter:85 family=2 entries=34 op=nft_register_rule pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.344000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff5c9dd880 a2=0 a3=7fff5c9dd86c items=0 ppid=2498 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.377415 kernel: audit: type=1300 audit(1719906948.344:293): arch=c000003e syscall=46 success=yes exit=12604 a0=3 a1=7fff5c9dd880 a2=0 a3=7fff5c9dd86c items=0 ppid=2498 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.389801 kernel: audit: type=1327 audit(1719906948.344:293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.389944 kernel: audit: type=1325 audit(1719906948.350:294): table=nat:86 family=2 entries=20 op=nft_register_rule pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.350000 audit[3988]: NETFILTER_CFG table=nat:86 family=2 entries=20 op=nft_register_rule pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:48.350000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff5c9dd880 a2=0 a3=0 items=0 ppid=2498 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:48.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:48.675234 kubelet[2283]: E0702 07:55:48.675197    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:49.215680 kubelet[2283]: I0702 07:55:49.214492    2283 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Jul  2 07:55:49.365000 audit[3990]: NETFILTER_CFG table=filter:87 family=2 entries=33 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:49.365000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffceab0a980 a2=0 a3=7ffceab0a96c items=0 ppid=2498 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:49.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:49.366000 audit[3990]: NETFILTER_CFG table=nat:88 family=2 entries=27 op=nft_register_chain pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:49.366000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffceab0a980 a2=0 a3=0 items=0 ppid=2498 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:49.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:49.679991 kubelet[2283]: E0702 07:55:49.675487    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:50.390080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3750797719.mount: Deactivated successfully.
Jul  2 07:55:50.676066 kubelet[2283]: E0702 07:55:50.675940    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:51.676229 kubelet[2283]: E0702 07:55:51.676191    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:52.677365 kubelet[2283]: E0702 07:55:52.677326    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:52.990483 env[1824]: time="2024-07-02T07:55:52.990356418Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:52.992548 env[1824]: time="2024-07-02T07:55:52.992506320Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:52.994533 env[1824]: time="2024-07-02T07:55:52.994495623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:52.995950 env[1824]: time="2024-07-02T07:55:52.995914394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:55:52.996703 env[1824]: time="2024-07-02T07:55:52.996667249Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\""
Jul  2 07:55:53.028810 env[1824]: time="2024-07-02T07:55:53.028754332Z" level=info msg="CreateContainer within sandbox \"15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}"
Jul  2 07:55:53.045052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount614098971.mount: Deactivated successfully.
Jul  2 07:55:53.055378 env[1824]: time="2024-07-02T07:55:53.055322487Z" level=info msg="CreateContainer within sandbox \"15dd94dcf3ceaf1898bbeb3a05073f9c388b8c7f94eed3a94fc664376df91790\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"bece928b754d3607416a0721cbe96ea5e07f84646704e4a8eefe76ae586b8da9\""
Jul  2 07:55:53.056169 env[1824]: time="2024-07-02T07:55:53.056131838Z" level=info msg="StartContainer for \"bece928b754d3607416a0721cbe96ea5e07f84646704e4a8eefe76ae586b8da9\""
Jul  2 07:55:53.173304 env[1824]: time="2024-07-02T07:55:53.172604124Z" level=info msg="StartContainer for \"bece928b754d3607416a0721cbe96ea5e07f84646704e4a8eefe76ae586b8da9\" returns successfully"
Jul  2 07:55:53.270756 kubelet[2283]: I0702 07:55:53.270672    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6fb78f445f-wf7rq" podStartSLOduration=8.206190595 podCreationTimestamp="2024-07-02 07:55:42 +0000 UTC" firstStartedPulling="2024-07-02 07:55:43.829404374 +0000 UTC m=+44.018326214" lastFinishedPulling="2024-07-02 07:55:46.892697461 +0000 UTC m=+47.081619315" observedRunningTime="2024-07-02 07:55:48.227926372 +0000 UTC m=+48.416848232" watchObservedRunningTime="2024-07-02 07:55:53.269483696 +0000 UTC m=+53.458405554"
Jul  2 07:55:53.296000 audit[4039]: NETFILTER_CFG table=filter:89 family=2 entries=20 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:53.296000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffee5dd8530 a2=0 a3=7ffee5dd851c items=0 ppid=2498 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:53.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:53.298000 audit[4039]: NETFILTER_CFG table=nat:90 family=2 entries=106 op=nft_register_chain pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:53.298000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffee5dd8530 a2=0 a3=7ffee5dd851c items=0 ppid=2498 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:53.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:53.678102 kubelet[2283]: E0702 07:55:53.678057    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:54.039529 systemd[1]: run-containerd-runc-k8s.io-bece928b754d3607416a0721cbe96ea5e07f84646704e4a8eefe76ae586b8da9-runc.dXlITk.mount: Deactivated successfully.
