Dec 13 15:25:49.924321 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:25:49.924361 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:25:49.924379 kernel: BIOS-provided physical RAM map: Dec 13 15:25:49.924388 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 15:25:49.924397 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 15:25:49.924406 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 15:25:49.924417 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Dec 13 15:25:49.924426 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Dec 13 15:25:49.924435 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 15:25:49.924444 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 15:25:49.924457 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 15:25:49.924466 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 15:25:49.924475 kernel: NX (Execute Disable) protection: active Dec 13 15:25:49.924485 kernel: SMBIOS 2.8 present. Dec 13 15:25:49.924496 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.16.0-3.module_el8.7.0+3346+68867adb 04/01/2014 Dec 13 15:25:49.924507 kernel: Hypervisor detected: KVM Dec 13 15:25:49.924520 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 15:25:49.924530 kernel: kvm-clock: cpu 0, msr 3c19a001, primary cpu clock Dec 13 15:25:49.924540 kernel: kvm-clock: using sched offset of 4812052063 cycles Dec 13 15:25:49.924550 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 15:25:49.924561 kernel: tsc: Detected 2799.998 MHz processor Dec 13 15:25:49.924571 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:25:49.924581 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:25:49.924591 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Dec 13 15:25:49.924602 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:25:49.924615 kernel: Using GB pages for direct mapping Dec 13 15:25:49.924625 kernel: ACPI: Early table checksum verification disabled Dec 13 15:25:49.924635 kernel: ACPI: RSDP 0x00000000000F59E0 000014 (v00 BOCHS ) Dec 13 15:25:49.924645 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.924667 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.925975 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.925987 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Dec 13 15:25:49.925997 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.926007 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.926022 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.926033 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 15:25:49.926043 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Dec 13 15:25:49.926053 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Dec 13 15:25:49.926063 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Dec 13 15:25:49.926073 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Dec 13 15:25:49.926088 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Dec 13 15:25:49.926102 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Dec 13 15:25:49.926113 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Dec 13 15:25:49.926124 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 15:25:49.926134 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 15:25:49.926145 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 15:25:49.926168 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Dec 13 15:25:49.926179 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 15:25:49.926192 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Dec 13 15:25:49.926202 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 15:25:49.926213 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Dec 13 15:25:49.926223 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 15:25:49.926248 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Dec 13 15:25:49.926258 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 15:25:49.926269 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Dec 13 15:25:49.926280 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 15:25:49.926290 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Dec 13 15:25:49.926301 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 15:25:49.926315 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Dec 13 15:25:49.926326 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 15:25:49.926336 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 15:25:49.926347 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Dec 13 15:25:49.926358 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Dec 13 15:25:49.926369 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Dec 13 15:25:49.926380 kernel: Zone ranges: Dec 13 15:25:49.926391 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:25:49.926401 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Dec 13 15:25:49.926415 kernel: Normal empty Dec 13 15:25:49.926426 kernel: Movable zone start for each node Dec 13 15:25:49.926437 kernel: Early memory node ranges Dec 13 15:25:49.926448 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 15:25:49.926459 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Dec 13 15:25:49.926469 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Dec 13 15:25:49.926480 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:25:49.926491 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 15:25:49.926501 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Dec 13 15:25:49.926515 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 15:25:49.926526 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 15:25:49.926536 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 15:25:49.926560 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:25:49.926570 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 15:25:49.926580 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:25:49.926591 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 15:25:49.926601 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 15:25:49.926611 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:25:49.926625 kernel: TSC deadline timer available Dec 13 15:25:49.926650 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Dec 13 15:25:49.926660 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 15:25:49.926670 kernel: Booting paravirtualized kernel on KVM Dec 13 15:25:49.926680 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:25:49.926691 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:25:49.926714 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:25:49.926724 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:25:49.926747 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:25:49.927976 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Dec 13 15:25:49.927990 kernel: kvm-guest: PV spinlocks enabled Dec 13 15:25:49.928002 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 15:25:49.928012 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Dec 13 15:25:49.928023 kernel: Policy zone: DMA32 Dec 13 15:25:49.928035 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:25:49.928047 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:25:49.928058 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:25:49.928074 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 15:25:49.928085 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:25:49.928096 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 192524K reserved, 0K cma-reserved) Dec 13 15:25:49.928107 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:25:49.928118 kernel: Kernel/User page tables isolation: enabled Dec 13 15:25:49.928129 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:25:49.928140 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:25:49.928150 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:25:49.928162 kernel: rcu: RCU event tracing is enabled. Dec 13 15:25:49.928176 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:25:49.928188 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:25:49.928199 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:25:49.928225 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:25:49.928235 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:25:49.928246 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Dec 13 15:25:49.928256 kernel: random: crng init done Dec 13 15:25:49.928276 kernel: Console: colour VGA+ 80x25 Dec 13 15:25:49.928287 kernel: printk: console [tty0] enabled Dec 13 15:25:49.928298 kernel: printk: console [ttyS0] enabled Dec 13 15:25:49.928308 kernel: ACPI: Core revision 20210730 Dec 13 15:25:49.928319 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:25:49.928346 kernel: x2apic enabled Dec 13 15:25:49.928357 kernel: Switched APIC routing to physical x2apic. Dec 13 15:25:49.928369 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Dec 13 15:25:49.928380 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Dec 13 15:25:49.928391 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 15:25:49.928406 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 15:25:49.928417 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 15:25:49.928428 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:25:49.928439 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 15:25:49.928450 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:25:49.928462 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 15:25:49.928473 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Dec 13 15:25:49.928484 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:25:49.928495 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:25:49.928506 kernel: MDS: Mitigation: Clear CPU buffers Dec 13 15:25:49.928517 kernel: MMIO Stale Data: Unknown: No mitigations Dec 13 15:25:49.928532 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 15:25:49.928543 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:25:49.928554 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:25:49.928565 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:25:49.928588 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:25:49.928599 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 15:25:49.928610 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:25:49.928621 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:25:49.928631 kernel: LSM: Security Framework initializing Dec 13 15:25:49.928642 kernel: SELinux: Initializing. Dec 13 15:25:49.928653 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:25:49.928679 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 15:25:49.928690 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Dec 13 15:25:49.928700 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Dec 13 15:25:49.928722 kernel: signal: max sigframe size: 1776 Dec 13 15:25:49.928733 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:25:49.928744 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 15:25:49.928755 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:25:49.928765 kernel: x86: Booting SMP configuration: Dec 13 15:25:49.928776 kernel: .... node #0, CPUs: #1 Dec 13 15:25:49.928803 kernel: kvm-clock: cpu 1, msr 3c19a041, secondary cpu clock Dec 13 15:25:49.928825 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 15:25:49.928836 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Dec 13 15:25:49.928847 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 15:25:49.928858 kernel: smpboot: Max logical packages: 16 Dec 13 15:25:49.928869 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Dec 13 15:25:49.928881 kernel: devtmpfs: initialized Dec 13 15:25:49.928892 kernel: x86/mm: Memory block size: 128MB Dec 13 15:25:49.928903 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:25:49.928914 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:25:49.928930 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:25:49.928941 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:25:49.928952 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:25:49.928964 kernel: audit: type=2000 audit(1734103548.878:1): state=initialized audit_enabled=0 res=1 Dec 13 15:25:49.928975 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:25:49.928986 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:25:49.928997 kernel: cpuidle: using governor menu Dec 13 15:25:49.929008 kernel: ACPI: bus type PCI registered Dec 13 15:25:49.929020 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:25:49.929034 kernel: dca service started, version 1.12.1 Dec 13 15:25:49.929046 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 15:25:49.929057 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 15:25:49.929068 kernel: PCI: Using configuration type 1 for base access Dec 13 15:25:49.929092 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:25:49.929102 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:25:49.929113 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:25:49.929124 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:25:49.929137 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:25:49.929148 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:25:49.929158 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:25:49.929169 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:25:49.929179 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:25:49.929190 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:25:49.929200 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 15:25:49.929223 kernel: ACPI: Interpreter enabled Dec 13 15:25:49.929234 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:25:49.929244 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:25:49.929257 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:25:49.929268 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 15:25:49.929278 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 15:25:49.929566 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:25:49.932767 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 15:25:49.932946 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 15:25:49.932966 kernel: PCI host bridge to bus 0000:00 Dec 13 15:25:49.933144 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:25:49.933303 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:25:49.933457 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:25:49.933590 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Dec 13 15:25:49.933793 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 15:25:49.933942 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:25:49.934075 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 15:25:49.934286 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 15:25:49.934469 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Dec 13 15:25:49.934630 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Dec 13 15:25:49.934795 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Dec 13 15:25:49.934954 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Dec 13 15:25:49.935113 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:25:49.935308 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.935460 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Dec 13 15:25:49.935664 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.935834 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Dec 13 15:25:49.935998 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.936170 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Dec 13 15:25:49.936368 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.936537 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Dec 13 15:25:49.936745 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.936909 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Dec 13 15:25:49.937079 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.937258 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Dec 13 15:25:49.937432 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.937582 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Dec 13 15:25:49.937773 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Dec 13 15:25:49.937945 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Dec 13 15:25:49.938127 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 15:25:49.938277 kernel: pci 0000:00:03.0: reg 0x10: [io 0xd0c0-0xd0df] Dec 13 15:25:49.938424 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Dec 13 15:25:49.938577 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Dec 13 15:25:49.945832 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Dec 13 15:25:49.946026 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 15:25:49.946184 kernel: pci 0000:00:04.0: reg 0x10: [io 0xd000-0xd07f] Dec 13 15:25:49.946337 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Dec 13 15:25:49.946487 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Dec 13 15:25:49.946745 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 15:25:49.946921 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 15:25:49.947094 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 15:25:49.947243 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xd0e0-0xd0ff] Dec 13 15:25:49.947389 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Dec 13 15:25:49.947592 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 15:25:49.947765 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 15:25:49.947959 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Dec 13 15:25:49.948111 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Dec 13 15:25:49.948257 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:25:49.948403 kernel: pci 0000:00:02.0: bridge window [io 0xc000-0xcfff] Dec 13 15:25:49.948548 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:25:49.948715 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:25:49.948911 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 15:25:49.949091 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Dec 13 15:25:49.949282 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Dec 13 15:25:49.949435 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:25:49.949586 kernel: pci 0000:01:00.0: bridge window [io 0xc000-0xcfff] Dec 13 15:25:49.949757 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:25:49.949936 kernel: pci 0000:01:00.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:25:49.950149 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Dec 13 15:25:49.950351 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Dec 13 15:25:49.950516 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:25:49.950685 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:25:49.950890 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:25:49.951092 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Dec 13 15:25:49.951287 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Dec 13 15:25:49.951482 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:25:49.951668 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:25:49.960861 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:25:49.961026 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:25:49.961180 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:25:49.961330 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:25:49.961493 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:25:49.961641 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:25:49.961836 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:25:49.961989 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:25:49.962134 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:25:49.962286 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:25:49.962437 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:25:49.962593 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:25:49.962766 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:25:49.962930 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:25:49.963082 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:25:49.963234 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:25:49.963252 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 15:25:49.963265 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 15:25:49.963277 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 15:25:49.963288 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 15:25:49.963300 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 15:25:49.963312 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 15:25:49.963323 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 15:25:49.963341 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 15:25:49.963352 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 15:25:49.963364 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 15:25:49.963376 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 15:25:49.963387 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 15:25:49.963398 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 15:25:49.963410 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 15:25:49.963422 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 15:25:49.963433 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 15:25:49.963448 kernel: iommu: Default domain type: Translated Dec 13 15:25:49.963460 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:25:49.963622 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 15:25:49.963797 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:25:49.963958 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 15:25:49.963976 kernel: vgaarb: loaded Dec 13 15:25:49.963988 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:25:49.964000 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:25:49.964017 kernel: PTP clock support registered Dec 13 15:25:49.964029 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:25:49.964041 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:25:49.964052 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 15:25:49.964063 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Dec 13 15:25:49.964075 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 15:25:49.964086 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:25:49.964099 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:25:49.964110 kernel: pnp: PnP ACPI init Dec 13 15:25:49.964313 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 15:25:49.964332 kernel: pnp: PnP ACPI: found 5 devices Dec 13 15:25:49.964345 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:25:49.964357 kernel: NET: Registered PF_INET protocol family Dec 13 15:25:49.964368 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 15:25:49.964380 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 15:25:49.964392 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:25:49.964404 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 15:25:49.964421 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:25:49.964433 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 15:25:49.964444 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:25:49.964456 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 15:25:49.964468 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:25:49.964486 kernel: NET: Registered PF_XDP protocol family Dec 13 15:25:49.964667 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Dec 13 15:25:49.964836 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Dec 13 15:25:49.964993 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Dec 13 15:25:49.965143 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 15:25:49.965294 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 15:25:49.965455 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 15:25:49.965606 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 15:25:49.965778 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x1000-0x1fff] Dec 13 15:25:49.965942 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x2000-0x2fff] Dec 13 15:25:49.966087 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x3000-0x3fff] Dec 13 15:25:49.966240 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x4000-0x4fff] Dec 13 15:25:49.966382 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x5000-0x5fff] Dec 13 15:25:49.966525 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x6000-0x6fff] Dec 13 15:25:49.966683 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x7000-0x7fff] Dec 13 15:25:49.966854 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Dec 13 15:25:49.967009 kernel: pci 0000:01:00.0: bridge window [io 0xc000-0xcfff] Dec 13 15:25:49.967170 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Dec 13 15:25:49.967324 kernel: pci 0000:01:00.