Jul  2 07:55:54.678273 kubelet[2283]: E0702 07:55:54.678222    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:54.848126 kubelet[2283]: I0702 07:55:54.848084    2283 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness"
Jul  2 07:55:54.909781 kubelet[2283]: I0702 07:55:54.909738    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.377581572 podCreationTimestamp="2024-07-02 07:55:44 +0000 UTC" firstStartedPulling="2024-07-02 07:55:45.466236556 +0000 UTC m=+45.655158396" lastFinishedPulling="2024-07-02 07:55:52.997010541 +0000 UTC m=+53.185932381" observedRunningTime="2024-07-02 07:55:53.27124501 +0000 UTC m=+53.460166851" watchObservedRunningTime="2024-07-02 07:55:54.908355557 +0000 UTC m=+55.097277417"
Jul  2 07:55:54.934157 kernel: kauditd_printk_skb: 14 callbacks suppressed
Jul  2 07:55:54.934307 kernel: audit: type=1325 audit(1719906954.929:299): table=filter:91 family=2 entries=8 op=nft_register_rule pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:54.934341 kernel: audit: type=1300 audit(1719906954.929:299): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc76b1ae80 a2=0 a3=7ffc76b1ae6c items=0 ppid=2498 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:54.929000 audit[4042]: NETFILTER_CFG table=filter:91 family=2 entries=8 op=nft_register_rule pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:54.929000 audit[4042]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc76b1ae80 a2=0 a3=7ffc76b1ae6c items=0 ppid=2498 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:54.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:54.940922 kernel: audit: type=1327 audit(1719906954.929:299): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:54.931000 audit[4042]: NETFILTER_CFG table=nat:92 family=2 entries=58 op=nft_register_chain pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:54.931000 audit[4042]: SYSCALL arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffc76b1ae80 a2=0 a3=7ffc76b1ae6c items=0 ppid=2498 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:54.948277 kernel: audit: type=1325 audit(1719906954.931:300): table=nat:92 family=2 entries=58 op=nft_register_chain pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor"
Jul  2 07:55:54.948356 kernel: audit: type=1300 audit(1719906954.931:300): arch=c000003e syscall=46 success=yes exit=20452 a0=3 a1=7ffc76b1ae80 a2=0 a3=7ffc76b1ae6c items=0 ppid=2498 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:55:54.948389 kernel: audit: type=1327 audit(1719906954.931:300): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:54.931000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273
Jul  2 07:55:55.678721 kubelet[2283]: E0702 07:55:55.678667    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:56.679528 kubelet[2283]: E0702 07:55:56.679475    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:57.680208 kubelet[2283]: E0702 07:55:57.680150    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:58.681359 kubelet[2283]: E0702 07:55:58.681306    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:55:59.681917 kubelet[2283]: E0702 07:55:59.681863    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:00.625774 kubelet[2283]: E0702 07:56:00.625727    2283 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:00.648318 env[1824]: time="2024-07-02T07:56:00.648268625Z" level=info msg="StopPodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\""
Jul  2 07:56:00.682414 kubelet[2283]: E0702 07:56:00.682347    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.736 [WARNING][4064] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-csi--node--driver--9v9fh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b4d1a94-4482-4b3f-8a91-b62d2cc745de", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 2, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26", Pod:"csi-node-driver-9v9fh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80a975f6c82", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.736 [INFO][4064] k8s.go 608: Cleaning up netns ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.736 [INFO][4064] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" iface="eth0" netns=""
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.736 [INFO][4064] k8s.go 615: Releasing IP address(es) ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.736 [INFO][4064] utils.go 188: Calico CNI releasing IP address ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.768 [INFO][4070] ipam_plugin.go 411: Releasing address using handleID ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.768 [INFO][4070] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.768 [INFO][4070] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.776 [WARNING][4070] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.776 [INFO][4070] ipam_plugin.go 439: Releasing address using workloadID ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.778 [INFO][4070] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:56:00.781415 env[1824]: 2024-07-02 07:56:00.779 [INFO][4064] k8s.go 621: Teardown processing complete. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.782305 env[1824]: time="2024-07-02T07:56:00.781450847Z" level=info msg="TearDown network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" successfully"
Jul  2 07:56:00.782305 env[1824]: time="2024-07-02T07:56:00.781486473Z" level=info msg="StopPodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" returns successfully"
Jul  2 07:56:00.782483 env[1824]: time="2024-07-02T07:56:00.782449244Z" level=info msg="RemovePodSandbox for \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\""
Jul  2 07:56:00.782558 env[1824]: time="2024-07-02T07:56:00.782488932Z" level=info msg="Forcibly stopping sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\""
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.828 [WARNING][4089] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-csi--node--driver--9v9fh-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5b4d1a94-4482-4b3f-8a91-b62d2cc745de", ResourceVersion:"959", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 2, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"dcfc1f6e7adfebcd670f3f52134e724f711373260ae12e0dd2ae043272d29c26", Pod:"csi-node-driver-9v9fh", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali80a975f6c82", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.828 [INFO][4089] k8s.go 608: Cleaning up netns ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.828 [INFO][4089] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" iface="eth0" netns=""