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:25:49.967483 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Dec 13 15:25:49.968939 kernel: pci 0000:00:02.0: bridge window [io 0xc000-0xcfff] Dec 13 15:25:49.969109 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Dec 13 15:25:49.969289 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:25:49.969450 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Dec 13 15:25:49.969605 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x1fff] Dec 13 15:25:49.969780 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Dec 13 15:25:49.969952 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:25:49.970120 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Dec 13 15:25:49.970269 kernel: pci 0000:00:02.2: bridge window [io 0x2000-0x2fff] Dec 13 15:25:49.970432 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Dec 13 15:25:49.970577 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:25:49.970736 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Dec 13 15:25:49.970896 kernel: pci 0000:00:02.3: bridge window [io 0x3000-0x3fff] Dec 13 15:25:49.971042 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Dec 13 15:25:49.971195 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:25:49.971352 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Dec 13 15:25:49.971536 kernel: pci 0000:00:02.4: bridge window [io 0x4000-0x4fff] Dec 13 15:25:49.971710 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Dec 13 15:25:49.971887 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:25:49.972033 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Dec 13 15:25:49.972177 kernel: pci 0000:00:02.5: bridge window [io 0x5000-0x5fff] Dec 13 15:25:49.972342 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Dec 13 15:25:49.972515 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:25:49.972661 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Dec 13 15:25:49.972831 kernel: pci 0000:00:02.6: bridge window [io 0x6000-0x6fff] Dec 13 15:25:49.972980 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Dec 13 15:25:49.973144 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:25:49.973291 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Dec 13 15:25:49.973443 kernel: pci 0000:00:02.7: bridge window [io 0x7000-0x7fff] Dec 13 15:25:49.973608 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Dec 13 15:25:49.973793 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:25:49.973947 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:25:49.974083 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:25:49.974244 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:25:49.974401 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Dec 13 15:25:49.974544 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 15:25:49.974686 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Dec 13 15:25:49.974897 kernel: pci_bus 0000:01: resource 0 [io 0xc000-0xcfff] Dec 13 15:25:49.975044 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Dec 13 15:25:49.975195 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:25:49.975376 kernel: pci_bus 0000:02: resource 0 [io 0xc000-0xcfff] Dec 13 15:25:49.975539 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Dec 13 15:25:49.985230 kernel: pci_bus 0000:02: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Dec 13 15:25:49.985428 kernel: pci_bus 0000:03: resource 0 [io 0x1000-0x1fff] Dec 13 15:25:49.985594 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Dec 13 15:25:49.985771 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Dec 13 15:25:49.985944 kernel: pci_bus 0000:04: resource 0 [io 0x2000-0x2fff] Dec 13 15:25:49.986087 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Dec 13 15:25:49.986254 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Dec 13 15:25:49.986440 kernel: pci_bus 0000:05: resource 0 [io 0x3000-0x3fff] Dec 13 15:25:49.986591 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Dec 13 15:25:49.986755 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Dec 13 15:25:49.986949 kernel: pci_bus 0000:06: resource 0 [io 0x4000-0x4fff] Dec 13 15:25:49.987092 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Dec 13 15:25:49.987253 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Dec 13 15:25:49.987451 kernel: pci_bus 0000:07: resource 0 [io 0x5000-0x5fff] Dec 13 15:25:49.987621 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Dec 13 15:25:49.987777 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Dec 13 15:25:49.987964 kernel: pci_bus 0000:08: resource 0 [io 0x6000-0x6fff] Dec 13 15:25:49.988108 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Dec 13 15:25:49.988257 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Dec 13 15:25:49.988428 kernel: pci_bus 0000:09: resource 0 [io 0x7000-0x7fff] Dec 13 15:25:49.988588 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Dec 13 15:25:49.988746 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Dec 13 15:25:49.988766 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 15:25:49.988779 kernel: PCI: CLS 0 bytes, default 64 Dec 13 15:25:49.988792 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:25:49.988814 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Dec 13 15:25:49.988827 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 15:25:49.988845 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Dec 13 15:25:49.988857 kernel: Initialise system trusted keyrings Dec 13 15:25:49.988870 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 15:25:49.988882 kernel: Key type asymmetric registered Dec 13 15:25:49.988894 kernel: Asymmetric key parser 'x509' registered Dec 13 15:25:49.988905 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:25:49.988917 kernel: io scheduler mq-deadline registered Dec 13 15:25:49.988930 kernel: io scheduler kyber registered Dec 13 15:25:49.988942 kernel: io scheduler bfq registered Dec 13 15:25:49.989115 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Dec 13 15:25:49.989284 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Dec 13 15:25:49.989458 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.989616 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Dec 13 15:25:49.989790 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Dec 13 15:25:49.989951 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.990112 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Dec 13 15:25:49.990277 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Dec 13 15:25:49.990420 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.990609 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Dec 13 15:25:49.990793 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Dec 13 15:25:49.990977 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.991140 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Dec 13 15:25:49.991327 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Dec 13 15:25:49.991485 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.991631 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Dec 13 15:25:49.998000 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Dec 13 15:25:49.998163 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.998339 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Dec 13 15:25:49.998497 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Dec 13 15:25:49.998669 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.998873 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Dec 13 15:25:49.999022 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Dec 13 15:25:49.999179 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Dec 13 15:25:49.999198 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:25:49.999230 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 15:25:49.999242 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 15:25:49.999253 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:25:49.999265 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:25:49.999289 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 15:25:49.999301 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 15:25:49.999313 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 15:25:49.999325 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 15:25:49.999504 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 13 15:25:49.999653 kernel: rtc_cmos 00:03: registered as rtc0 Dec 13 15:25:49.999945 kernel: rtc_cmos 00:03: setting system clock to 2024-12-13T15:25:49 UTC (1734103549) Dec 13 15:25:50.000088 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 13 15:25:50.000106 kernel: intel_pstate: CPU model not supported Dec 13 15:25:50.000119 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:25:50.000131 kernel: Segment Routing with IPv6 Dec 13 15:25:50.000149 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:25:50.000174 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:25:50.000192 kernel: Key type dns_resolver registered Dec 13 15:25:50.000204 kernel: IPI shorthand broadcast: enabled Dec 13 15:25:50.000216 kernel: sched_clock: Marking stable (995236836, 221050029)->(1514468448, -298181583) Dec 13 15:25:50.000240 kernel: registered taskstats version 1 Dec 13 15:25:50.000251 kernel: Loading compiled-in X.509 certificates Dec 13 15:25:50.000262 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:25:50.000273 kernel: Key type .fscrypt registered Dec 13 15:25:50.000284 kernel: Key type fscrypt-provisioning registered Dec 13 15:25:50.000295 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 15:25:50.000310 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:25:50.000321 kernel: ima: No architecture policies found Dec 13 15:25:50.000332 kernel: clk: Disabling unused clocks Dec 13 15:25:50.000343 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:25:50.000354 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:25:50.000365 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:25:50.000389 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:25:50.000401 kernel: Run /init as init process Dec 13 15:25:50.000413 kernel: with arguments: Dec 13 15:25:50.000428 kernel: /init Dec 13 15:25:50.000440 kernel: with environment: Dec 13 15:25:50.000463 kernel: HOME=/ Dec 13 15:25:50.000474 kernel: TERM=linux Dec 13 15:25:50.000485 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:25:50.000505 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:25:50.000539 systemd[1]: Detected virtualization kvm. Dec 13 15:25:50.000552 systemd[1]: Detected architecture x86-64. Dec 13 15:25:50.000568 systemd[1]: Running in initrd. Dec 13 15:25:50.000580 systemd[1]: No hostname configured, using default hostname. Dec 13 15:25:50.000592 systemd[1]: Hostname set to . Dec 13 15:25:50.000605 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:25:50.000617 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:25:50.000629 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:25:50.000642 systemd[1]: Reached target cryptsetup.target. Dec 13 15:25:50.000654 systemd[1]: Reached target paths.target. Dec 13 15:25:50.000693 systemd[1]: Reached target slices.target. Dec 13 15:25:50.000720 systemd[1]: Reached target swap.target. Dec 13 15:25:50.000738 systemd[1]: Reached target timers.target. Dec 13 15:25:50.000753 systemd[1]: Listening on iscsid.socket. Dec 13 15:25:50.000766 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:25:50.000779 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:25:50.000791 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:25:50.000819 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:25:50.000832 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:25:50.000845 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:25:50.000858 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:25:50.000871 systemd[1]: Reached target sockets.target. Dec 13 15:25:50.000883 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:25:50.000896 systemd[1]: Finished network-cleanup.service. Dec 13 15:25:50.000908 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:25:50.000921 systemd[1]: Starting systemd-journald.service... Dec 13 15:25:50.000938 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:25:50.000951 systemd[1]: Starting systemd-resolved.service... Dec 13 15:25:50.000964 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:25:50.000976 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:25:50.000989 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:25:50.001012 systemd-journald[201]: Journal started Dec 13 15:25:50.001095 systemd-journald[201]: Runtime Journal (/run/log/journal/84129630e37849fba474ebabb6cf4b7a) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:25:49.929765 systemd-modules-load[202]: Inserted module 'overlay' Dec 13 15:25:50.028462 kernel: Bridge firewalling registered Dec 13 15:25:50.028493 systemd[1]: Started systemd-resolved.service. Dec 13 15:25:50.028513 kernel: audit: type=1130 audit(1734103550.020:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:49.976539 systemd-resolved[203]: Positive Trust Anchors: Dec 13 15:25:50.045980 systemd[1]: Started systemd-journald.service. Dec 13 15:25:50.046007 kernel: audit: type=1130 audit(1734103550.028:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.046026 kernel: SCSI subsystem initialized Dec 13 15:25:50.046042 kernel: audit: type=1130 audit(1734103550.036:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:49.976561 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:25:49.976602 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:25:50.069917 kernel: audit: type=1130 audit(1734103550.046:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.069944 kernel: audit: type=1130 audit(1734103550.050:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.069962 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:25:50.069979 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:25:50.069995 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:25:50.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:49.984377 systemd-resolved[203]: Defaulting to hostname 'linux'. Dec 13 15:25:50.006951 systemd-modules-load[202]: Inserted module 'br_netfilter' Dec 13 15:25:50.037378 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:25:50.047623 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:25:50.051010 systemd[1]: Reached target nss-lookup.target. Dec 13 15:25:50.068442 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:25:50.070953 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:25:50.080053 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:25:50.086502 kernel: audit: type=1130 audit(1734103550.080:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.081265 systemd-modules-load[202]: Inserted module 'dm_multipath' Dec 13 15:25:50.092845 kernel: audit: type=1130 audit(1734103550.086:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.082034 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:25:50.093858 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:25:50.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.104128 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:25:50.123699 kernel: audit: type=1130 audit(1734103550.104:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.124045 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:25:50.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.125838 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:25:50.131916 kernel: audit: type=1130 audit(1734103550.124:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.139976 dracut-cmdline[225]: dracut-dracut-053 Dec 13 15:25:50.143229 dracut-cmdline[225]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:25:50.225702 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:25:50.245704 kernel: iscsi: registered transport (tcp) Dec 13 15:25:50.273647 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:25:50.273712 kernel: QLogic iSCSI HBA Driver Dec 13 15:25:50.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.322491 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:25:50.324540 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:25:50.382701 kernel: raid6: sse2x4 gen() 13261 MB/s Dec 13 15:25:50.400810 kernel: raid6: sse2x4 xor() 7740 MB/s Dec 13 15:25:50.418757 kernel: raid6: sse2x2 gen() 8976 MB/s Dec 13 15:25:50.436742 kernel: raid6: sse2x2 xor() 8058 MB/s Dec 13 15:25:50.454759 kernel: raid6: sse2x1 gen() 9064 MB/s Dec 13 15:25:50.473243 kernel: raid6: sse2x1 xor() 7309 MB/s Dec 13 15:25:50.473306 kernel: raid6: using algorithm sse2x4 gen() 13261 MB/s Dec 13 15:25:50.473324 kernel: raid6: .... xor() 7740 MB/s, rmw enabled Dec 13 15:25:50.474558 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 15:25:50.491772 kernel: xor: automatically using best checksumming function avx Dec 13 15:25:50.604744 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:25:50.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.618000 audit: BPF prog-id=7 op=LOAD Dec 13 15:25:50.618000 audit: BPF prog-id=8 op=LOAD Dec 13 15:25:50.617593 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:25:50.619519 systemd[1]: Starting systemd-udevd.service... Dec 13 15:25:50.636500 systemd-udevd[402]: Using default interface naming scheme 'v252'. Dec 13 15:25:50.644385 systemd[1]: Started systemd-udevd.service. Dec 13 15:25:50.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.649672 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:25:50.667984 dracut-pre-trigger[416]: rd.md=0: removing MD RAID activation Dec 13 15:25:50.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.707673 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:25:50.709409 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:25:50.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:50.800474 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:25:50.881715 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 13 15:25:50.956362 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:25:50.956408 kernel: AVX version of gcm_enc/dec engaged. Dec 13 15:25:50.956435 kernel: AES CTR mode by8 optimization enabled Dec 13 15:25:50.956457 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:25:50.956480 kernel: GPT:17805311 != 125829119 Dec 13 15:25:50.956516 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:25:50.956553 kernel: GPT:17805311 != 125829119 Dec 13 15:25:50.956570 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:25:50.956589 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:25:50.977687 kernel: libata version 3.00 loaded. Dec 13 15:25:50.977783 kernel: ACPI: bus type USB registered Dec 13 15:25:50.978732 kernel: usbcore: registered new interface driver usbfs Dec 13 15:25:50.978762 kernel: usbcore: registered new interface driver hub Dec 13 15:25:50.978801 kernel: usbcore: registered new device driver usb Dec 13 15:25:51.010866 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:25:51.043756 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (457) Dec 13 15:25:51.043813 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 15:25:51.104299 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 15:25:51.104340 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:25:51.104553 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Dec 13 15:25:51.104752 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Dec 13 15:25:51.104927 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 15:25:51.105108 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 15:25:51.105292 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Dec 13 15:25:51.105466 kernel: scsi host0: ahci Dec 13 15:25:51.105693 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Dec 13 15:25:51.105890 kernel: scsi host1: ahci Dec 13 15:25:51.106091 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Dec 13 15:25:51.106262 kernel: scsi host2: ahci Dec 13 15:25:51.106469 kernel: hub 1-0:1.0: USB hub found Dec 13 15:25:51.106720 kernel: scsi host3: ahci Dec 13 15:25:51.106960 kernel: hub 1-0:1.0: 4 ports detected Dec 13 15:25:51.107144 kernel: scsi host4: ahci Dec 13 15:25:51.107353 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Dec 13 15:25:51.107654 kernel: hub 2-0:1.0: USB hub found Dec 13 15:25:51.107921 kernel: hub 2-0:1.0: 4 ports detected Dec 13 15:25:51.108104 kernel: scsi host5: ahci Dec 13 15:25:51.108298 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Dec 13 15:25:51.108318 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Dec 13 15:25:51.108343 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Dec 13 15:25:51.108361 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Dec 13 15:25:51.108382 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Dec 13 15:25:51.108405 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Dec 13 15:25:51.044783 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:25:51.051134 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:25:51.056513 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:25:51.103426 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:25:51.106142 systemd[1]: Starting disk-uuid.service... Dec 13 15:25:51.118724 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:25:51.118987 disk-uuid[531]: Primary Header is updated. Dec 13 15:25:51.118987 disk-uuid[531]: Secondary Entries is updated. Dec 13 15:25:51.118987 disk-uuid[531]: Secondary Header is updated. Dec 13 15:25:51.322868 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Dec 13 15:25:51.416588 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:25:51.416705 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 15:25:51.420089 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:25:51.420127 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:25:51.420143 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 15:25:51.423698 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:25:51.463744 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:25:51.470429 kernel: usbcore: registered new interface driver usbhid Dec 13 15:25:51.470468 kernel: usbhid: USB HID core driver Dec 13 15:25:51.479841 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Dec 13 15:25:51.479882 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Dec 13 15:25:52.132681 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 15:25:52.132801 disk-uuid[532]: The operation has completed successfully. Dec 13 15:25:52.195336 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:25:52.195502 systemd[1]: Finished disk-uuid.service. Dec 13 15:25:52.197513 systemd[1]: Starting verity-setup.service... Dec 13 15:25:52.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.217706 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Dec 13 15:25:52.275676 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:25:52.277697 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:25:52.279702 systemd[1]: Finished verity-setup.service. Dec 13 15:25:52.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.373753 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:25:52.374559 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:25:52.375574 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:25:52.376936 systemd[1]: Starting ignition-setup.service... Dec 13 15:25:52.378870 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:25:52.400499 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:25:52.400550 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:25:52.400569 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:25:52.421975 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 15:25:52.430252 systemd[1]: Finished ignition-setup.service. Dec 13 15:25:52.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.432021 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:25:52.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.532521 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:25:52.534000 audit: BPF prog-id=9 op=LOAD Dec 13 15:25:52.535755 systemd[1]: Starting systemd-networkd.service... Dec 13 15:25:52.580781 systemd-networkd[711]: lo: Link UP Dec 13 15:25:52.580795 systemd-networkd[711]: lo: Gained carrier Dec 13 15:25:52.581887 systemd-networkd[711]: Enumeration completed Dec 13 15:25:52.582312 systemd-networkd[711]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:25:52.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.590973 systemd-networkd[711]: eth0: Link UP Dec 13 15:25:52.590980 systemd-networkd[711]: eth0: Gained carrier Dec 13 15:25:52.597896 systemd[1]: Started systemd-networkd.service. Dec 13 15:25:52.599765 systemd[1]: Reached target network.target. Dec 13 15:25:52.602951 systemd[1]: Starting iscsiuio.service... Dec 13 15:25:52.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.614939 systemd[1]: Started iscsiuio.service. Dec 13 15:25:52.616989 systemd[1]: Starting iscsid.service... Dec 13 15:25:52.622818 iscsid[716]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:25:52.622818 iscsid[716]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:25:52.622818 iscsid[716]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:25:52.622818 iscsid[716]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:25:52.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.634573 iscsid[716]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:25:52.634573 iscsid[716]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:25:52.626871 systemd[1]: Started iscsid.service. Dec 13 15:25:52.629881 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:25:52.644992 ignition[636]: Ignition 2.14.0 Dec 13 15:25:52.645020 ignition[636]: Stage: fetch-offline Dec 13 15:25:52.645152 ignition[636]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:52.645206 ignition[636]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:52.647042 ignition[636]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:52.647572 systemd-networkd[711]: eth0: DHCPv4 address 10.243.81.46/30, gateway 10.243.81.45 acquired from 10.243.81.45 Dec 13 15:25:52.647211 ignition[636]: parsed url from cmdline: "" Dec 13 15:25:52.647217 ignition[636]: no config URL provided Dec 13 15:25:52.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.647239 ignition[636]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:25:52.651674 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:25:52.647254 ignition[636]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:25:52.653774 systemd[1]: Starting ignition-fetch.service... Dec 13 15:25:52.647280 ignition[636]: failed to fetch config: resource requires networking Dec 13 15:25:52.650627 ignition[636]: Ignition finished successfully Dec 13 15:25:52.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.660800 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:25:52.661586 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:25:52.662246 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:25:52.662881 systemd[1]: Reached target remote-fs.target. Dec 13 15:25:52.665468 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:25:52.670346 ignition[725]: Ignition 2.14.0 Dec 13 15:25:52.670360 ignition[725]: Stage: fetch Dec 13 15:25:52.670578 ignition[725]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:52.670614 ignition[725]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:52.674785 ignition[725]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:52.675872 ignition[725]: parsed url from cmdline: "" Dec 13 15:25:52.675959 ignition[725]: no config URL provided Dec 13 15:25:52.676637 ignition[725]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:25:52.677629 ignition[725]: no config at "/usr/lib/ignition/user.ign" Dec 13 15:25:52.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.678829 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:25:52.684024 ignition[725]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 15:25:52.684090 ignition[725]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 15:25:52.685134 ignition[725]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 15:25:52.708250 ignition[725]: GET result: OK Dec 13 15:25:52.709287 ignition[725]: parsing config with SHA512: e111e11047526d9130502595b7187a5d227c8b38c8eed5511c998bbe801a307139224b87bfb566c00aaf9b5fc0429c0c4fcdac2dae6ac7b437826ddc89028a58 Dec 13 15:25:52.720389 unknown[725]: fetched base config from "system" Dec 13 15:25:52.721374 unknown[725]: fetched base config from "system" Dec 13 15:25:52.722166 unknown[725]: fetched user config from "openstack" Dec 13 15:25:52.723378 ignition[725]: fetch: fetch complete Dec 13 15:25:52.723397 ignition[725]: fetch: fetch passed Dec 13 15:25:52.723483 ignition[725]: Ignition finished successfully Dec 13 15:25:52.725165 systemd[1]: Finished ignition-fetch.service. Dec 13 15:25:52.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.727598 systemd[1]: Starting ignition-kargs.service... Dec 13 15:25:52.740921 ignition[736]: Ignition 2.14.0 Dec 13 15:25:52.740940 ignition[736]: Stage: kargs Dec 13 15:25:52.741105 ignition[736]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:52.741140 ignition[736]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:52.742972 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:52.744442 ignition[736]: kargs: kargs passed Dec 13 15:25:52.744536 ignition[736]: Ignition finished successfully Dec 13 15:25:52.745749 systemd[1]: Finished ignition-kargs.service. Dec 13 15:25:52.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.748852 systemd[1]: Starting ignition-disks.service... Dec 13 15:25:52.760420 ignition[741]: Ignition 2.14.0 Dec 13 15:25:52.761427 ignition[741]: Stage: disks Dec 13 15:25:52.762287 ignition[741]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:52.763272 ignition[741]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:52.764763 ignition[741]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:52.767339 ignition[741]: disks: disks passed Dec 13 15:25:52.768083 ignition[741]: Ignition finished successfully Dec 13 15:25:52.769647 systemd[1]: Finished ignition-disks.service. Dec 13 15:25:52.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.770501 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:25:52.771615 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:25:52.772878 systemd[1]: Reached target local-fs.target. Dec 13 15:25:52.774126 systemd[1]: Reached target sysinit.target. Dec 13 15:25:52.775361 systemd[1]: Reached target basic.target. Dec 13 15:25:52.777937 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:25:52.797912 systemd-fsck[748]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 15:25:52.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.802565 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:25:52.804354 systemd[1]: Mounting sysroot.mount... Dec 13 15:25:52.816660 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:25:52.817788 systemd[1]: Mounted sysroot.mount. Dec 13 15:25:52.819163 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:25:52.822186 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:25:52.824287 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 15:25:52.826290 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 15:25:52.827856 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:25:52.828825 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:25:52.832716 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:25:52.835532 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:25:52.842488 initrd-setup-root[759]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:25:52.859762 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:25:52.868408 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:25:52.880859 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:25:52.952835 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:25:52.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.955834 systemd[1]: Starting ignition-mount.service... Dec 13 15:25:52.958350 systemd[1]: Starting sysroot-boot.service... Dec 13 15:25:52.969021 bash[802]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 15:25:52.978235 coreos-metadata[754]: Dec 13 15:25:52.977 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 15:25:52.991913 ignition[804]: INFO : Ignition 2.14.0 Dec 13 15:25:52.993156 ignition[804]: INFO : Stage: mount Dec 13 15:25:52.994233 ignition[804]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:52.995223 ignition[804]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:52.997995 systemd[1]: Finished sysroot-boot.service. Dec 13 15:25:52.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:52.999870 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:53.001501 ignition[804]: INFO : mount: mount passed Dec 13 15:25:53.002756 ignition[804]: INFO : Ignition finished successfully Dec 13 15:25:53.003458 coreos-metadata[754]: Dec 13 15:25:53.001 INFO Fetch successful Dec 13 15:25:53.004000 systemd[1]: Finished ignition-mount.service. Dec 13 15:25:53.020742 coreos-metadata[754]: Dec 13 15:25:53.004 INFO wrote hostname srv-nlsfm.gb1.brightbox.com to /sysroot/etc/hostname Dec 13 15:25:53.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:53.021971 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 15:25:53.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:53.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:53.022127 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 15:25:53.300055 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:25:53.313709 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (811) Dec 13 15:25:53.318156 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:25:53.318242 kernel: BTRFS info (device vda6): using free space tree Dec 13 15:25:53.318261 kernel: BTRFS info (device vda6): has skinny extents Dec 13 15:25:53.325344 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:25:53.328084 systemd[1]: Starting ignition-files.service... Dec 13 15:25:53.350228 ignition[831]: INFO : Ignition 2.14.0 Dec 13 15:25:53.350228 ignition[831]: INFO : Stage: files Dec 13 15:25:53.352041 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:53.352041 ignition[831]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:53.352041 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:53.355091 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:25:53.355091 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:25:53.355091 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:25:53.358283 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:25:53.359732 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:25:53.360935 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:25:53.360766 unknown[831]: wrote ssh authorized keys file for user: core Dec 13 15:25:53.362984 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 15:25:53.362984 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/flatcar-cgroupv1" Dec 13 15:25:53.362984 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:25:53.362984 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 15:25:53.630874 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Dec 13 15:25:53.843575 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:25:53.844973 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:25:53.844973 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:25:53.844973 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:25:53.849437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:25:53.849437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:25:53.849437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:25:53.849437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:25:53.854827 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 15:25:54.063115 systemd-networkd[711]: eth0: Gained IPv6LL Dec 13 15:25:54.490128 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): GET result: OK Dec 13 15:25:55.510699 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 15:25:55.512666 ignition[831]: INFO : files: op(c): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:25:55.513627 ignition[831]: INFO : files: op(c): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:25:55.514623 ignition[831]: INFO : files: op(d): [started] processing unit "containerd.service" Dec 13 15:25:55.516507 ignition[831]: INFO : files: op(d): op(e): [started] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(d): op(e): [finished] writing systemd drop-in "10-use-cgroupfs.conf" at "/sysroot/etc/systemd/system/containerd.service.d/10-use-cgroupfs.conf" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(d): [finished] processing unit "containerd.service" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(f): [started] processing unit "prepare-helm.service" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(f): op(10): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(f): op(10): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(f): [finished] processing unit "prepare-helm.service" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(12): [started] setting preset to enabled for "prepare-helm.service" Dec 13 15:25:55.518734 ignition[831]: INFO : files: op(12): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 15:25:55.539982 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 15:25:55.540024 kernel: audit: type=1130 audit(1734103555.530:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.528965 systemd[1]: Finished ignition-files.service. Dec 13 15:25:55.541528 ignition[831]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:25:55.541528 ignition[831]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:25:55.541528 ignition[831]: INFO : files: files passed Dec 13 15:25:55.541528 ignition[831]: INFO : Ignition finished successfully Dec 13 15:25:55.562556 kernel: audit: type=1130 audit(1734103555.546:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.562607 kernel: audit: type=1130 audit(1734103555.552:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.562629 kernel: audit: type=1131 audit(1734103555.552:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.532328 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:25:55.540918 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:25:55.566039 initrd-setup-root-after-ignition[855]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:25:55.542049 systemd[1]: Starting ignition-quench.service... Dec 13 15:25:55.545748 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:25:55.547052 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:25:55.547164 systemd[1]: Finished ignition-quench.service. Dec 13 15:25:55.552965 systemd[1]: Reached target ignition-complete.target. Dec 13 15:25:55.564391 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:25:55.577749 systemd-networkd[711]: eth0: Ignoring DHCPv6 address 2a02:1348:17c:d44b:24:19ff:fef3:512e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17c:d44b:24:19ff:fef3:512e/64 assigned by NDisc. Dec 13 15:25:55.577759 systemd-networkd[711]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:25:55.585883 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:25:55.586038 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:25:55.611073 kernel: audit: type=1130 audit(1734103555.586:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.611118 kernel: audit: type=1131 audit(1734103555.586:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.587621 systemd[1]: Reached target initrd-fs.target. Dec 13 15:25:55.611728 systemd[1]: Reached target initrd.target. Dec 13 15:25:55.613035 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:25:55.614323 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:25:55.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.630808 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:25:55.637227 kernel: audit: type=1130 audit(1734103555.630:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.637641 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:25:55.649951 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:25:55.651505 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:25:55.653070 systemd[1]: Stopped target timers.target. Dec 13 15:25:55.654362 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:25:55.654522 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:25:55.661196 kernel: audit: type=1131 audit(1734103555.655:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.656116 systemd[1]: Stopped target initrd.target. Dec 13 15:25:55.661834 systemd[1]: Stopped target basic.target. Dec 13 15:25:55.662957 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:25:55.664176 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:25:55.665412 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:25:55.666733 systemd[1]: Stopped target remote-fs.target. Dec 13 15:25:55.667958 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:25:55.669163 systemd[1]: Stopped target sysinit.target. Dec 13 15:25:55.670322 systemd[1]: Stopped target local-fs.target. Dec 13 15:25:55.671514 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:25:55.672782 systemd[1]: Stopped target swap.target. Dec 13 15:25:55.673860 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:25:55.680167 kernel: audit: type=1131 audit(1734103555.674:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.674066 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:25:55.675234 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:25:55.687373 kernel: audit: type=1131 audit(1734103555.681:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.680947 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:25:55.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.681160 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:25:55.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.682271 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:25:55.682481 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:25:55.688282 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:25:55.688491 systemd[1]: Stopped ignition-files.service. Dec 13 15:25:55.690953 systemd[1]: Stopping ignition-mount.service... Dec 13 15:25:55.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.692848 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:25:55.707555 ignition[869]: INFO : Ignition 2.14.0 Dec 13 15:25:55.707555 ignition[869]: INFO : Stage: umount Dec 13 15:25:55.707555 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:25:55.707555 ignition[869]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 15:25:55.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.702185 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:25:55.715175 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 15:25:55.715175 ignition[869]: INFO : umount: umount passed Dec 13 15:25:55.715175 ignition[869]: INFO : Ignition finished successfully Dec 13 15:25:55.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.702505 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:25:55.705623 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:25:55.705802 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:25:55.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.709768 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:25:55.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.709900 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:25:55.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.719699 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:25:55.720363 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:25:55.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.720478 systemd[1]: Stopped ignition-mount.service. Dec 13 15:25:55.722723 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:25:55.722787 systemd[1]: Stopped ignition-disks.service. Dec 13 15:25:55.724131 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:25:55.724190 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:25:55.725397 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 15:25:55.725453 systemd[1]: Stopped ignition-fetch.service. Dec 13 15:25:55.726723 systemd[1]: Stopped target network.target. Dec 13 15:25:55.728524 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:25:55.728596 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:25:55.729881 systemd[1]: Stopped target paths.target. Dec 13 15:25:55.731054 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:25:55.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.734730 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:25:55.735834 systemd[1]: Stopped target slices.target. Dec 13 15:25:55.737409 systemd[1]: Stopped target sockets.target. Dec 13 15:25:55.738705 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:25:55.738751 systemd[1]: Closed iscsid.socket. Dec 13 15:25:55.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.740022 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:25:55.740065 systemd[1]: Closed iscsiuio.socket. Dec 13 15:25:55.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.741143 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:25:55.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.741205 systemd[1]: Stopped ignition-setup.service. Dec 13 15:25:55.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.742610 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:25:55.744364 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:25:55.747719 systemd-networkd[711]: eth0: DHCPv6 lease lost Dec 13 15:25:55.764000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:25:55.748883 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:25:55.749037 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:25:55.750691 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:25:55.750738 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:25:55.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.752444 systemd[1]: Stopping network-cleanup.service... Dec 13 15:25:55.755562 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:25:55.772000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:25:55.755638 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:25:55.756348 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:25:55.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.756407 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:25:55.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.757870 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:25:55.757926 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:25:55.762153 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:25:55.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.767382 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:25:55.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.768083 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:25:55.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.768213 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:25:55.773829 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:25:55.773979 systemd[1]: Stopped network-cleanup.service. Dec 13 15:25:55.775999 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:25:55.776195 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:25:55.777261 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:25:55.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.777318 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:25:55.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.778069 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:25:55.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.778115 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:25:55.779348 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:25:55.779416 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:25:55.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.781794 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:25:55.781868 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:25:55.783045 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:25:55.783106 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:25:55.785537 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:25:55.786406 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 15:25:55.786488 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 15:25:55.808209 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:25:55.808299 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:25:55.809041 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:25:55.809123 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:25:55.811691 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 15:25:55.812369 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:25:55.812499 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:25:55.862611 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:25:55.862778 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:25:55.