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.829 [INFO][4089] k8s.go 615: Releasing IP address(es) ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.829 [INFO][4089] utils.go 188: Calico CNI releasing IP address ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.868 [INFO][4095] ipam_plugin.go 411: Releasing address using handleID ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.869 [INFO][4095] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.869 [INFO][4095] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.883 [WARNING][4095] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.883 [INFO][4095] ipam_plugin.go 439: Releasing address using workloadID ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" HandleID="k8s-pod-network.83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a" Workload="172.31.22.44-k8s-csi--node--driver--9v9fh-eth0"
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.891 [INFO][4095] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:56:00.899709 env[1824]: 2024-07-02 07:56:00.896 [INFO][4089] k8s.go 621: Teardown processing complete. ContainerID="83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a"
Jul  2 07:56:00.900662 env[1824]: time="2024-07-02T07:56:00.900619892Z" level=info msg="TearDown network for sandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" successfully"
Jul  2 07:56:00.904399 env[1824]: time="2024-07-02T07:56:00.904352299Z" level=info msg="RemovePodSandbox \"83fb03daad0f03be34330d60dd6feb42623820138681276e7a4373cc6a5eb99a\" returns successfully"
Jul  2 07:56:00.910373 env[1824]: time="2024-07-02T07:56:00.910086583Z" level=info msg="StopPodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\""
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.958 [WARNING][4116] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e9d1bab7-c102-46ac-9072-9604ce9b81b8", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31", Pod:"nginx-deployment-6d5f899847-mjg64", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2533f26f37e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.958 [INFO][4116] k8s.go 608: Cleaning up netns ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.958 [INFO][4116] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" iface="eth0" netns=""
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.958 [INFO][4116] k8s.go 615: Releasing IP address(es) ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.958 [INFO][4116] utils.go 188: Calico CNI releasing IP address ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.987 [INFO][4122] ipam_plugin.go 411: Releasing address using handleID ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.988 [INFO][4122] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.988 [INFO][4122] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.996 [WARNING][4122] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.997 [INFO][4122] ipam_plugin.go 439: Releasing address using workloadID ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:00.999 [INFO][4122] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:56:01.002810 env[1824]: 2024-07-02 07:56:01.000 [INFO][4116] k8s.go 621: Teardown processing complete. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.003443 env[1824]: time="2024-07-02T07:56:01.002847987Z" level=info msg="TearDown network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" successfully"
Jul  2 07:56:01.003443 env[1824]: time="2024-07-02T07:56:01.002883770Z" level=info msg="StopPodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" returns successfully"
Jul  2 07:56:01.004113 env[1824]: time="2024-07-02T07:56:01.004078755Z" level=info msg="RemovePodSandbox for \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\""
Jul  2 07:56:01.004235 env[1824]: time="2024-07-02T07:56:01.004117464Z" level=info msg="Forcibly stopping sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\""
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.085 [WARNING][4140] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"e9d1bab7-c102-46ac-9072-9604ce9b81b8", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 18, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"52e023403108150ca387e4267de40b3b38f5c7cf568c9611034aeb9b353e0f31", Pod:"nginx-deployment-6d5f899847-mjg64", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali2533f26f37e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.085 [INFO][4140] k8s.go 608: Cleaning up netns ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.085 [INFO][4140] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" iface="eth0" netns=""
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.085 [INFO][4140] k8s.go 615: Releasing IP address(es) ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.085 [INFO][4140] utils.go 188: Calico CNI releasing IP address ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.127 [INFO][4146] ipam_plugin.go 411: Releasing address using handleID ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.128 [INFO][4146] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.128 [INFO][4146] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.138 [WARNING][4146] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.138 [INFO][4146] ipam_plugin.go 439: Releasing address using workloadID ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" HandleID="k8s-pod-network.d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16" Workload="172.31.22.44-k8s-nginx--deployment--6d5f899847--mjg64-eth0"
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.141 [INFO][4146] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:56:01.144941 env[1824]: 2024-07-02 07:56:01.143 [INFO][4140] k8s.go 621: Teardown processing complete. ContainerID="d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16"
Jul  2 07:56:01.145656 env[1824]: time="2024-07-02T07:56:01.145104243Z" level=info msg="TearDown network for sandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" successfully"
Jul  2 07:56:01.148160 env[1824]: time="2024-07-02T07:56:01.148113972Z" level=info msg="RemovePodSandbox \"d06e296ec2a9313ff61c98facd60d95057c170343f1aac515cd226680cd72d16\" returns successfully"
Jul  2 07:56:01.682912 kubelet[2283]: E0702 07:56:01.682864    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:02.683512 kubelet[2283]: E0702 07:56:02.683462    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:03.684381 kubelet[2283]: E0702 07:56:03.684329    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:04.684700 kubelet[2283]: E0702 07:56:04.684658    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:05.685160 kubelet[2283]: E0702 07:56:05.685053    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:06.685399 kubelet[2283]: E0702 07:56:06.685250    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:06.869510 systemd[1]: run-containerd-runc-k8s.io-343c22de3f46268c2c02e0a6e8b3b75596c90279af260d0de2b66f0b0d550e7e-runc.ahMGeI.mount: Deactivated successfully.