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.864413 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:25:55.865345 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:25:55.865000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:55.865410 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:25:55.867832 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:25:55.878147 systemd[1]: Switching root. Dec 13 15:25:55.879000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:25:55.879000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:25:55.879000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:25:55.879000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:25:55.879000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:25:55.901451 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Dec 13 15:25:55.901583 iscsid[716]: iscsid shutting down. Dec 13 15:25:55.902335 systemd-journald[201]: Journal stopped Dec 13 15:25:59.856391 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:25:59.856544 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:25:59.856569 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:25:59.856593 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:25:59.856612 kernel: SELinux: policy capability open_perms=1 Dec 13 15:25:59.856637 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:25:59.856737 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:25:59.856765 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:25:59.856793 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:25:59.856825 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:25:59.856856 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:25:59.856879 systemd[1]: Successfully loaded SELinux policy in 62.295ms. Dec 13 15:25:59.856927 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 15.237ms. Dec 13 15:25:59.856951 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:25:59.856972 systemd[1]: Detected virtualization kvm. Dec 13 15:25:59.856992 systemd[1]: Detected architecture x86-64. Dec 13 15:25:59.857012 systemd[1]: Detected first boot. Dec 13 15:25:59.857042 systemd[1]: Hostname set to . Dec 13 15:25:59.857077 systemd[1]: Initializing machine ID from VM UUID. Dec 13 15:25:59.857104 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:25:59.857124 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:25:59.857144 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:25:59.857166 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:25:59.857193 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:25:59.857235 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:25:59.857256 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 15:25:59.857325 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:25:59.857351 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:25:59.857371 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:25:59.857391 systemd[1]: Created slice system-getty.slice. Dec 13 15:25:59.857410 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:25:59.857441 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:25:59.857479 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:25:59.857501 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:25:59.857527 systemd[1]: Created slice user.slice. Dec 13 15:25:59.857547 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:25:59.857567 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:25:59.857586 systemd[1]: Set up automount boot.automount. Dec 13 15:25:59.857623 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:25:59.857645 systemd[1]: Reached target integritysetup.target. Dec 13 15:25:59.857750 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:25:59.857775 systemd[1]: Reached target remote-fs.target. Dec 13 15:25:59.857795 systemd[1]: Reached target slices.target. Dec 13 15:25:59.857823 systemd[1]: Reached target swap.target. Dec 13 15:25:59.857843 systemd[1]: Reached target torcx.target. Dec 13 15:25:59.857876 systemd[1]: Reached target veritysetup.target. Dec 13 15:25:59.857902 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:25:59.857937 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:25:59.857959 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:25:59.858029 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:25:59.858054 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:25:59.858075 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:25:59.858102 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:25:59.858131 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:25:59.858152 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:25:59.858172 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:25:59.858197 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:25:59.858236 systemd[1]: Mounting media.mount... Dec 13 15:25:59.858275 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:25:59.858298 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:25:59.858318 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:25:59.858342 systemd[1]: Mounting tmp.mount... Dec 13 15:25:59.858363 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:25:59.858383 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:25:59.858403 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:25:59.858432 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:25:59.858466 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:25:59.858487 systemd[1]: Starting modprobe@drm.service... Dec 13 15:25:59.858507 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:25:59.858528 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:25:59.858547 systemd[1]: Starting modprobe@loop.service... Dec 13 15:25:59.858567 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:25:59.858587 systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling. Dec 13 15:25:59.858613 systemd[1]: (This warning is only shown for the first unit using IP firewalling.) Dec 13 15:25:59.858663 systemd[1]: Starting systemd-journald.service... Dec 13 15:25:59.858698 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:25:59.858731 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:25:59.858752 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:25:59.858780 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:25:59.858806 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:25:59.858826 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:25:59.858851 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:25:59.858880 systemd[1]: Mounted media.mount. Dec 13 15:25:59.858900 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:25:59.858930 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:25:59.858951 systemd[1]: Mounted tmp.mount. Dec 13 15:25:59.858970 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:25:59.858990 kernel: fuse: init (API version 7.34) Dec 13 15:25:59.859009 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:25:59.859036 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:25:59.859057 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:25:59.859076 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:25:59.859099 kernel: loop: module loaded Dec 13 15:25:59.859134 systemd-journald[1017]: Journal started Dec 13 15:25:59.859232 systemd-journald[1017]: Runtime Journal (/run/log/journal/84129630e37849fba474ebabb6cf4b7a) is 4.7M, max 38.1M, 33.3M free. Dec 13 15:25:59.635000 audit[1]: EVENT_LISTENER pid=1 uid=0 auid=4294967295 tty=(none) ses=4294967295 subj=system_u:system_r:kernel_t:s0 comm="systemd" exe="/usr/lib/systemd/systemd" nl-mcgrp=1 op=connect res=1 Dec 13 15:25:59.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.866372 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:25:59.866442 systemd[1]: Finished modprobe@drm.service. Dec 13 15:25:59.866475 systemd[1]: Started systemd-journald.service. Dec 13 15:25:59.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.850000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:25:59.850000 audit[1017]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe8a42d650 a2=4000 a3=7ffe8a42d6ec items=0 ppid=1 pid=1017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:25:59.850000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:25:59.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.867258 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:25:59.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.867518 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:25:59.869605 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:25:59.870944 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:25:59.873085 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:25:59.873342 systemd[1]: Finished modprobe@loop.service. Dec 13 15:25:59.874436 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:25:59.876507 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:25:59.878218 systemd[1]: Reached target network-pre.target. Dec 13 15:25:59.883890 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:25:59.889723 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:25:59.890917 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:25:59.900250 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:25:59.908976 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:25:59.910929 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:25:59.916701 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:25:59.917824 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:25:59.922370 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:25:59.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.923572 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:25:59.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.924474 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:25:59.925199 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:25:59.929333 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:25:59.932206 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:25:59.950498 systemd-journald[1017]: Time spent on flushing to /var/log/journal/84129630e37849fba474ebabb6cf4b7a is 69.139ms for 1229 entries. Dec 13 15:25:59.950498 systemd-journald[1017]: System Journal (/var/log/journal/84129630e37849fba474ebabb6cf4b7a) is 8.0M, max 584.8M, 576.8M free. Dec 13 15:26:00.031612 systemd-journald[1017]: Received client request to flush runtime journal. Dec 13 15:25:59.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:25:59.961457 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:25:59.962374 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:25:59.975556 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:25:59.993152 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:25:59.996171 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:26:00.033849 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:26:00.049171 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:26:00.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.126831 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:26:00.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.129910 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:26:00.146240 udevadm[1068]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 15:26:00.635417 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:26:00.645210 kernel: kauditd_printk_skb: 76 callbacks suppressed Dec 13 15:26:00.645430 kernel: audit: type=1130 audit(1734103560.635:116): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.642766 systemd[1]: Starting systemd-udevd.service... Dec 13 15:26:00.675101 systemd-udevd[1069]: Using default interface naming scheme 'v252'. Dec 13 15:26:00.737698 kernel: audit: type=1130 audit(1734103560.726:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.726484 systemd[1]: Started systemd-udevd.service. Dec 13 15:26:00.737050 systemd[1]: Starting systemd-networkd.service... Dec 13 15:26:00.748161 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:26:00.799715 systemd[1]: Found device dev-ttyS0.device. Dec 13 15:26:00.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.825203 systemd[1]: Started systemd-userdbd.service. Dec 13 15:26:00.831688 kernel: audit: type=1130 audit(1734103560.825:118): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.946351 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:26:00.956623 systemd-networkd[1083]: lo: Link UP Dec 13 15:26:00.956637 systemd-networkd[1083]: lo: Gained carrier Dec 13 15:26:00.957553 systemd-networkd[1083]: Enumeration completed Dec 13 15:26:00.967779 kernel: audit: type=1130 audit(1734103560.957:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:00.957745 systemd[1]: Started systemd-networkd.service. Dec 13 15:26:00.959007 systemd-networkd[1083]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:26:00.963072 systemd-networkd[1083]: eth0: Link UP Dec 13 15:26:00.963079 systemd-networkd[1083]: eth0: Gained carrier Dec 13 15:26:00.977893 systemd-networkd[1083]: eth0: DHCPv4 address 10.243.81.46/30, gateway 10.243.81.45 acquired from 10.243.81.45 Dec 13 15:26:00.989681 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 15:26:01.006409 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:26:01.006530 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:26:01.008020 (udev-worker)[1080]: could not read from '/sys/module/acpi_cpufreq/initstate': No such device Dec 13 15:26:01.047000 audit[1081]: AVC avc: denied { confidentiality } for pid=1081 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:26:01.081705 kernel: audit: type=1400 audit(1734103561.047:120): avc: denied { confidentiality } for pid=1081 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:26:01.047000 audit[1081]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5609a7db98b0 a1=337fc a2=7ff4d578cbc5 a3=5 items=110 ppid=1069 pid=1081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:01.126707 kernel: audit: type=1300 audit(1734103561.047:120): arch=c000003e syscall=175 success=yes exit=0 a0=5609a7db98b0 a1=337fc a2=7ff4d578cbc5 a3=5 items=110 ppid=1069 pid=1081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:01.047000 audit: CWD cwd="/" Dec 13 15:26:01.047000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=1 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=2 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=3 name=(null) inode=15937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=4 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=5 name=(null) inode=15938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=6 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=7 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=8 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=9 name=(null) inode=15940 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=10 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.128704 kernel: audit: type=1307 audit(1734103561.047:120): cwd="/" Dec 13 15:26:01.128755 kernel: audit: type=1302 audit(1734103561.047:120): item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.128796 kernel: audit: type=1302 audit(1734103561.047:120): item=1 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.128836 kernel: audit: type=1302 audit(1734103561.047:120): item=2 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=11 name=(null) inode=15941 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=12 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=13 name=(null) inode=15942 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=14 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=15 name=(null) inode=15943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=16 name=(null) inode=15939 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=17 name=(null) inode=15944 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=18 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=19 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=20 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=21 name=(null) inode=15946 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=22 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=23 name=(null) inode=15947 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=24 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=25 name=(null) inode=15948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=26 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=27 name=(null) inode=15949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=28 name=(null) inode=15945 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=29 name=(null) inode=15950 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=30 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=31 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=32 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=33 name=(null) inode=15952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=34 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=35 name=(null) inode=15953 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=36 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=37 name=(null) inode=15954 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=38 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=39 name=(null) inode=15955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=40 name=(null) inode=15951 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=41 name=(null) inode=15956 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=42 name=(null) inode=15936 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=43 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=44 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=45 name=(null) inode=15958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=46 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=47 name=(null) inode=15959 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=48 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=49 name=(null) inode=15960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=50 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=51 name=(null) inode=15961 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=52 name=(null) inode=15957 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=53 name=(null) inode=15962 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=55 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=56 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=57 name=(null) inode=15964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=58 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=59 name=(null) inode=15965 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=60 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=61 name=(null) inode=15966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=62 name=(null) inode=15966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=63 name=(null) inode=15967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=64 name=(null) inode=15966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=65 name=(null) inode=15968 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=66 name=(null) inode=15966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=67 name=(null) inode=15969 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=68 name=(null) inode=15966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=69 name=(null) inode=15970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=70 name=(null) inode=15966 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=71 name=(null) inode=15971 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=72 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=73 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=74 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=75 name=(null) inode=15973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=76 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=77 name=(null) inode=15974 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=78 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=79 name=(null) inode=15975 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=80 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=81 name=(null) inode=15976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=82 name=(null) inode=15972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=83 name=(null) inode=15977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=84 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=85 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=86 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=87 name=(null) inode=15979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=88 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=89 name=(null) inode=15980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=90 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=91 name=(null) inode=15981 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=92 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=93 name=(null) inode=15982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=94 name=(null) inode=15978 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=95 name=(null) inode=15983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=96 name=(null) inode=15963 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=97 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=98 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=99 name=(null) inode=15985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=100 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=101 name=(null) inode=15986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=102 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=103 name=(null) inode=15987 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=104 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=105 name=(null) inode=15988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=106 name=(null) inode=15984 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=107 name=(null) inode=15989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PATH item=109 name=(null) inode=15994 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:26:01.047000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:26:01.141801 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 15:26:01.156974 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 13 15:26:01.157025 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 15:26:01.157309 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 15:26:01.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.289423 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:26:01.292525 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:26:01.317711 lvm[1100]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:26:01.351434 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:26:01.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.352451 systemd[1]: Reached target cryptsetup.target. Dec 13 15:26:01.355583 systemd[1]: Starting lvm2-activation.service... Dec 13 15:26:01.364945 lvm[1102]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:26:01.393579 systemd[1]: Finished lvm2-activation.service. Dec 13 15:26:01.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.394494 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:26:01.395132 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:26:01.395175 systemd[1]: Reached target local-fs.target. Dec 13 15:26:01.395814 systemd[1]: Reached target machines.target. Dec 13 15:26:01.398545 systemd[1]: Starting ldconfig.service... Dec 13 15:26:01.399885 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:26:01.399994 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:01.402016 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:26:01.405010 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:26:01.410524 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:26:01.416190 systemd[1]: Starting systemd-sysext.service... Dec 13 15:26:01.423826 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1105 (bootctl) Dec 13 15:26:01.427457 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:26:01.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.442684 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:26:01.549047 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:26:01.556800 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:26:01.557163 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:26:01.583730 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 15:26:01.589925 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:26:01.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.593904 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:26:01.622931 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:26:01.648702 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 15:26:01.666560 (sd-sysext)[1121]: Using extensions 'kubernetes'. Dec 13 15:26:01.669575 (sd-sysext)[1121]: Merged extensions into '/usr'. Dec 13 15:26:01.676140 systemd-fsck[1117]: fsck.fat 4.2 (2021-01-31) Dec 13 15:26:01.676140 systemd-fsck[1117]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 15:26:01.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.681852 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:26:01.685118 systemd[1]: Mounting boot.mount... Dec 13 15:26:01.720408 systemd[1]: Mounted boot.mount. Dec 13 15:26:01.726198 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:26:01.729196 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:26:01.730514 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:26:01.734970 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:26:01.741371 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:26:01.745448 systemd[1]: Starting modprobe@loop.service... Dec 13 15:26:01.750380 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:26:01.753905 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:01.754097 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:26:01.763315 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:26:01.766965 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:26:01.767340 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:26:01.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.768721 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:26:01.768943 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:26:01.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.770219 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:26:01.770601 systemd[1]: Finished modprobe@loop.service. Dec 13 15:26:01.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.772114 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:26:01.772302 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:26:01.773996 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:26:01.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.775113 systemd[1]: Finished systemd-sysext.service. Dec 13 15:26:01.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:01.781525 systemd[1]: Starting ensure-sysext.service... Dec 13 15:26:01.788605 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:26:01.801766 systemd[1]: Reloading. Dec 13 15:26:01.823986 systemd-tmpfiles[1140]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:26:01.829039 systemd-tmpfiles[1140]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:26:01.836228 systemd-tmpfiles[1140]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:26:01.956479 /usr/lib/systemd/system-generators/torcx-generator[1160]: time="2024-12-13T15:26:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:26:01.957071 /usr/lib/systemd/system-generators/torcx-generator[1160]: time="2024-12-13T15:26:01Z" level=info msg="torcx already run" Dec 13 15:26:02.045697 ldconfig[1104]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:26:02.063962 systemd-networkd[1083]: eth0: Gained IPv6LL Dec 13 15:26:02.112135 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:26:02.112168 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:26:02.143986 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:26:02.220890 systemd[1]: Finished ldconfig.service. Dec 13 15:26:02.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.223114 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:26:02.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.227179 systemd[1]: Starting audit-rules.service... Dec 13 15:26:02.230221 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:26:02.233240 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:26:02.241730 systemd[1]: Starting systemd-resolved.service... Dec 13 15:26:02.245775 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:26:02.250952 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:26:02.253874 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:26:02.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.269779 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.272781 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:26:02.275821 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:26:02.278584 systemd[1]: Starting modprobe@loop.service... Dec 13 15:26:02.279606 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.279847 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:02.280063 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:26:02.287513 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:26:02.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.287796 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:26:02.289233 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.289470 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.289602 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:02.290502 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:26:02.295785 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.297712 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:26:02.301876 systemd[1]: Starting modprobe@drm.service... Dec 13 15:26:02.303977 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.304189 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:02.303000 audit[1224]: SYSTEM_BOOT pid=1224 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.306573 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:26:02.309759 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:26:02.313861 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:26:02.314102 systemd[1]: Finished modprobe@drm.service. Dec 13 15:26:02.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.336740 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:26:02.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.338266 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:26:02.338510 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:26:02.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.342578 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:26:02.342817 systemd[1]: Finished modprobe@loop.service. Dec 13 15:26:02.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.346562 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:26:02.346811 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:26:02.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.352282 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:26:02.352557 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.355061 systemd[1]: Starting systemd-update-done.service... Dec 13 15:26:02.358005 systemd[1]: Finished ensure-sysext.service. Dec 13 15:26:02.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.365197 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:26:02.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.370423 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:26:02.383949 systemd[1]: Finished systemd-update-done.service. Dec 13 15:26:02.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:02.403275 augenrules[1255]: No rules Dec 13 15:26:02.402000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:26:02.402000 audit[1255]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe6a39fea0 a2=420 a3=0 items=0 ppid=1216 pid=1255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:02.402000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:26:02.404128 systemd[1]: Finished audit-rules.service. Dec 13 15:26:02.453041 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:26:02.453973 systemd[1]: Reached target time-set.target. Dec 13 15:26:02.457374 systemd-resolved[1220]: Positive Trust Anchors: Dec 13 15:26:02.457392 systemd-resolved[1220]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:26:02.457429 systemd-resolved[1220]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:26:02.465226 systemd-resolved[1220]: Using system hostname 'srv-nlsfm.gb1.brightbox.com'. Dec 13 15:26:02.467906 systemd[1]: Started systemd-resolved.service. Dec 13 15:26:02.468651 systemd[1]: Reached target network.target. Dec 13 15:26:02.469260 systemd[1]: Reached target network-online.target. Dec 13 15:26:02.469906 systemd[1]: Reached target nss-lookup.target. Dec 13 15:26:02.470559 systemd[1]: Reached target sysinit.target. Dec 13 15:26:02.471279 systemd[1]: Started motdgen.path. Dec 13 15:26:02.471925 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:26:02.472881 systemd[1]: Started logrotate.timer. Dec 13 15:26:02.473596 systemd[1]: Started mdadm.timer. Dec 13 15:26:02.474177 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:26:02.474861 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:26:02.474923 systemd[1]: Reached target paths.target. Dec 13 15:26:02.475513 systemd[1]: Reached target timers.target. Dec 13 15:26:02.476537 systemd[1]: Listening on dbus.socket. Dec 13 15:26:02.479116 systemd[1]: Starting docker.socket... Dec 13 15:26:02.481718 systemd[1]: Listening on sshd.socket. Dec 13 15:26:02.482426 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:02.482852 systemd[1]: Listening on docker.socket. Dec 13 15:26:02.483503 systemd[1]: Reached target sockets.target. Dec 13 15:26:02.484200 systemd[1]: Reached target basic.target. Dec 13 15:26:02.484991 systemd[1]: System is tainted: cgroupsv1 Dec 13 15:26:02.485073 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.485113 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:26:02.486714 systemd[1]: Starting containerd.service... Dec 13 15:26:02.488951 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:26:02.492481 systemd[1]: Starting dbus.service... Dec 13 15:26:02.495186 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:26:02.502174 systemd[1]: Starting extend-filesystems.service... Dec 13 15:26:02.511381 jq[1268]: false Dec 13 15:26:02.503096 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:26:02.506242 systemd[1]: Starting kubelet.service... Dec 13 15:26:02.509028 systemd[1]: Starting motdgen.service... Dec 13 15:26:02.514934 systemd[1]: Starting prepare-helm.service... Dec 13 15:26:02.531267 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:26:02.536808 systemd[1]: Starting sshd-keygen.service... Dec 13 15:26:02.543073 systemd[1]: Starting systemd-logind.service... Dec 13 15:26:02.546799 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:26:02.546955 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 15:26:02.549236 systemd[1]: Starting update-engine.service... Dec 13 15:26:02.554893 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:26:02.608212 jq[1286]: true Dec 13 15:26:02.564775 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:26:02.565155 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:26:02.573132 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:26:02.616588 jq[1292]: true Dec 13 15:26:02.573193 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:26:02.625150 tar[1291]: linux-amd64/helm Dec 13 15:26:02.576306 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:26:02.577636 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:26:02.645466 dbus-daemon[1267]: [system] SELinux support is enabled Dec 13 15:26:02.646836 systemd[1]: Started dbus.service. Dec 13 15:26:02.651074 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:26:02.651111 systemd[1]: Reached target system-config.target. Dec 13 15:26:02.651868 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:26:02.651904 systemd[1]: Reached target user-config.target. Dec 13 15:26:02.657889 extend-filesystems[1269]: Found loop1 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda1 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda2 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda3 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found usr Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda4 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda6 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda7 Dec 13 15:26:02.657889 extend-filesystems[1269]: Found vda9 Dec 13 15:26:02.657889 extend-filesystems[1269]: Checking size of /dev/vda9 Dec 13 15:26:02.696474 dbus-daemon[1267]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1083 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 15:26:02.676279 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:26:02.676680 systemd[1]: Finished motdgen.service. Dec 13 15:26:02.677701 systemd-networkd[1083]: eth0: Ignoring DHCPv6 address 2a02:1348:17c:d44b:24:19ff:fef3:512e/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17c:d44b:24:19ff:fef3:512e/64 assigned by NDisc. Dec 13 15:26:02.677707 systemd-networkd[1083]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Dec 13 15:26:02.701584 systemd[1]: Starting systemd-hostnamed.service... Dec 13 15:26:02.733540 extend-filesystems[1269]: Resized partition /dev/vda9 Dec 13 15:26:02.750152 update_engine[1284]: I1213 15:26:02.749465 1284 main.cc:92] Flatcar Update Engine starting Dec 13 15:26:02.751729 extend-filesystems[1331]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:26:02.765434 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Dec 13 15:26:02.758457 systemd[1]: Started update-engine.service. Dec 13 15:26:02.765727 update_engine[1284]: I1213 15:26:02.758772 1284 update_check_scheduler.cc:74] Next update check in 10m19s Dec 13 15:26:02.764736 systemd[1]: Started locksmithd.service. Dec 13 15:26:02.833142 bash[1332]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:26:02.829861 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:26:02.885121 env[1298]: time="2024-12-13T15:26:02.884312966Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:26:02.893945 systemd-logind[1282]: Watching system buttons on /dev/input/event2 (Power Button) Dec 13 15:26:02.894056 systemd-logind[1282]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 15:26:02.897944 systemd-logind[1282]: New seat seat0. Dec 13 15:26:02.902023 systemd[1]: Started systemd-logind.service. Dec 13 15:26:02.944688 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 13 15:26:02.966878 dbus-daemon[1267]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 15:26:02.979549 env[1298]: time="2024-12-13T15:26:02.978201699Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:26:02.979549 env[1298]: time="2024-12-13T15:26:02.979432066Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:26:02.967064 systemd[1]: Started systemd-hostnamed.service. Dec 13 15:26:02.968767 dbus-daemon[1267]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1328 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 15:26:02.976371 systemd[1]: Starting polkit.service... Dec 13 15:26:02.985293 extend-filesystems[1331]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 15:26:02.985293 extend-filesystems[1331]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 13 15:26:02.985293 extend-filesystems[1331]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 13 15:26:03.000911 extend-filesystems[1269]: Resized filesystem in /dev/vda9 Dec 13 15:26:03.001672 env[1298]: time="2024-12-13T15:26:02.999730051Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:26:03.001672 env[1298]: time="2024-12-13T15:26:03.000233115Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:26:03.001672 env[1298]: time="2024-12-13T15:26:03.001526458Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:26:03.001672 env[1298]: time="2024-12-13T15:26:03.001555002Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:26:03.001672 env[1298]: time="2024-12-13T15:26:03.001575511Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:26:03.001672 env[1298]: time="2024-12-13T15:26:03.001591792Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:26:02.986291 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:26:02.986632 systemd[1]: Finished extend-filesystems.service. Dec 13 15:26:03.004651 polkitd[1338]: Started polkitd version 121 Dec 13 15:26:03.006477 env[1298]: time="2024-12-13T15:26:03.006435409Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:26:03.010266 env[1298]: time="2024-12-13T15:26:03.010208990Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:26:03.011551 env[1298]: time="2024-12-13T15:26:03.011501088Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:26:03.012705 env[1298]: time="2024-12-13T15:26:03.011536921Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:26:03.012795 env[1298]: time="2024-12-13T15:26:03.012706824Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:26:03.012795 env[1298]: time="2024-12-13T15:26:03.012730892Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:26:03.019161 env[1298]: time="2024-12-13T15:26:03.018786071Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:26:03.019161 env[1298]: time="2024-12-13T15:26:03.018940053Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:26:03.019161 env[1298]: time="2024-12-13T15:26:03.019000882Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:26:03.019161 env[1298]: time="2024-12-13T15:26:03.019081966Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019428 env[1298]: time="2024-12-13T15:26:03.019408608Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019483 env[1298]: time="2024-12-13T15:26:03.019436091Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019483 env[1298]: time="2024-12-13T15:26:03.019468562Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019591 env[1298]: time="2024-12-13T15:26:03.019491197Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019591 env[1298]: time="2024-12-13T15:26:03.019511303Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019591 env[1298]: time="2024-12-13T15:26:03.019532502Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019591 env[1298]: time="2024-12-13T15:26:03.019551223Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.019591 env[1298]: time="2024-12-13T15:26:03.019579770Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:26:03.020271 env[1298]: time="2024-12-13T15:26:03.019979691Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022006533Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022484550Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022546170Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022572672Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022709445Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022736185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022763653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022788136Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022808576Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022826672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022844406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022864289Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.022885834Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.023117315Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.024293 env[1298]: time="2024-12-13T15:26:03.023145161Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.023549 polkitd[1338]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 15:26:03.025144 env[1298]: time="2024-12-13T15:26:03.023164601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.025144 env[1298]: time="2024-12-13T15:26:03.023182631Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:26:03.025144 env[1298]: time="2024-12-13T15:26:03.023203568Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:26:03.025144 env[1298]: time="2024-12-13T15:26:03.023220047Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:26:03.025144 env[1298]: time="2024-12-13T15:26:03.023264968Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:26:03.025144 env[1298]: time="2024-12-13T15:26:03.023335677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:26:03.023640 polkitd[1338]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 15:26:03.025539 env[1298]: time="2024-12-13T15:26:03.023574812Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:false] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:26:03.030072 env[1298]: time="2024-12-13T15:26:03.026704975Z" level=info msg="Connect containerd service" Dec 13 15:26:03.030072 env[1298]: time="2024-12-13T15:26:03.026904719Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:26:03.031363 polkitd[1338]: Finished loading, compiling and executing 2 rules Dec 13 15:26:03.032279 env[1298]: time="2024-12-13T15:26:03.032074543Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:26:03.032530 dbus-daemon[1267]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 15:26:03.032803 systemd[1]: Started polkit.service. Dec 13 15:26:03.035155 polkitd[1338]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 15:26:03.035729 env[1298]: time="2024-12-13T15:26:03.035586094Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:26:03.035957 env[1298]: time="2024-12-13T15:26:03.035923479Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:26:03.036152 systemd[1]: Started containerd.service. Dec 13 15:26:03.046106 env[1298]: time="2024-12-13T15:26:03.046053171Z" level=info msg="Start subscribing containerd event" Dec 13 15:26:03.046224 env[1298]: time="2024-12-13T15:26:03.046145053Z" level=info msg="Start recovering state" Dec 13 15:26:03.046321 env[1298]: time="2024-12-13T15:26:03.046284080Z" level=info msg="Start event monitor" Dec 13 15:26:03.046408 env[1298]: time="2024-12-13T15:26:03.046329638Z" level=info msg="Start snapshots syncer" Dec 13 15:26:03.046408 env[1298]: time="2024-12-13T15:26:03.046358405Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:26:03.046408 env[1298]: time="2024-12-13T15:26:03.046373130Z" level=info msg="Start streaming server" Dec 13 15:26:03.048135 env[1298]: time="2024-12-13T15:26:03.048098846Z" level=info msg="containerd successfully booted in 0.178634s" Dec 13 15:26:03.074092 systemd-hostnamed[1328]: Hostname set to (static) Dec 13 15:26:03.593926 tar[1291]: linux-amd64/LICENSE Dec 13 15:26:03.594111 tar[1291]: linux-amd64/README.md Dec 13 15:26:03.603650 systemd[1]: Finished prepare-helm.service. Dec 13 15:26:03.708100 locksmithd[1333]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:26:03.813703 systemd[1]: Created slice system-sshd.slice. Dec 13 15:26:03.970714 systemd[1]: Started kubelet.service. Dec 13 15:26:04.018000 sshd_keygen[1307]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:26:04.045971 systemd[1]: Finished sshd-keygen.service. Dec 13 15:26:04.049277 systemd[1]: Starting issuegen.service... Dec 13 15:26:04.051650 systemd[1]: Started sshd@0-10.243.81.46:22-139.178.68.195:46606.service. Dec 13 15:26:04.071139 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:26:04.071509 systemd[1]: Finished issuegen.service. Dec 13 15:26:04.074944 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:26:04.087423 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:26:04.090384 systemd[1]: Started getty@tty1.service. Dec 13 15:26:04.093594 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 15:26:04.095074 systemd[1]: Reached target getty.target. Dec 13 15:26:04.761797 kubelet[1364]: E1213 15:26:04.761456 1364 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:26:04.765426 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:26:04.765809 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:26:05.576227 systemd-resolved[1220]: Clock change detected. Flushing caches. Dec 13 15:26:05.576627 systemd-timesyncd[1221]: Contacted time server 195.171.43.10:123 (0.flatcar.pool.ntp.org). Dec 13 15:26:05.576786 systemd-timesyncd[1221]: Initial clock synchronization to Fri 2024-12-13 15:26:05.575301 UTC. Dec 13 15:26:05.767396 sshd[1375]: Accepted publickey for core from 139.178.68.195 port 46606 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:05.771143 sshd[1375]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:05.790142 systemd[1]: Created slice user-500.slice. Dec 13 15:26:05.793199 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:26:05.799613 systemd-logind[1282]: New session 1 of user core. Dec 13 15:26:05.814851 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:26:05.818749 