Jul  2 07:56:07.686351 kubelet[2283]: E0702 07:56:07.686302    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:08.687185 kubelet[2283]: E0702 07:56:08.687133    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:09.687695 kubelet[2283]: E0702 07:56:09.687640    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:10.688099 kubelet[2283]: E0702 07:56:10.688046    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:11.688325 kubelet[2283]: E0702 07:56:11.688270    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:12.689152 kubelet[2283]: E0702 07:56:12.689037    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:13.690060 kubelet[2283]: E0702 07:56:13.689949    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:14.690704 kubelet[2283]: E0702 07:56:14.690652    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:15.691828 kubelet[2283]: E0702 07:56:15.691775    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:16.692934 kubelet[2283]: E0702 07:56:16.692880    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:17.693401 kubelet[2283]: E0702 07:56:17.693350    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:18.370541 kubelet[2283]: I0702 07:56:18.370491    2283 topology_manager.go:215] "Topology Admit Handler" podUID="eba4f74b-2d1c-43c4-8068-e47193c78a73" podNamespace="default" podName="test-pod-1"
Jul  2 07:56:18.499942 kubelet[2283]: I0702 07:56:18.499901    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dq5gt\" (UniqueName: \"kubernetes.io/projected/eba4f74b-2d1c-43c4-8068-e47193c78a73-kube-api-access-dq5gt\") pod \"test-pod-1\" (UID: \"eba4f74b-2d1c-43c4-8068-e47193c78a73\") " pod="default/test-pod-1"
Jul  2 07:56:18.500157 kubelet[2283]: I0702 07:56:18.500074    2283 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-d5716d8d-065a-4ee1-b470-944d64a4aaa9\" (UniqueName: \"kubernetes.io/nfs/eba4f74b-2d1c-43c4-8068-e47193c78a73-pvc-d5716d8d-065a-4ee1-b470-944d64a4aaa9\") pod \"test-pod-1\" (UID: \"eba4f74b-2d1c-43c4-8068-e47193c78a73\") " pod="default/test-pod-1"
Jul  2 07:56:18.648733 kernel: Failed to create system directory netfs
Jul  2 07:56:18.648863 kernel: audit: type=1400 audit(1719906978.637:301): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.648895 kernel: Failed to create system directory netfs
Jul  2 07:56:18.648919 kernel: audit: type=1400 audit(1719906978.637:301): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.648944 kernel: Failed to create system directory netfs
Jul  2 07:56:18.637000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.637000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.650559 kernel: Failed to create system directory netfs
Jul  2 07:56:18.654163 kernel: audit: type=1400 audit(1719906978.637:301): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.637000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.658996 kernel: audit: type=1400 audit(1719906978.637:301): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.637000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.637000 audit[4212]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55611d2965e0 a1=153bc a2=55611cea62b0 a3=5 items=0 ppid=50 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:18.667715 kernel: audit: type=1300 audit(1719906978.637:301): arch=c000003e syscall=175 success=yes exit=0 a0=55611d2965e0 a1=153bc a2=55611cea62b0 a3=5 items=0 ppid=50 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:18.667839 kernel: audit: type=1327 audit(1719906978.637:301): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Jul  2 07:56:18.637000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.676017 kernel: Failed to create system directory fscache
Jul  2 07:56:18.676116 kernel: audit: type=1400 audit(1719906978.670:302): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.680014 kernel: Failed to create system directory fscache
Jul  2 07:56:18.680214 kernel: audit: type=1400 audit(1719906978.670:302): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.684187 kernel: Failed to create system directory fscache
Jul  2 07:56:18.684279 kernel: audit: type=1400 audit(1719906978.670:302): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.688352 kernel: Failed to create system directory fscache
Jul  2 07:56:18.688429 kernel: audit: type=1400 audit(1719906978.670:302): avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.692706 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.693663 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.693781 kubelet[2283]: E0702 07:56:18.693722    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.694995 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.696082 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.697695 kernel: Failed to create system directory fscache
Jul  2 07:56:18.697750 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.698571 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.699429 kernel: Failed to create system directory fscache
Jul  2 07:56:18.699463 kernel: Failed to create system directory fscache
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.670000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.701066 kernel: Failed to create system directory fscache
Jul  2 07:56:18.702983 kernel: FS-Cache: Loaded
Jul  2 07:56:18.670000 audit[4212]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55611d4ab9c0 a1=4c0fc a2=55611cea62b0 a3=5 items=0 ppid=50 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:18.670000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.749206 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.749288 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.749316 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.751672 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.751716 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.752575 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.753490 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.754425 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.755302 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.756372 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.757273 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.758108 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.759749 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.759789 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.760635 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.760669 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.762291 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.762330 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.764098 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.764162 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.765692 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.765731 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.767521 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.767628 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.769182 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.769222 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.771646 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.771700 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.771741 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.773232 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.773287 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.775683 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.775760 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.775788 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.777509 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.777556 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.779253 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.779433 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.781440 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.781512 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.783128 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.783186 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.785693 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.785739 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.785766 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.787474 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.787541 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.789028 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.789225 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.791609 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.791677 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.791704 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.793232 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.793279 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.795719 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.795774 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.795799 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.797739 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.797803 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.799432 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.799486 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.801113 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.801165 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.803576 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.803646 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.803671 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.805322 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.805379 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.807068 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.807124 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.808607 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.808664 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.810368 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.810415 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.812015 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.812106 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.812993 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.814938 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.815114 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.816815 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.816886 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.818573 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.818632 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.820170 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.820227 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.822579 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.822732 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.822766 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.824365 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.824425 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.826726 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.826901 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.826929 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.834202 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.834399 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.837719 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.844510 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.844630 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.846501 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.848367 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.849722 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.849789 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.851447 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.851516 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.852982 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.853017 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.854631 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.854722 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.856428 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.856512 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.858184 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.858237 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.860528 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.860575 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.860601 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.862063 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.862183 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.864327 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.864404 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.866262 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.866322 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.868587 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.868659 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.869454 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.871110 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.871166 kernel: Failed to create system directory sunrpc
Jul  2 07:56:18.731000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.883215 kernel: RPC: Registered named UNIX socket transport module.
Jul  2 07:56:18.883495 kernel: RPC: Registered udp transport module.
Jul  2 07:56:18.883534 kernel: RPC: Registered tcp transport module.
Jul  2 07:56:18.885572 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module.
Jul  2 07:56:18.731000 audit[4212]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55611d4f7ad0 a1=1a7f5c a2=55611cea62b0 a3=5 items=6 ppid=50 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:18.731000 audit: CWD cwd="/"
Jul  2 07:56:18.731000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:56:18.731000 audit: PATH item=1 name=(null) inode=25192 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:56:18.731000 audit: PATH item=2 name=(null) inode=25192 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:56:18.731000 audit: PATH item=3 name=(null) inode=25193 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:56:18.731000 audit: PATH item=4 name=(null) inode=25192 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:56:18.731000 audit: PATH item=5 name=(null) inode=25194 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0
Jul  2 07:56:18.731000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.937128 kernel: Failed to create system directory nfs
Jul  2 07:56:18.937252 kernel: Failed to create system directory nfs
Jul  2 07:56:18.937280 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.937553 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.939715 kernel: Failed to create system directory nfs
Jul  2 07:56:18.939765 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.941764 kernel: Failed to create system directory nfs
Jul  2 07:56:18.941836 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.943765 kernel: Failed to create system directory nfs
Jul  2 07:56:18.943840 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.944756 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.945686 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.947262 kernel: Failed to create system directory nfs
Jul  2 07:56:18.947304 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.949754 kernel: Failed to create system directory nfs
Jul  2 07:56:18.949814 kernel: Failed to create system directory nfs
Jul  2 07:56:18.949842 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.951250 kernel: Failed to create system directory nfs
Jul  2 07:56:18.951284 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.952638 kernel: Failed to create system directory nfs
Jul  2 07:56:18.952686 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.954017 kernel: Failed to create system directory nfs
Jul  2 07:56:18.954047 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.955673 kernel: Failed to create system directory nfs
Jul  2 07:56:18.955712 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.957217 kernel: Failed to create system directory nfs
Jul  2 07:56:18.957285 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.959531 kernel: Failed to create system directory nfs
Jul  2 07:56:18.959583 kernel: Failed to create system directory nfs
Jul  2 07:56:18.959620 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.961578 kernel: Failed to create system directory nfs
Jul  2 07:56:18.961628 kernel: Failed to create system directory nfs
Jul  2 07:56:18.961667 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.963614 kernel: Failed to create system directory nfs
Jul  2 07:56:18.963647 kernel: Failed to create system directory nfs
Jul  2 07:56:18.963683 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.965093 kernel: Failed to create system directory nfs
Jul  2 07:56:18.965139 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.966558 kernel: Failed to create system directory nfs
Jul  2 07:56:18.966599 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.968156 kernel: Failed to create system directory nfs
Jul  2 07:56:18.968204 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.969591 kernel: Failed to create system directory nfs
Jul  2 07:56:18.969625 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.971350 kernel: Failed to create system directory nfs
Jul  2 07:56:18.971400 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.973545 kernel: Failed to create system directory nfs
Jul  2 07:56:18.973599 kernel: Failed to create system directory nfs
Jul  2 07:56:18.973637 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.975627 kernel: Failed to create system directory nfs
Jul  2 07:56:18.975665 kernel: Failed to create system directory nfs
Jul  2 07:56:18.975699 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.977301 kernel: Failed to create system directory nfs
Jul  2 07:56:18.977351 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.978848 kernel: Failed to create system directory nfs
Jul  2 07:56:18.978892 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.979612 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.980431 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.981154 kernel: Failed to create system directory nfs
Jul  2 07:56:18.922000 audit[4212]: AVC avc:  denied  { confidentiality } for  pid=4212 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:18.922000 audit[4212]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55611d718790 a1=16dba4 a2=55611cea62b0 a3=5 items=0 ppid=50 pid=4212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.005015 kernel: FS-Cache: Netfs 'nfs' registered for caching
Jul  2 07:56:18.922000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.066508 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.066571 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.066596 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.069538 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.069642 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.071044 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.071087 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.072753 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.072803 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.074304 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.074350 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.075101 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.076708 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.076755 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.078279 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.078318 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.080756 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.080802 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.080845 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.082615 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.082692 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.084135 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.084183 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.085656 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.085696 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.087135 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.087176 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.088621 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.088664 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.090099 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.090152 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.091526 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.091563 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.093779 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.093831 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.093877 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.096024 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.096106 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.097687 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.097736 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.099288 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.099329 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.100755 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.100796 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.102342 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.102394 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.104554 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.104595 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.104640 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.106064 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.106113 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.107520 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.107594 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.108352 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.109078 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.111722 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.111817 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.113598 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.113649 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.115142 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.115187 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.116567 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.116641 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.118254 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.118325 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.119795 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.119857 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.121545 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.121628 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.123040 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.123096 