systemd[1]: Starting user@500.service... Dec 13 15:26:05.826618 (systemd)[1395]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:05.930975 systemd[1395]: Queued start job for default target default.target. Dec 13 15:26:05.931356 systemd[1395]: Reached target paths.target. Dec 13 15:26:05.931385 systemd[1395]: Reached target sockets.target. Dec 13 15:26:05.931404 systemd[1395]: Reached target timers.target. Dec 13 15:26:05.931422 systemd[1395]: Reached target basic.target. Dec 13 15:26:05.931494 systemd[1395]: Reached target default.target. Dec 13 15:26:05.931549 systemd[1395]: Startup finished in 95ms. Dec 13 15:26:05.932311 systemd[1]: Started user@500.service. Dec 13 15:26:05.935955 systemd[1]: Started session-1.scope. Dec 13 15:26:06.561796 systemd[1]: Started sshd@1-10.243.81.46:22-139.178.68.195:49796.service. Dec 13 15:26:07.451470 sshd[1405]: Accepted publickey for core from 139.178.68.195 port 49796 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:07.454815 sshd[1405]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:07.463041 systemd[1]: Started session-2.scope. Dec 13 15:26:07.464198 systemd-logind[1282]: New session 2 of user core. Dec 13 15:26:08.071448 sshd[1405]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:08.074440 systemd[1]: sshd@1-10.243.81.46:22-139.178.68.195:49796.service: Deactivated successfully. Dec 13 15:26:08.075742 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 15:26:08.075773 systemd-logind[1282]: Session 2 logged out. Waiting for processes to exit. Dec 13 15:26:08.077362 systemd-logind[1282]: Removed session 2. Dec 13 15:26:08.214519 systemd[1]: Started sshd@2-10.243.81.46:22-139.178.68.195:49798.service. Dec 13 15:26:09.100008 sshd[1412]: Accepted publickey for core from 139.178.68.195 port 49798 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:09.101891 sshd[1412]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:09.108558 systemd-logind[1282]: New session 3 of user core. Dec 13 15:26:09.109286 systemd[1]: Started session-3.scope. Dec 13 15:26:09.716892 sshd[1412]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:09.721234 systemd[1]: sshd@2-10.243.81.46:22-139.178.68.195:49798.service: Deactivated successfully. Dec 13 15:26:09.722340 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 15:26:09.723754 systemd-logind[1282]: Session 3 logged out. Waiting for processes to exit. Dec 13 15:26:09.724854 systemd-logind[1282]: Removed session 3. Dec 13 15:26:10.514729 coreos-metadata[1265]: Dec 13 15:26:10.514 WARN failed to locate config-drive, using the metadata service API instead Dec 13 15:26:10.567404 coreos-metadata[1265]: Dec 13 15:26:10.567 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 15:26:10.598170 coreos-metadata[1265]: Dec 13 15:26:10.598 INFO Fetch successful Dec 13 15:26:10.598575 coreos-metadata[1265]: Dec 13 15:26:10.598 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 15:26:10.635240 coreos-metadata[1265]: Dec 13 15:26:10.635 INFO Fetch successful Dec 13 15:26:10.637445 unknown[1265]: wrote ssh authorized keys file for user: core Dec 13 15:26:10.651766 update-ssh-keys[1422]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:26:10.652393 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:26:10.652915 systemd[1]: Reached target multi-user.target. Dec 13 15:26:10.655272 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:26:10.668080 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:26:10.668438 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:26:10.668710 systemd[1]: Startup finished in 7.535s (kernel) + 13.828s (userspace) = 21.363s. Dec 13 15:26:15.804018 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:26:15.804356 systemd[1]: Stopped kubelet.service. Dec 13 15:26:15.806865 systemd[1]: Starting kubelet.service... Dec 13 15:26:15.963894 systemd[1]: Started kubelet.service. Dec 13 15:26:16.056460 kubelet[1435]: E1213 15:26:16.056243 1435 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:26:16.060758 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:26:16.061043 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:26:19.861445 systemd[1]: Started sshd@3-10.243.81.46:22-139.178.68.195:54252.service. Dec 13 15:26:20.766924 sshd[1443]: Accepted publickey for core from 139.178.68.195 port 54252 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:20.768746 sshd[1443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:20.775954 systemd-logind[1282]: New session 4 of user core. Dec 13 15:26:20.776168 systemd[1]: Started session-4.scope. Dec 13 15:26:21.384921 sshd[1443]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:21.389120 systemd[1]: sshd@3-10.243.81.46:22-139.178.68.195:54252.service: Deactivated successfully. Dec 13 15:26:21.390493 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:26:21.391875 systemd-logind[1282]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:26:21.393243 systemd-logind[1282]: Removed session 4. Dec 13 15:26:21.532048 systemd[1]: Started sshd@4-10.243.81.46:22-139.178.68.195:54254.service. Dec 13 15:26:22.425358 sshd[1450]: Accepted publickey for core from 139.178.68.195 port 54254 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:22.427928 sshd[1450]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:22.434773 systemd[1]: Started session-5.scope. Dec 13 15:26:22.435322 systemd-logind[1282]: New session 5 of user core. Dec 13 15:26:23.040386 sshd[1450]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:23.043946 systemd[1]: sshd@4-10.243.81.46:22-139.178.68.195:54254.service: Deactivated successfully. Dec 13 15:26:23.044926 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:26:23.046147 systemd-logind[1282]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:26:23.047249 systemd-logind[1282]: Removed session 5. Dec 13 15:26:23.184764 systemd[1]: Started sshd@5-10.243.81.46:22-139.178.68.195:54264.service. Dec 13 15:26:24.072719 sshd[1457]: Accepted publickey for core from 139.178.68.195 port 54264 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:24.074631 sshd[1457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:24.081792 systemd-logind[1282]: New session 6 of user core. Dec 13 15:26:24.082537 systemd[1]: Started session-6.scope. Dec 13 15:26:24.691725 sshd[1457]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:24.695393 systemd[1]: sshd@5-10.243.81.46:22-139.178.68.195:54264.service: Deactivated successfully. Dec 13 15:26:24.696492 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:26:24.697825 systemd-logind[1282]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:26:24.699149 systemd-logind[1282]: Removed session 6. Dec 13 15:26:24.836234 systemd[1]: Started sshd@6-10.243.81.46:22-139.178.68.195:54278.service. Dec 13 15:26:25.727169 sshd[1464]: Accepted publickey for core from 139.178.68.195 port 54278 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:25.729681 sshd[1464]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:25.736803 systemd[1]: Started session-7.scope. Dec 13 15:26:25.737090 systemd-logind[1282]: New session 7 of user core. Dec 13 15:26:26.214552 sudo[1468]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:26:26.215185 sudo[1468]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:26:26.216369 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:26:26.216727 systemd[1]: Stopped kubelet.service. Dec 13 15:26:26.219605 systemd[1]: Starting kubelet.service... Dec 13 15:26:26.227789 sudo[1468]: pam_unix(sudo:session): session closed for user root Dec 13 15:26:26.228581 dbus-daemon[1267]: \xd0m\xe7]\xb0U: received setenforce notice (enforcing=-80986128) Dec 13 15:26:26.345306 systemd[1]: Started kubelet.service. Dec 13 15:26:26.372542 sshd[1464]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:26.376022 systemd[1]: sshd@6-10.243.81.46:22-139.178.68.195:54278.service: Deactivated successfully. Dec 13 15:26:26.377058 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:26:26.378887 systemd-logind[1282]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:26:26.380433 systemd-logind[1282]: Removed session 7. Dec 13 15:26:26.450989 kubelet[1478]: E1213 15:26:26.450910 1478 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:26:26.453587 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:26:26.453837 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:26:26.519217 systemd[1]: Started sshd@7-10.243.81.46:22-139.178.68.195:51386.service. Dec 13 15:26:27.409906 sshd[1488]: Accepted publickey for core from 139.178.68.195 port 51386 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:27.411880 sshd[1488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:27.419826 systemd[1]: Started session-8.scope. Dec 13 15:26:27.420475 systemd-logind[1282]: New session 8 of user core. Dec 13 15:26:27.887402 sudo[1493]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:26:27.887801 sudo[1493]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:26:27.892537 sudo[1493]: pam_unix(sudo:session): session closed for user root Dec 13 15:26:27.899470 sudo[1492]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:26:27.899927 sudo[1492]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:26:27.913411 systemd[1]: Stopping audit-rules.service... Dec 13 15:26:27.914000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:26:27.918199 kernel: kauditd_printk_skb: 144 callbacks suppressed Dec 13 15:26:27.918410 kernel: audit: type=1305 audit(1734103587.914:155): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:26:27.918970 auditctl[1496]: No rules Dec 13 15:26:27.914000 audit[1496]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7891ea50 a2=420 a3=0 items=0 ppid=1 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:27.933149 kernel: audit: type=1300 audit(1734103587.914:155): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7891ea50 a2=420 a3=0 items=0 ppid=1 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:27.933309 kernel: audit: type=1327 audit(1734103587.914:155): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:26:27.933377 kernel: audit: type=1131 audit(1734103587.928:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.914000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:26:27.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.928930 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:26:27.929517 systemd[1]: Stopped audit-rules.service. Dec 13 15:26:27.933045 systemd[1]: Starting audit-rules.service... Dec 13 15:26:27.961921 augenrules[1514]: No rules Dec 13 15:26:27.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.964407 sudo[1492]: pam_unix(sudo:session): session closed for user root Dec 13 15:26:27.962915 systemd[1]: Finished audit-rules.service. Dec 13 15:26:27.971137 kernel: audit: type=1130 audit(1734103587.962:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.971218 kernel: audit: type=1106 audit(1734103587.963:158): pid=1492 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.963000 audit[1492]: USER_END pid=1492 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.963000 audit[1492]: CRED_DISP pid=1492 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:27.981259 kernel: audit: type=1104 audit(1734103587.963:159): pid=1492 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:28.113523 sshd[1488]: pam_unix(sshd:session): session closed for user core Dec 13 15:26:28.114000 audit[1488]: USER_END pid=1488 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:28.124130 kernel: audit: type=1106 audit(1734103588.114:160): pid=1488 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:28.124697 systemd[1]: sshd@7-10.243.81.46:22-139.178.68.195:51386.service: Deactivated successfully. Dec 13 15:26:28.114000 audit[1488]: CRED_DISP pid=1488 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:28.125724 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:26:28.131135 kernel: audit: type=1104 audit(1734103588.114:161): pid=1488 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:28.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.243.81.46:22-139.178.68.195:51386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:28.131530 systemd-logind[1282]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:26:28.137150 kernel: audit: type=1131 audit(1734103588.124:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.243.81.46:22-139.178.68.195:51386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:28.137824 systemd-logind[1282]: Removed session 8. Dec 13 15:26:28.290185 systemd[1]: Started sshd@8-10.243.81.46:22-139.178.68.195:51400.service. Dec 13 15:26:28.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.243.81.46:22-139.178.68.195:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:29.181000 audit[1521]: USER_ACCT pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:29.182641 sshd[1521]: Accepted publickey for core from 139.178.68.195 port 51400 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:26:29.182000 audit[1521]: CRED_ACQ pid=1521 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:29.183000 audit[1521]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb18e180 a2=3 a3=0 items=0 ppid=1 pid=1521 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:29.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:26:29.185110 sshd[1521]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:26:29.193993 systemd[1]: Started session-9.scope. Dec 13 15:26:29.195888 systemd-logind[1282]: New session 9 of user core. Dec 13 15:26:29.203000 audit[1521]: USER_START pid=1521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:29.206000 audit[1524]: CRED_ACQ pid=1524 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:26:29.658000 audit[1525]: USER_ACCT pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:29.658000 audit[1525]: CRED_REFR pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:29.659708 sudo[1525]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:26:29.660666 sudo[1525]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:26:29.662000 audit[1525]: USER_START pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:26:29.698793 systemd[1]: Starting docker.service... Dec 13 15:26:29.760013 env[1535]: time="2024-12-13T15:26:29.759669210Z" level=info msg="Starting up" Dec 13 15:26:29.767275 env[1535]: time="2024-12-13T15:26:29.762688390Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:26:29.767275 env[1535]: time="2024-12-13T15:26:29.762718515Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:26:29.767275 env[1535]: time="2024-12-13T15:26:29.762763215Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:26:29.767275 env[1535]: time="2024-12-13T15:26:29.762790261Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:26:29.768666 env[1535]: time="2024-12-13T15:26:29.768626078Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:26:29.768792 env[1535]: time="2024-12-13T15:26:29.768764436Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:26:29.768915 env[1535]: time="2024-12-13T15:26:29.768885674Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:26:29.769017 env[1535]: time="2024-12-13T15:26:29.768991800Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:26:29.779572 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3792095732-merged.mount: Deactivated successfully. Dec 13 15:26:29.919088 env[1535]: time="2024-12-13T15:26:29.918960625Z" level=warning msg="Your kernel does not support cgroup blkio weight" Dec 13 15:26:29.919368 env[1535]: time="2024-12-13T15:26:29.919339174Z" level=warning msg="Your kernel does not support cgroup blkio weight_device" Dec 13 15:26:29.919868 env[1535]: time="2024-12-13T15:26:29.919840636Z" level=info msg="Loading containers: start." Dec 13 15:26:30.009000 audit[1567]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.009000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe04110520 a2=0 a3=7ffe0411050c items=0 ppid=1535 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 15:26:30.012000 audit[1569]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.012000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc3da17340 a2=0 a3=7ffc3da1732c items=0 ppid=1535 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 15:26:30.016000 audit[1571]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.016000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff98977620 a2=0 a3=7fff9897760c items=0 ppid=1535 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.016000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:26:30.019000 audit[1573]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.019000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe9bb0e250 a2=0 a3=7ffe9bb0e23c items=0 ppid=1535 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.019000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:26:30.024000 audit[1575]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.024000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe84182ef0 a2=0 a3=7ffe84182edc items=0 ppid=1535 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 15:26:30.044000 audit[1580]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.044000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe361ddff0 a2=0 a3=7ffe361ddfdc items=0 ppid=1535 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.044000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 15:26:30.054000 audit[1582]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.054000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc96550ed0 a2=0 a3=7ffc96550ebc items=0 ppid=1535 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.054000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 15:26:30.057000 audit[1584]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.057000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc27c7c4e0 a2=0 a3=7ffc27c7c4cc items=0 ppid=1535 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 15:26:30.060000 audit[1586]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.060000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd9dd052a0 a2=0 a3=7ffd9dd0528c items=0 ppid=1535 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.060000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:26:30.075000 audit[1590]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.075000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffce63eeab0 a2=0 a3=7ffce63eea9c items=0 ppid=1535 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:26:30.080000 audit[1591]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.080000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff00fdb3c0 a2=0 a3=7fff00fdb3ac items=0 ppid=1535 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.080000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:26:30.096156 kernel: Initializing XFRM netlink socket Dec 13 15:26:30.140662 env[1535]: time="2024-12-13T15:26:30.140560029Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 15:26:30.183000 audit[1599]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.183000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff2a45f980 a2=0 a3=7fff2a45f96c items=0 ppid=1535 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 15:26:30.198000 audit[1602]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.198000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd45def5d0 a2=0 a3=7ffd45def5bc items=0 ppid=1535 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 15:26:30.202000 audit[1605]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.202000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc1415ff10 a2=0 a3=7ffc1415fefc items=0 ppid=1535 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 15:26:30.205000 audit[1607]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.205000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffde5b6fd40 a2=0 a3=7ffde5b6fd2c items=0 ppid=1535 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.205000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 15:26:30.208000 audit[1609]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.208000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcf515f440 a2=0 a3=7ffcf515f42c items=0 ppid=1535 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.208000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 15:26:30.211000 audit[1611]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.211000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd763349d0 a2=0 a3=7ffd763349bc items=0 ppid=1535 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 15:26:30.215000 audit[1613]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.215000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc13cd70a0 a2=0 a3=7ffc13cd708c items=0 ppid=1535 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 15:26:30.227000 audit[1616]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.227000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc985e1d50 a2=0 a3=7ffc985e1d3c items=0 ppid=1535 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 15:26:30.230000 audit[1618]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.230000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd5ad372d0 a2=0 a3=7ffd5ad372bc items=0 ppid=1535 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.230000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:26:30.233000 audit[1620]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.233000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd40a07940 a2=0 a3=7ffd40a0792c items=0 ppid=1535 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:26:30.236000 audit[1622]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.236000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd8fcaf780 a2=0 a3=7ffd8fcaf76c items=0 ppid=1535 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 15:26:30.238869 systemd-networkd[1083]: docker0: Link UP Dec 13 15:26:30.264000 audit[1626]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.264000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf6745740 a2=0 a3=7ffcf674572c items=0 ppid=1535 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:26:30.270000 audit[1627]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:30.270000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd9427d80 a2=0 a3=7ffcd9427d6c items=0 ppid=1535 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:30.270000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:26:30.272958 env[1535]: time="2024-12-13T15:26:30.272916192Z" level=info msg="Loading containers: done." Dec 13 15:26:30.314767 env[1535]: time="2024-12-13T15:26:30.314632569Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 15:26:30.315695 env[1535]: time="2024-12-13T15:26:30.315655303Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 15:26:30.316138 env[1535]: time="2024-12-13T15:26:30.316111670Z" level=info msg="Daemon has completed initialization" Dec 13 15:26:30.335144 systemd[1]: Started docker.service. Dec 13 15:26:30.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:30.346671 env[1535]: time="2024-12-13T15:26:30.346592944Z" level=info msg="API listen on /run/docker.sock" Dec 13 15:26:31.724857 env[1298]: time="2024-12-13T15:26:31.724744213Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 15:26:32.461172 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1776607423.mount: Deactivated successfully. Dec 13 15:26:33.915616 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 15:26:33.915959 kernel: audit: type=1131 audit(1734103593.907:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:33.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:33.908213 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 15:26:35.361655 env[1298]: time="2024-12-13T15:26:35.361543723Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:35.363964 env[1298]: time="2024-12-13T15:26:35.363848901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:35.367846 env[1298]: time="2024-12-13T15:26:35.367773933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:35.373370 env[1298]: time="2024-12-13T15:26:35.373299753Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:35.375491 env[1298]: time="2024-12-13T15:26:35.375411035Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 15:26:35.391040 env[1298]: time="2024-12-13T15:26:35.390990036Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 15:26:36.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:36.705822 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:26:36.