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.124892 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.124984 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.127168 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.127317 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.129170 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.129220 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.130869 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.130923 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.132368 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.132408 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.135007 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.135074 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.135102 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.136032 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.137652 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.137883 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.139543 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.139581 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.141726 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.141782 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.141811 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.143229 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.143273 kernel: Failed to create system directory nfs4
Jul  2 07:56:19.044000 audit[4217]: AVC avc:  denied  { confidentiality } for  pid=4217 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.335701 kernel: NFS: Registering the id_resolver key type
Jul  2 07:56:19.335812 kernel: Key type id_resolver registered
Jul  2 07:56:19.335843 kernel: Key type id_legacy registered
Jul  2 07:56:19.044000 audit[4217]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa12b581010 a1=20890c a2=563fbd2ca2b0 a3=5 items=0 ppid=50 pid=4217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.044000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.355208 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.355282 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.355310 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.357992 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.358064 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.361839 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.361980 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.362032 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.362986 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.364522 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.364571 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.366020 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.366073 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.367586 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.367647 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.369210 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.369263 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.371003 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.371064 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.372693 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.372839 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.374814 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.374946 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.376355 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.376397 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.348000 audit[4218]: AVC avc:  denied  { confidentiality } for  pid=4218 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0
Jul  2 07:56:19.377974 kernel: Failed to create system directory rpcgss
Jul  2 07:56:19.348000 audit[4218]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fec6659b010 a1=70bec a2=5612632c52b0 a3=5 items=0 ppid=50 pid=4218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.348000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36
Jul  2 07:56:19.404894 nfsidmap[4225]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal'
Jul  2 07:56:19.409062 nfsidmap[4226]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'us-west-2.compute.internal'
Jul  2 07:56:19.420000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Jul  2 07:56:19.420000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Jul  2 07:56:19.420000 audit[1]: AVC avc:  denied  { watch_reads } for  pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Jul  2 07:56:19.420000 audit[2068]: AVC avc:  denied  { watch_reads } for  pid=2068 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Jul  2 07:56:19.420000 audit[2068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5566785e0ff0 a2=10 a3=23bf4c2634ba6d1 items=0 ppid=1 pid=2068 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.420000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Jul  2 07:56:19.420000 audit[2068]: AVC avc:  denied  { watch_reads } for  pid=2068 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Jul  2 07:56:19.420000 audit[2068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5566785e0ff0 a2=10 a3=23bf4c2634ba6d1 items=0 ppid=1 pid=2068 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.420000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Jul  2 07:56:19.420000 audit[2068]: AVC avc:  denied  { watch_reads } for  pid=2068 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2783 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0
Jul  2 07:56:19.420000 audit[2068]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=5566785e0ff0 a2=10 a3=23bf4c2634ba6d1 items=0 ppid=1 pid=2068 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.420000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572
Jul  2 07:56:19.581636 env[1824]: time="2024-07-02T07:56:19.581584676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:eba4f74b-2d1c-43c4-8068-e47193c78a73,Namespace:default,Attempt:0,}"
Jul  2 07:56:19.697094 kubelet[2283]: E0702 07:56:19.696191    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:19.778666 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Jul  2 07:56:19.778787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready
Jul  2 07:56:19.777633 systemd-networkd[1510]: cali5ec59c6bf6e: Link UP
Jul  2 07:56:19.778863 systemd-networkd[1510]: cali5ec59c6bf6e: Gained carrier
Jul  2 07:56:19.783532 (udev-worker)[4213]: Network interface NamePolicy= disabled on kernel command line.
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.639 [INFO][4227] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.31.22.44-k8s-test--pod--1-eth0  default  eba4f74b-2d1c-43c4-8068-e47193c78a73 1180 0 2024-07-02 07:55:46 +0000 UTC <nil> <nil> map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s  172.31.22.44  test-pod-1 eth0 default [] []   [kns.default ksa.default.default] cali5ec59c6bf6e  [] []}} ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.639 [INFO][4227] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.715 [INFO][4240] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" HandleID="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Workload="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.727 [INFO][4240] ipam_plugin.go 264: Auto assigning IP ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" HandleID="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Workload="172.31.22.44-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ef480), Attrs:map[string]string{"namespace":"default", "node":"172.31.22.44", "pod":"test-pod-1", "timestamp":"2024-07-02 07:56:19.714738213 +0000 UTC"}, Hostname:"172.31.22.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"}
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.728 [INFO][4240] ipam_plugin.go 352: About to acquire host-wide IPAM lock.
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.728 [INFO][4240] ipam_plugin.go 367: Acquired host-wide IPAM lock.
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.728 [INFO][4240] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.31.22.44'
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.730 [INFO][4240] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.737 [INFO][4240] ipam.go 372: Looking up existing affinities for host host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.741 [INFO][4240] ipam.go 489: Trying affinity for 192.168.11.0/26 host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.744 [INFO][4240] ipam.go 155: Attempting to load block cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.747 [INFO][4240] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.11.0/26 host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.747 [INFO][4240] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.11.0/26 handle="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.752 [INFO][4240] ipam.go 1685: Creating new handle: k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.759 [INFO][4240] ipam.go 1203: Writing block in order to claim IPs block=192.168.11.0/26 handle="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.767 [INFO][4240] ipam.go 1216: Successfully claimed IPs: [192.168.11.5/26] block=192.168.11.0/26 handle="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.767 [INFO][4240] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.11.5/26] handle="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" host="172.31.22.44"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.767 [INFO][4240] ipam_plugin.go 373: Released host-wide IPAM lock.