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:36.706289 systemd[1]: Stopped kubelet.service. Dec 13 15:26:36.710073 systemd[1]: Starting kubelet.service... Dec 13 15:26:36.718653 kernel: audit: type=1130 audit(1734103596.705:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:36.718777 kernel: audit: type=1131 audit(1734103596.705:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:36.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:36.871380 systemd[1]: Started kubelet.service. Dec 13 15:26:36.877133 kernel: audit: type=1130 audit(1734103596.870:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:37.008384 kubelet[1685]: E1213 15:26:37.008217 1685 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:26:37.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:26:37.010871 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:26:37.011171 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:26:37.017174 kernel: audit: type=1131 audit(1734103597.010:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:26:38.641411 env[1298]: time="2024-12-13T15:26:38.641302477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:38.644265 env[1298]: time="2024-12-13T15:26:38.644224719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:38.646548 env[1298]: time="2024-12-13T15:26:38.646511268Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:38.648846 env[1298]: time="2024-12-13T15:26:38.648812267Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:38.650190 env[1298]: time="2024-12-13T15:26:38.650138644Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 15:26:38.669810 env[1298]: time="2024-12-13T15:26:38.669748487Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 15:26:40.840490 env[1298]: time="2024-12-13T15:26:40.840330253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:40.844389 env[1298]: time="2024-12-13T15:26:40.844328826Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:40.850122 env[1298]: time="2024-12-13T15:26:40.850068146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:40.853170 env[1298]: time="2024-12-13T15:26:40.853129389Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:40.854351 env[1298]: time="2024-12-13T15:26:40.854315134Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 15:26:40.868481 env[1298]: time="2024-12-13T15:26:40.868435371Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 15:26:42.360594 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3222119056.mount: Deactivated successfully. Dec 13 15:26:43.273374 env[1298]: time="2024-12-13T15:26:43.273270946Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:43.275145 env[1298]: time="2024-12-13T15:26:43.275113949Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:43.276922 env[1298]: time="2024-12-13T15:26:43.276879596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:43.278597 env[1298]: time="2024-12-13T15:26:43.278560298Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:43.279357 env[1298]: time="2024-12-13T15:26:43.279298664Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 15:26:43.299074 env[1298]: time="2024-12-13T15:26:43.299004789Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 15:26:43.924733 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1236138850.mount: Deactivated successfully. Dec 13 15:26:45.290444 env[1298]: time="2024-12-13T15:26:45.290358653Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.294260 env[1298]: time="2024-12-13T15:26:45.293030378Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.296130 env[1298]: time="2024-12-13T15:26:45.295250074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.297617 env[1298]: time="2024-12-13T15:26:45.297584288Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.298749 env[1298]: time="2024-12-13T15:26:45.298699818Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 15:26:45.313031 env[1298]: time="2024-12-13T15:26:45.312915843Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 15:26:45.929866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1120163909.mount: Deactivated successfully. Dec 13 15:26:45.940172 env[1298]: time="2024-12-13T15:26:45.940094163Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.942854 env[1298]: time="2024-12-13T15:26:45.942810784Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.945583 env[1298]: time="2024-12-13T15:26:45.945509399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.948553 env[1298]: time="2024-12-13T15:26:45.948489623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:45.949416 env[1298]: time="2024-12-13T15:26:45.949349814Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 15:26:45.965809 env[1298]: time="2024-12-13T15:26:45.965743060Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 15:26:46.635581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4223586215.mount: Deactivated successfully. Dec 13 15:26:47.191306 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 15:26:47.202606 kernel: audit: type=1130 audit(1734103607.190:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:47.202750 kernel: audit: type=1131 audit(1734103607.190:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:47.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:47.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:47.191685 systemd[1]: Stopped kubelet.service. Dec 13 15:26:47.196032 systemd[1]: Starting kubelet.service... Dec 13 15:26:47.431208 kernel: audit: type=1130 audit(1734103607.421:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:47.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:47.422712 systemd[1]: Started kubelet.service. Dec 13 15:26:47.526120 kubelet[1726]: E1213 15:26:47.525771 1726 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:26:47.528385 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:26:47.528694 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:26:47.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:26:47.535203 kernel: audit: type=1131 audit(1734103607.528:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:26:48.319504 update_engine[1284]: I1213 15:26:48.319367 1284 update_attempter.cc:509] Updating boot flags... Dec 13 15:26:50.729121 env[1298]: time="2024-12-13T15:26:50.728997175Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:50.732307 env[1298]: time="2024-12-13T15:26:50.732273420Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:50.736254 env[1298]: time="2024-12-13T15:26:50.736223784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:50.739926 env[1298]: time="2024-12-13T15:26:50.739889998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:50.742545 env[1298]: time="2024-12-13T15:26:50.741383109Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 15:26:54.550570 systemd[1]: Stopped kubelet.service. Dec 13 15:26:54.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:54.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:54.557426 systemd[1]: Starting kubelet.service... Dec 13 15:26:54.560777 kernel: audit: type=1130 audit(1734103614.550:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:54.560932 kernel: audit: type=1131 audit(1734103614.552:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:54.594330 systemd[1]: Reloading. Dec 13 15:26:54.727261 /usr/lib/systemd/system-generators/torcx-generator[1837]: time="2024-12-13T15:26:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:26:54.727312 /usr/lib/systemd/system-generators/torcx-generator[1837]: time="2024-12-13T15:26:54Z" level=info msg="torcx already run" Dec 13 15:26:54.858278 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:26:54.858310 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:26:54.890488 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:26:55.015691 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 15:26:55.015841 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 15:26:55.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:26:55.016801 systemd[1]: Stopped kubelet.service. Dec 13 15:26:55.022188 kernel: audit: type=1130 audit(1734103615.016:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:26:55.025812 systemd[1]: Starting kubelet.service... Dec 13 15:26:55.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:55.455735 systemd[1]: Started kubelet.service. Dec 13 15:26:55.464522 kernel: audit: type=1130 audit(1734103615.456:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:26:55.568020 kubelet[1898]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:26:55.568020 kubelet[1898]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:26:55.568020 kubelet[1898]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:26:55.568849 kubelet[1898]: I1213 15:26:55.568159 1898 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:26:55.932570 kubelet[1898]: I1213 15:26:55.932398 1898 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:26:55.932570 kubelet[1898]: I1213 15:26:55.932452 1898 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:26:55.933364 kubelet[1898]: I1213 15:26:55.933337 1898 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:26:55.965934 kubelet[1898]: I1213 15:26:55.965894 1898 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:26:55.966572 kubelet[1898]: E1213 15:26:55.966520 1898 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.243.81.46:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:55.983472 kubelet[1898]: I1213 15:26:55.983418 1898 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:26:55.985643 kubelet[1898]: I1213 15:26:55.985578 1898 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:26:55.985863 kubelet[1898]: I1213 15:26:55.985829 1898 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:26:55.986233 kubelet[1898]: I1213 15:26:55.985889 1898 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:26:55.986233 kubelet[1898]: I1213 15:26:55.985908 1898 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:26:55.986233 kubelet[1898]: I1213 15:26:55.986094 1898 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:26:55.986417 kubelet[1898]: I1213 15:26:55.986333 1898 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:26:55.986953 kubelet[1898]: I1213 15:26:55.986927 1898 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:26:55.987061 kubelet[1898]: I1213 15:26:55.986989 1898 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:26:55.987061 kubelet[1898]: I1213 15:26:55.987017 1898 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:26:55.987445 kubelet[1898]: W1213 15:26:55.987383 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.243.81.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-nlsfm.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:55.987611 kubelet[1898]: E1213 15:26:55.987583 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.243.81.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-nlsfm.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:55.991381 kubelet[1898]: W1213 15:26:55.990969 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.243.81.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:55.991381 kubelet[1898]: E1213 15:26:55.991033 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.243.81.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:55.991582 kubelet[1898]: I1213 15:26:55.991540 1898 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:26:55.994982 kubelet[1898]: I1213 15:26:55.994948 1898 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:26:55.996611 kubelet[1898]: W1213 15:26:55.996580 1898 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:26:56.000520 kubelet[1898]: I1213 15:26:56.000491 1898 server.go:1256] "Started kubelet" Dec 13 15:26:56.005669 kubelet[1898]: I1213 15:26:56.005644 1898 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:26:56.007172 kubelet[1898]: I1213 15:26:56.007149 1898 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:26:56.009096 kubelet[1898]: I1213 15:26:56.009065 1898 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:26:56.009462 kubelet[1898]: I1213 15:26:56.009423 1898 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:26:56.011125 kubelet[1898]: E1213 15:26:56.011073 1898 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.243.81.46:6443/api/v1/namespaces/default/events\": dial tcp 10.243.81.46:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-nlsfm.gb1.brightbox.com.1810c60d136cee6b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-nlsfm.gb1.brightbox.com,UID:srv-nlsfm.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-nlsfm.gb1.brightbox.com,},FirstTimestamp:2024-12-13 15:26:56.000421483 +0000 UTC m=+0.527988739,LastTimestamp:2024-12-13 15:26:56.000421483 +0000 UTC m=+0.527988739,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-nlsfm.gb1.brightbox.com,}" Dec 13 15:26:56.014538 kubelet[1898]: E1213 15:26:56.014501 1898 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:26:56.014000 audit[1898]: AVC avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:26:56.015174 kubelet[1898]: I1213 15:26:56.015140 1898 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:26:56.015350 kubelet[1898]: I1213 15:26:56.015326 1898 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:26:56.015609 kubelet[1898]: I1213 15:26:56.015587 1898 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:26:56.014000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:26:56.022575 kernel: audit: type=1400 audit(1734103616.014:210): avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:26:56.022665 kernel: audit: type=1401 audit(1734103616.014:210): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:26:56.014000 audit[1898]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00065dd10 a1=c0006c6180 a2=c00065dcb0 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.026881 kubelet[1898]: E1213 15:26:56.026850 1898 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"srv-nlsfm.gb1.brightbox.com\" not found" Dec 13 15:26:56.027077 kubelet[1898]: I1213 15:26:56.027040 1898 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:26:56.027381 kubelet[1898]: I1213 15:26:56.027340 1898 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:26:56.028356 kubelet[1898]: I1213 15:26:56.028334 1898 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:26:56.029066 kubelet[1898]: W1213 15:26:56.029015 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.243.81.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:56.029265 kubelet[1898]: E1213 15:26:56.029241 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.243.81.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:56.031174 kubelet[1898]: I1213 15:26:56.031152 1898 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:26:56.031468 kubelet[1898]: I1213 15:26:56.031430 1898 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:26:56.014000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:26:56.033057 kubelet[1898]: E1213 15:26:56.031480 1898 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.81.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-nlsfm.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.81.46:6443: connect: connection refused" interval="200ms" Dec 13 15:26:56.039074 kernel: audit: type=1300 audit(1734103616.014:210): arch=c000003e syscall=188 success=no exit=-22 a0=c00065dd10 a1=c0006c6180 a2=c00065dcb0 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.039193 kernel: audit: type=1327 audit(1734103616.014:210): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:26:56.039254 kubelet[1898]: I1213 15:26:56.038327 1898 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:26:56.015000 audit[1898]: AVC avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:26:56.015000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:26:56.051149 kernel: audit: type=1400 audit(1734103616.015:211): avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:26:56.051261 kernel: audit: type=1401 audit(1734103616.015:211): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:26:56.015000 audit[1898]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00098cce0 a1=c0006c6198 a2=c00065de60 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.015000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:26:56.020000 audit[1908]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.020000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc8805b230 a2=0 a3=7ffc8805b21c items=0 ppid=1898 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:26:56.023000 audit[1909]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.023000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff38528bc0 a2=0 a3=7fff38528bac items=0 ppid=1898 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:26:56.053000 audit[1912]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.053000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcaa181ef0 a2=0 a3=7ffcaa181edc items=0 ppid=1898 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:26:56.061000 audit[1915]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.061000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd1afda4c0 a2=0 a3=7ffd1afda4ac items=0 ppid=1898 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:26:56.077234 kubelet[1898]: I1213 15:26:56.077200 1898 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:26:56.077234 kubelet[1898]: I1213 15:26:56.077229 1898 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:26:56.078337 kubelet[1898]: I1213 15:26:56.078298 1898 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:26:56.079884 kubelet[1898]: I1213 15:26:56.079848 1898 policy_none.go:49] "None policy: Start" Dec 13 15:26:56.080905 kubelet[1898]: I1213 15:26:56.080877 1898 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:26:56.080997 kubelet[1898]: I1213 15:26:56.080934 1898 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:26:56.081000 audit[1922]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.081000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff6eee1570 a2=0 a3=7fff6eee155c items=0 ppid=1898 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:26:56.082755 kubelet[1898]: I1213 15:26:56.082720 1898 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:26:56.083000 audit[1923]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:26:56.083000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcd6af3b80 a2=0 a3=7ffcd6af3b6c items=0 ppid=1898 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:26:56.084936 kubelet[1898]: I1213 15:26:56.084909 1898 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:26:56.085021 kubelet[1898]: I1213 15:26:56.084968 1898 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:26:56.085021 kubelet[1898]: I1213 15:26:56.085003 1898 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:26:56.085157 kubelet[1898]: E1213 15:26:56.085066 1898 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:26:56.089000 audit[1924]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.089000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcffbdb8a0 a2=0 a3=7ffcffbdb88c items=0 ppid=1898 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:26:56.090818 kubelet[1898]: W1213 15:26:56.090771 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.243.81.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:56.091000 audit[1925]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:26:56.091000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc24b2c480 a2=0 a3=7ffc24b2c46c items=0 ppid=1898 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.091000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:26:56.092391 kubelet[1898]: E1213 15:26:56.092348 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.243.81.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:56.093000 audit[1927]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.093000 audit[1927]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc938e640 a2=0 a3=7ffcc938e62c items=0 ppid=1898 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:26:56.094998 kubelet[1898]: I1213 15:26:56.094972 1898 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:26:56.094000 audit[1898]: AVC avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:26:56.094000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:26:56.094000 audit[1898]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fbb680 a1=c000fbc3f0 a2=c000fbb650 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.094000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:26:56.097000 audit[1929]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:26:56.097000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2b5a9150 a2=0 a3=7fff2b5a913c items=0 ppid=1898 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:26:56.098178 kubelet[1898]: I1213 15:26:56.097974 1898 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:26:56.098455 kubelet[1898]: I1213 15:26:56.098401 1898 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:26:56.102000 audit[1928]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:26:56.102000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff4ca54b00 a2=0 a3=7fff4ca54aec items=0 ppid=1898 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.103454 kubelet[1898]: E1213 15:26:56.103113 1898 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-nlsfm.gb1.brightbox.com\" not found" Dec 13 15:26:56.102000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:26:56.106000 audit[1930]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:26:56.106000 audit[1930]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0434e1d0 a2=0 a3=7ffd0434e1bc items=0 ppid=1898 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:26:56.106000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:26:56.130093 kubelet[1898]: I1213 15:26:56.130066 1898 kubelet_node_status.go:73] "Attempting to register node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.130684 kubelet[1898]: E1213 15:26:56.130663 1898 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.243.81.46:6443/api/v1/nodes\": dial tcp 10.243.81.46:6443: connect: connection refused" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.189970 kubelet[1898]: I1213 15:26:56.186280 1898 topology_manager.go:215] "Topology Admit Handler" podUID="2cbafb8943cc3b936b7ed701951a7522" podNamespace="kube-system" podName="kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.192802 kubelet[1898]: I1213 15:26:56.192776 1898 topology_manager.go:215] "Topology Admit Handler" podUID="e6dc292a8835ade769a0ef0d0e149b47" podNamespace="kube-system" podName="kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.195124 kubelet[1898]: I1213 15:26:56.195072 1898 topology_manager.go:215] "Topology Admit Handler" podUID="fba1771aabcb20e613e62a8a701ad596" podNamespace="kube-system" podName="kube-scheduler-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.234466 kubelet[1898]: E1213 15:26:56.234396 1898 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.81.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-nlsfm.