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.768 [INFO][4240] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.11.5/26] IPv6=[] ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" HandleID="k8s-pod-network.080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Workload="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.770 [INFO][4227] k8s.go 386: Populated endpoint ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"eba4f74b-2d1c-43c4-8068-e47193c78a73", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 46, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:56:19.830467 env[1824]: 2024-07-02 07:56:19.770 [INFO][4227] k8s.go 387: Calico CNI using IPs: [192.168.11.5/32] ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.832909 env[1824]: 2024-07-02 07:56:19.770 [INFO][4227] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.832909 env[1824]: 2024-07-02 07:56:19.779 [INFO][4227] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.832909 env[1824]: 2024-07-02 07:56:19.785 [INFO][4227] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.31.22.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"eba4f74b-2d1c-43c4-8068-e47193c78a73", ResourceVersion:"1180", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 7, 55, 46, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.31.22.44", ContainerID:"080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.11.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"e6:8b:74:c6:b6:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}}
Jul  2 07:56:19.832909 env[1824]: 2024-07-02 07:56:19.802 [INFO][4227] k8s.go 500: Wrote updated endpoint to datastore ContainerID="080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.31.22.44-k8s-test--pod--1-eth0"
Jul  2 07:56:19.836000 audit[4251]: NETFILTER_CFG table=filter:93 family=2 entries=42 op=nft_register_chain pid=4251 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re"
Jul  2 07:56:19.836000 audit[4251]: SYSCALL arch=c000003e syscall=46 success=yes exit=20588 a0=3 a1=7ffd23235e30 a2=0 a3=7ffd23235e1c items=0 ppid=2929 pid=4251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null)
Jul  2 07:56:19.836000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030
Jul  2 07:56:19.853381 env[1824]: time="2024-07-02T07:56:19.853303968Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1
Jul  2 07:56:19.853586 env[1824]: time="2024-07-02T07:56:19.853356063Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1
Jul  2 07:56:19.853586 env[1824]: time="2024-07-02T07:56:19.853376522Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1
Jul  2 07:56:19.853723 env[1824]: time="2024-07-02T07:56:19.853570159Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2 pid=4269 runtime=io.containerd.runc.v2
Jul  2 07:56:19.955208 env[1824]: time="2024-07-02T07:56:19.953458287Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:eba4f74b-2d1c-43c4-8068-e47193c78a73,Namespace:default,Attempt:0,} returns sandbox id \"080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2\""
Jul  2 07:56:19.962623 env[1824]: time="2024-07-02T07:56:19.962586008Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\""
Jul  2 07:56:20.258255 env[1824]: time="2024-07-02T07:56:20.257902922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:56:20.259933 env[1824]: time="2024-07-02T07:56:20.259894140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:56:20.263372 env[1824]: time="2024-07-02T07:56:20.263334187Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:56:20.265529 env[1824]: time="2024-07-02T07:56:20.265494596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:bf28ef5d86aca0cd30a8ef19032ccadc1eada35dc9f14f42f3ccb73974f013de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}"
Jul  2 07:56:20.266400 env[1824]: time="2024-07-02T07:56:20.266359273Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:a1bda1bb6f7f0fd17a3ae397f26593ab0aa8e8b92e3e8a9903f99fdb26afea17\""
Jul  2 07:56:20.276191 env[1824]: time="2024-07-02T07:56:20.276090662Z" level=info msg="CreateContainer within sandbox \"080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2\" for container &ContainerMetadata{Name:test,Attempt:0,}"
Jul  2 07:56:20.305166 env[1824]: time="2024-07-02T07:56:20.304860620Z" level=info msg="CreateContainer within sandbox \"080f2edd87b0f41a84236f425e6cd8825f10cd837f6ae25550c340bc739f02d2\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"0871107c60d303375f0c8721284f150ec4087163854193c0e6ad4cd2110eb892\""
Jul  2 07:56:20.307440 env[1824]: time="2024-07-02T07:56:20.307399954Z" level=info msg="StartContainer for \"0871107c60d303375f0c8721284f150ec4087163854193c0e6ad4cd2110eb892\""
Jul  2 07:56:20.393104 env[1824]: time="2024-07-02T07:56:20.393047960Z" level=info msg="StartContainer for \"0871107c60d303375f0c8721284f150ec4087163854193c0e6ad4cd2110eb892\" returns successfully"
Jul  2 07:56:20.624240 kubelet[2283]: E0702 07:56:20.624188    2283 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:20.696812 kubelet[2283]: E0702 07:56:20.696761    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:21.364059 kubelet[2283]: I0702 07:56:21.364012    2283 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=35.05810332 podCreationTimestamp="2024-07-02 07:55:46 +0000 UTC" firstStartedPulling="2024-07-02 07:56:19.961006544 +0000 UTC m=+80.149928383" lastFinishedPulling="2024-07-02 07:56:20.266801022 +0000 UTC m=+80.455722872" observedRunningTime="2024-07-02 07:56:21.363097938 +0000 UTC m=+81.552019802" watchObservedRunningTime="2024-07-02 07:56:21.363897809 +0000 UTC m=+81.552819668"
Jul  2 07:56:21.586223 systemd-networkd[1510]: cali5ec59c6bf6e: Gained IPv6LL
Jul  2 07:56:21.697778 kubelet[2283]: E0702 07:56:21.697468    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:22.698283 kubelet[2283]: E0702 07:56:22.698229    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:23.699144 kubelet[2283]: E0702 07:56:23.699098    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:24.699582 kubelet[2283]: E0702 07:56:24.699518    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:25.700624 kubelet[2283]: E0702 07:56:25.700568    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:26.701215 kubelet[2283]: E0702 07:56:26.701165    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:27.701827 kubelet[2283]: E0702 07:56:27.701777    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:28.702939 kubelet[2283]: E0702 07:56:28.702881    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:29.703661 kubelet[2283]: E0702 07:56:29.703606    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:30.704635 kubelet[2283]: E0702 07:56:30.704576    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:31.704761 kubelet[2283]: E0702 07:56:31.704704    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:32.705502 kubelet[2283]: E0702 07:56:32.705370    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:33.706260 kubelet[2283]: E0702 07:56:33.706210    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:34.707250 kubelet[2283]: E0702 07:56:34.707197    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:35.708345 kubelet[2283]: E0702 07:56:35.708291    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:36.708501 kubelet[2283]: E0702 07:56:36.708446    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:37.708879 kubelet[2283]: E0702 07:56:37.708795    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:38.709355 kubelet[2283]: E0702 07:56:38.709302    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:39.710340 kubelet[2283]: E0702 07:56:39.710286    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:40.625092 kubelet[2283]: E0702 07:56:40.625038    2283 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:40.710729 kubelet[2283]: E0702 07:56:40.710618    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:41.710810 kubelet[2283]: E0702 07:56:41.710756    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:42.711370 kubelet[2283]: E0702 07:56:42.711321    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:43.712254 kubelet[2283]: E0702 07:56:43.712202    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:44.248244 kubelet[2283]: E0702 07:56:44.248188    2283 controller.go:193] "Failed to update lease" err="Put \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"
Jul  2 07:56:44.713428 kubelet[2283]: E0702 07:56:44.713321    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:45.713570 kubelet[2283]: E0702 07:56:45.713523    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:46.714202 kubelet[2283]: E0702 07:56:46.714148    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:47.715056 kubelet[2283]: E0702 07:56:47.715004    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:48.715196 kubelet[2283]: E0702 07:56:48.715145    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:49.716183 kubelet[2283]: E0702 07:56:49.716127    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:50.716560 kubelet[2283]: E0702 07:56:50.716509    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:51.717393 kubelet[2283]: E0702 07:56:51.717314    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:52.717702 kubelet[2283]: E0702 07:56:52.717651    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:53.718274 kubelet[2283]: E0702 07:56:53.718219    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:54.248884 kubelet[2283]: E0702 07:56:54.248838    2283 controller.go:193] "Failed to update lease" err="Put \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)"
Jul  2 07:56:54.719416 kubelet[2283]: E0702 07:56:54.719361    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:55.720155 kubelet[2283]: E0702 07:56:55.720106    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:56.721266 kubelet[2283]: E0702 07:56:56.721219    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:57.721729 kubelet[2283]: E0702 07:56:57.721675    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:58.722480 kubelet[2283]: E0702 07:56:58.722423    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:56:58.814788 kubelet[2283]: E0702 07:56:58.814753    2283 controller.go:193] "Failed to update lease" err="Put \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": unexpected EOF"
Jul  2 07:56:58.825559 kubelet[2283]: E0702 07:56:58.825526    2283 controller.go:193] "Failed to update lease" err="Put \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": read tcp 172.31.22.44:34674->172.31.22.230:6443: read: connection reset by peer"
Jul  2 07:56:58.826137 kubelet[2283]: E0702 07:56:58.826108    2283 controller.go:193] "Failed to update lease" err="Put \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": dial tcp 172.31.22.230:6443: connect: connection refused"
Jul  2 07:56:58.830015 kubelet[2283]: I0702 07:56:58.829981    2283 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease"
Jul  2 07:56:58.830796 kubelet[2283]: E0702 07:56:58.830779    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": dial tcp 172.31.22.230:6443: connect: connection refused" interval="200ms"
Jul  2 07:56:59.032536 kubelet[2283]: E0702 07:56:59.032436    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": dial tcp 172.31.22.230:6443: connect: connection refused" interval="400ms"
Jul  2 07:56:59.434017 kubelet[2283]: E0702 07:56:59.433985    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": dial tcp 172.31.22.230:6443: connect: connection refused" interval="800ms"
Jul  2 07:56:59.722759 kubelet[2283]: E0702 07:56:59.722626    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:00.235196 kubelet[2283]: E0702 07:57:00.235152    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": dial tcp 172.31.22.230:6443: connect: connection refused" interval="1.6s"
Jul  2 07:57:00.625020 kubelet[2283]: E0702 07:57:00.624952    2283 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:00.723815 kubelet[2283]: E0702 07:57:00.723774    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:01.724613 kubelet[2283]: E0702 07:57:01.724558    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:01.836119 kubelet[2283]: E0702 07:57:01.836082    2283 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.22.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/172.31.22.44?timeout=10s\": dial tcp 172.31.22.230:6443: connect: connection refused" interval="3.2s"
Jul  2 07:57:02.725057 kubelet[2283]: E0702 07:57:02.724948    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:03.725738 kubelet[2283]: E0702 07:57:03.725682    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:04.725886 kubelet[2283]: E0702 07:57:04.725800    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:05.726023 kubelet[2283]: E0702 07:57:05.725955    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:06.726680 kubelet[2283]: E0702 07:57:06.726625    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:07.727886 kubelet[2283]: E0702 07:57:07.727841    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:08.728087 kubelet[2283]: E0702 07:57:08.728033    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:09.729181 kubelet[2283]: E0702 07:57:09.729128    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:10.730348 kubelet[2283]: E0702 07:57:10.730296    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"
Jul  2 07:57:11.731014 kubelet[2283]: E0702 07:57:11.730951    2283 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"