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.81.46:6443: connect: connection refused" interval="400ms" Dec 13 15:26:56.332005 kubelet[1898]: I1213 15:26:56.331875 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-ca-certs\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332005 kubelet[1898]: I1213 15:26:56.331934 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-k8s-certs\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332005 kubelet[1898]: I1213 15:26:56.331975 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2cbafb8943cc3b936b7ed701951a7522-ca-certs\") pod \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" (UID: \"2cbafb8943cc3b936b7ed701951a7522\") " pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332005 kubelet[1898]: I1213 15:26:56.332006 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2cbafb8943cc3b936b7ed701951a7522-k8s-certs\") pod \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" (UID: \"2cbafb8943cc3b936b7ed701951a7522\") " pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332403 kubelet[1898]: I1213 15:26:56.332113 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2cbafb8943cc3b936b7ed701951a7522-usr-share-ca-certificates\") pod \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" (UID: \"2cbafb8943cc3b936b7ed701951a7522\") " pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332403 kubelet[1898]: I1213 15:26:56.332153 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-flexvolume-dir\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332403 kubelet[1898]: I1213 15:26:56.332199 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-kubeconfig\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332403 kubelet[1898]: I1213 15:26:56.332247 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.332403 kubelet[1898]: I1213 15:26:56.332277 1898 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fba1771aabcb20e613e62a8a701ad596-kubeconfig\") pod \"kube-scheduler-srv-nlsfm.gb1.brightbox.com\" (UID: \"fba1771aabcb20e613e62a8a701ad596\") " pod="kube-system/kube-scheduler-srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.334256 kubelet[1898]: I1213 15:26:56.334222 1898 kubelet_node_status.go:73] "Attempting to register node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.334717 kubelet[1898]: E1213 15:26:56.334683 1898 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.243.81.46:6443/api/v1/nodes\": dial tcp 10.243.81.46:6443: connect: connection refused" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.501313 env[1298]: time="2024-12-13T15:26:56.501215259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-nlsfm.gb1.brightbox.com,Uid:2cbafb8943cc3b936b7ed701951a7522,Namespace:kube-system,Attempt:0,}" Dec 13 15:26:56.505772 env[1298]: time="2024-12-13T15:26:56.505434817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-nlsfm.gb1.brightbox.com,Uid:e6dc292a8835ade769a0ef0d0e149b47,Namespace:kube-system,Attempt:0,}" Dec 13 15:26:56.509726 env[1298]: time="2024-12-13T15:26:56.509668701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-nlsfm.gb1.brightbox.com,Uid:fba1771aabcb20e613e62a8a701ad596,Namespace:kube-system,Attempt:0,}" Dec 13 15:26:56.635062 kubelet[1898]: E1213 15:26:56.635014 1898 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.81.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-nlsfm.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.81.46:6443: connect: connection refused" interval="800ms" Dec 13 15:26:56.737882 kubelet[1898]: I1213 15:26:56.737846 1898 kubelet_node_status.go:73] "Attempting to register node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.738262 kubelet[1898]: E1213 15:26:56.738234 1898 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.243.81.46:6443/api/v1/nodes\": dial tcp 10.243.81.46:6443: connect: connection refused" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:56.982767 kubelet[1898]: W1213 15:26:56.982637 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.243.81.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:56.982767 kubelet[1898]: E1213 15:26:56.982726 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.243.81.46:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.123491 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2361289902.mount: Deactivated successfully. Dec 13 15:26:57.130023 env[1298]: time="2024-12-13T15:26:57.129960525Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.133085 env[1298]: time="2024-12-13T15:26:57.133044526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.135078 env[1298]: time="2024-12-13T15:26:57.135041368Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.136123 env[1298]: time="2024-12-13T15:26:57.136074741Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.137208 env[1298]: time="2024-12-13T15:26:57.137176997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.138263 env[1298]: time="2024-12-13T15:26:57.138231520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.139535 env[1298]: time="2024-12-13T15:26:57.139499474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.143056 env[1298]: time="2024-12-13T15:26:57.143022978Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.147268 env[1298]: time="2024-12-13T15:26:57.147230698Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.150191 env[1298]: time="2024-12-13T15:26:57.150158630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.151293 env[1298]: time="2024-12-13T15:26:57.151261474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.152494 env[1298]: time="2024-12-13T15:26:57.152462102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:26:57.204662 kubelet[1898]: W1213 15:26:57.204571 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.243.81.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.204662 kubelet[1898]: E1213 15:26:57.204670 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.243.81.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.206217 env[1298]: time="2024-12-13T15:26:57.205092973Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:26:57.206217 env[1298]: time="2024-12-13T15:26:57.205208499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:26:57.206217 env[1298]: time="2024-12-13T15:26:57.205224807Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:26:57.206217 env[1298]: time="2024-12-13T15:26:57.205475069Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39d49450031ec05b9d87212c36a936e77c080a3db67c91055e937f2501b415a4 pid=1955 runtime=io.containerd.runc.v2 Dec 13 15:26:57.209679 env[1298]: time="2024-12-13T15:26:57.209609228Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:26:57.209781 env[1298]: time="2024-12-13T15:26:57.209697610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:26:57.209845 env[1298]: time="2024-12-13T15:26:57.209783364Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:26:57.210148 env[1298]: time="2024-12-13T15:26:57.210061393Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8760b24b1adbfb0c20faf32f63ce1b7e528de4497376b7c309b6d340c28a272 pid=1946 runtime=io.containerd.runc.v2 Dec 13 15:26:57.212446 env[1298]: time="2024-12-13T15:26:57.212327889Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:26:57.212639 env[1298]: time="2024-12-13T15:26:57.212407851Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:26:57.212639 env[1298]: time="2024-12-13T15:26:57.212599665Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:26:57.213215 env[1298]: time="2024-12-13T15:26:57.213149672Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7b7f08be791c4ac568fc2aa6abedce32e9ebbd1235f56b3460f981b8a03c6df pid=1949 runtime=io.containerd.runc.v2 Dec 13 15:26:57.328240 kubelet[1898]: W1213 15:26:57.327994 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.243.81.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.328240 kubelet[1898]: E1213 15:26:57.328147 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.243.81.46:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.349002 env[1298]: time="2024-12-13T15:26:57.348924109Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-nlsfm.gb1.brightbox.com,Uid:2cbafb8943cc3b936b7ed701951a7522,Namespace:kube-system,Attempt:0,} returns sandbox id \"39d49450031ec05b9d87212c36a936e77c080a3db67c91055e937f2501b415a4\"" Dec 13 15:26:57.358710 kubelet[1898]: W1213 15:26:57.358580 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.243.81.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-nlsfm.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.358940 kubelet[1898]: E1213 15:26:57.358905 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.243.81.46:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-nlsfm.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:57.366442 env[1298]: time="2024-12-13T15:26:57.366385606Z" level=info msg="CreateContainer within sandbox \"39d49450031ec05b9d87212c36a936e77c080a3db67c91055e937f2501b415a4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 15:26:57.393079 env[1298]: time="2024-12-13T15:26:57.393011908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-nlsfm.gb1.brightbox.com,Uid:e6dc292a8835ade769a0ef0d0e149b47,Namespace:kube-system,Attempt:0,} returns sandbox id \"c8760b24b1adbfb0c20faf32f63ce1b7e528de4497376b7c309b6d340c28a272\"" Dec 13 15:26:57.398521 env[1298]: time="2024-12-13T15:26:57.398468339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-nlsfm.gb1.brightbox.com,Uid:fba1771aabcb20e613e62a8a701ad596,Namespace:kube-system,Attempt:0,} returns sandbox id \"b7b7f08be791c4ac568fc2aa6abedce32e9ebbd1235f56b3460f981b8a03c6df\"" Dec 13 15:26:57.400481 env[1298]: time="2024-12-13T15:26:57.400426731Z" level=info msg="CreateContainer within sandbox \"c8760b24b1adbfb0c20faf32f63ce1b7e528de4497376b7c309b6d340c28a272\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 15:26:57.401695 env[1298]: time="2024-12-13T15:26:57.401643216Z" level=info msg="CreateContainer within sandbox \"b7b7f08be791c4ac568fc2aa6abedce32e9ebbd1235f56b3460f981b8a03c6df\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 15:26:57.402631 env[1298]: time="2024-12-13T15:26:57.402591779Z" level=info msg="CreateContainer within sandbox \"39d49450031ec05b9d87212c36a936e77c080a3db67c91055e937f2501b415a4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"a216c19e2d3dff1f1f85a346a982ada09b90dab5ebc41c45bc227835975503e5\"" Dec 13 15:26:57.403562 env[1298]: time="2024-12-13T15:26:57.403502176Z" level=info msg="StartContainer for \"a216c19e2d3dff1f1f85a346a982ada09b90dab5ebc41c45bc227835975503e5\"" Dec 13 15:26:57.416939 env[1298]: time="2024-12-13T15:26:57.416793908Z" level=info msg="CreateContainer within sandbox \"c8760b24b1adbfb0c20faf32f63ce1b7e528de4497376b7c309b6d340c28a272\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"724ce6ce14290b7dd121829d4e077e704cac59d99fe16d94e5f8d9694814e66a\"" Dec 13 15:26:57.417521 env[1298]: time="2024-12-13T15:26:57.417465827Z" level=info msg="StartContainer for \"724ce6ce14290b7dd121829d4e077e704cac59d99fe16d94e5f8d9694814e66a\"" Dec 13 15:26:57.420973 env[1298]: time="2024-12-13T15:26:57.420931952Z" level=info msg="CreateContainer within sandbox \"b7b7f08be791c4ac568fc2aa6abedce32e9ebbd1235f56b3460f981b8a03c6df\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"73824d4f3f8c51e16f0b54c2fcd21d7f08f12056dbcb6626b9c9f29b82d0afd0\"" Dec 13 15:26:57.421658 env[1298]: time="2024-12-13T15:26:57.421622583Z" level=info msg="StartContainer for \"73824d4f3f8c51e16f0b54c2fcd21d7f08f12056dbcb6626b9c9f29b82d0afd0\"" Dec 13 15:26:57.436261 kubelet[1898]: E1213 15:26:57.436221 1898 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.243.81.46:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-nlsfm.gb1.brightbox.com?timeout=10s\": dial tcp 10.243.81.46:6443: connect: connection refused" interval="1.6s" Dec 13 15:26:57.566071 kubelet[1898]: I1213 15:26:57.566011 1898 kubelet_node_status.go:73] "Attempting to register node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:57.566736 kubelet[1898]: E1213 15:26:57.566698 1898 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.243.81.46:6443/api/v1/nodes\": dial tcp 10.243.81.46:6443: connect: connection refused" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:26:57.591092 env[1298]: time="2024-12-13T15:26:57.590948761Z" level=info msg="StartContainer for \"a216c19e2d3dff1f1f85a346a982ada09b90dab5ebc41c45bc227835975503e5\" returns successfully" Dec 13 15:26:57.614555 env[1298]: time="2024-12-13T15:26:57.614382286Z" level=info msg="StartContainer for \"73824d4f3f8c51e16f0b54c2fcd21d7f08f12056dbcb6626b9c9f29b82d0afd0\" returns successfully" Dec 13 15:26:57.637814 env[1298]: time="2024-12-13T15:26:57.637750813Z" level=info msg="StartContainer for \"724ce6ce14290b7dd121829d4e077e704cac59d99fe16d94e5f8d9694814e66a\" returns successfully" Dec 13 15:26:58.128444 kubelet[1898]: E1213 15:26:58.128290 1898 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.243.81.46:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:58.809778 kubelet[1898]: W1213 15:26:58.809685 1898 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.243.81.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:58.809778 kubelet[1898]: E1213 15:26:58.809775 1898 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.243.81.46:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.243.81.46:6443: connect: connection refused Dec 13 15:26:59.172053 kubelet[1898]: I1213 15:26:59.171809 1898 kubelet_node_status.go:73] "Attempting to register node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:00.597157 kubelet[1898]: E1213 15:27:00.597056 1898 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-nlsfm.gb1.brightbox.com\" not found" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:00.658137 kubelet[1898]: I1213 15:27:00.658083 1898 kubelet_node_status.go:76] "Successfully registered node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:00.696558 kubelet[1898]: E1213 15:27:00.696492 1898 event.go:346] "Server rejected event (will not retry!)" err="namespaces \"default\" not found" event="&Event{ObjectMeta:{srv-nlsfm.gb1.brightbox.com.1810c60d136cee6b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-nlsfm.gb1.brightbox.com,UID:srv-nlsfm.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-nlsfm.gb1.brightbox.com,},FirstTimestamp:2024-12-13 15:26:56.000421483 +0000 UTC m=+0.527988739,LastTimestamp:2024-12-13 15:26:56.000421483 +0000 UTC m=+0.527988739,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-nlsfm.gb1.brightbox.com,}" Dec 13 15:27:00.990894 kubelet[1898]: I1213 15:27:00.990838 1898 apiserver.go:52] "Watching apiserver" Dec 13 15:27:01.029072 kubelet[1898]: I1213 15:27:01.028999 1898 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:27:03.231078 kubelet[1898]: W1213 15:27:03.231000 1898 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:27:03.663798 systemd[1]: Reloading. Dec 13 15:27:03.822650 /usr/lib/systemd/system-generators/torcx-generator[2192]: time="2024-12-13T15:27:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:27:03.825005 /usr/lib/systemd/system-generators/torcx-generator[2192]: time="2024-12-13T15:27:03Z" level=info msg="torcx already run" Dec 13 15:27:03.954977 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:27:03.955031 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:27:03.991838 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:27:04.139988 systemd[1]: Stopping kubelet.service... Dec 13 15:27:04.141149 kubelet[1898]: I1213 15:27:04.141119 1898 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:27:04.161930 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:27:04.162587 systemd[1]: Stopped kubelet.service. Dec 13 15:27:04.170161 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 15:27:04.170397 kernel: audit: type=1131 audit(1734103624.161:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:27:04.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:27:04.165758 systemd[1]: Starting kubelet.service... Dec 13 15:27:05.061831 systemd[1]: Started kubelet.service. Dec 13 15:27:05.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:27:05.069301 kernel: audit: type=1130 audit(1734103625.061:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:27:05.248364 kubelet[2251]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:27:05.249304 kubelet[2251]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:27:05.249459 kubelet[2251]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:27:05.249740 kubelet[2251]: I1213 15:27:05.249636 2251 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:27:05.260335 kubelet[2251]: I1213 15:27:05.260307 2251 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 15:27:05.260499 kubelet[2251]: I1213 15:27:05.260476 2251 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:27:05.260839 kubelet[2251]: I1213 15:27:05.260816 2251 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 15:27:05.263068 kubelet[2251]: I1213 15:27:05.263044 2251 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 15:27:05.316388 kubelet[2251]: I1213 15:27:05.315315 2251 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:27:05.347890 kubelet[2251]: I1213 15:27:05.347843 2251 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:27:05.348685 kubelet[2251]: I1213 15:27:05.348655 2251 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:27:05.348928 kubelet[2251]: I1213 15:27:05.348884 2251 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"cgroupfs","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:27:05.349231 kubelet[2251]: I1213 15:27:05.348953 2251 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:27:05.349231 kubelet[2251]: I1213 15:27:05.348979 2251 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:27:05.349231 kubelet[2251]: I1213 15:27:05.349054 2251 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:27:05.369450 kubelet[2251]: I1213 15:27:05.369402 2251 kubelet.go:396] "Attempting to sync node with API server" Dec 13 15:27:05.369804 kubelet[2251]: I1213 15:27:05.369779 2251 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:27:05.369991 kubelet[2251]: I1213 15:27:05.369967 2251 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:27:05.370163 kubelet[2251]: I1213 15:27:05.370139 2251 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:27:05.379273 kubelet[2251]: I1213 15:27:05.376588 2251 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:27:05.379273 kubelet[2251]: I1213 15:27:05.376848 2251 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:27:05.379273 kubelet[2251]: I1213 15:27:05.377479 2251 server.go:1256] "Started kubelet" Dec 13 15:27:05.385000 audit[2251]: AVC avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:05.386676 kubelet[2251]: I1213 15:27:05.386648 2251 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:27:05.386912 kubelet[2251]: I1213 15:27:05.386887 2251 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:27:05.387085 kubelet[2251]: I1213 15:27:05.387063 2251 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:27:05.385000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:27:05.394159 kernel: audit: type=1400 audit(1734103625.385:227): avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:05.394287 kernel: audit: type=1401 audit(1734103625.385:227): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:27:05.385000 audit[2251]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00098d800 a1=c0006e9de8 a2=c00098d7d0 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:05.398880 kubelet[2251]: I1213 15:27:05.398854 2251 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:27:05.400128 kubelet[2251]: I1213 15:27:05.400094 2251 server.go:461] "Adding debug handlers to kubelet server" Dec 13 15:27:05.402135 kernel: audit: type=1300 audit(1734103625.385:227): arch=c000003e syscall=188 success=no exit=-22 a0=c00098d800 a1=c0006e9de8 a2=c00098d7d0 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:05.403233 kernel: audit: type=1327 audit(1734103625.385:227): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:27:05.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:27:05.403897 kubelet[2251]: I1213 15:27:05.403873 2251 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:27:05.404290 kubelet[2251]: I1213 15:27:05.404269 2251 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:27:05.407319 kubelet[2251]: I1213 15:27:05.407296 2251 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:27:05.409732 kubelet[2251]: I1213 15:27:05.409707 2251 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 15:27:05.385000 audit[2251]: AVC avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:05.411350 kubelet[2251]: I1213 15:27:05.411325 2251 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 15:27:05.385000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:27:05.419311 kernel: audit: type=1400 audit(1734103625.385:228): avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:05.419397 kernel: audit: type=1401 audit(1734103625.385:228): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:27:05.419457 kernel: audit: type=1300 audit(1734103625.385:228): arch=c000003e syscall=188 success=no exit=-22 a0=c000341d00 a1=c000bc2000 a2=c00098d890 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:05.385000 audit[2251]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000341d00 a1=c000bc2000 a2=c00098d890 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:05.421036 kubelet[2251]: I1213 15:27:05.420076 2251 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:27:05.424686 kubelet[2251]: I1213 15:27:05.424664 2251 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:27:05.424865 kubelet[2251]: I1213 15:27:05.424842 2251 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:27:05.424990 kubelet[2251]: I1213 15:27:05.424967 2251 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 15:27:05.426295 kubelet[2251]: E1213 15:27:05.426271 2251 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:27:05.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:27:05.433022 kernel: audit: type=1327 audit(1734103625.385:228): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:27:05.506368 kubelet[2251]: I1213 15:27:05.506323 2251 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:27:05.506368 kubelet[2251]: I1213 15:27:05.506352 2251 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:27:05.506626 kubelet[2251]: I1213 15:27:05.506440 2251 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:27:05.532433 kubelet[2251]: E1213 15:27:05.532155 2251 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 15:27:05.555944 kubelet[2251]: I1213 15:27:05.553497 2251 kubelet_node_status.go:73] "Attempting to register node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.564289 kubelet[2251]: I1213 15:27:05.564206 2251 kubelet_node_status.go:112] "Node was previously registered" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.564532 kubelet[2251]: I1213 15:27:05.564477 2251 kubelet_node_status.go:76] "Successfully registered node" node="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.651170 2251 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.651205 2251 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.651249 2251 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.651805 2251 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.651849 2251 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.651873 2251 policy_none.go:49] "None policy: Start" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.652906 2251 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:27:05.653092 kubelet[2251]: I1213 15:27:05.652944 2251 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:27:05.656875 kubelet[2251]: I1213 15:27:05.656178 2251 state_mem.go:75] "Updated machine memory state" Dec 13 15:27:05.658273 kubelet[2251]: I1213 15:27:05.658219 2251 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:27:05.657000 audit[2251]: AVC avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:05.657000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:27:05.657000 audit[2251]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004d7200 a1=c000e1d410 a2=c0004d70b0 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:05.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:27:05.659902 kubelet[2251]: I1213 15:27:05.658337 2251 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:27:05.665179 kubelet[2251]: I1213 15:27:05.665001 2251 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:27:05.733156 kubelet[2251]: I1213 15:27:05.733079 2251 topology_manager.go:215] "Topology Admit Handler" podUID="2cbafb8943cc3b936b7ed701951a7522" podNamespace="kube-system" podName="kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.733367 kubelet[2251]: I1213 15:27:05.733288 2251 topology_manager.go:215] "Topology Admit Handler" podUID="e6dc292a8835ade769a0ef0d0e149b47" podNamespace="kube-system" podName="kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.733367 kubelet[2251]: I1213 15:27:05.733356 2251 topology_manager.go:215] "Topology Admit Handler" podUID="fba1771aabcb20e613e62a8a701ad596" podNamespace="kube-system" podName="kube-scheduler-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.744359 kubelet[2251]: W1213 15:27:05.744318 2251 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:27:05.744503 kubelet[2251]: W1213 15:27:05.744424 2251 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:27:05.744782 kubelet[2251]: W1213 15:27:05.744744 2251 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:27:05.744976 kubelet[2251]: E1213 15:27:05.744947 2251 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" already exists" pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.817620 kubelet[2251]: I1213 15:27:05.817570 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.818012 kubelet[2251]: I1213 15:27:05.817988 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/fba1771aabcb20e613e62a8a701ad596-kubeconfig\") pod \"kube-scheduler-srv-nlsfm.gb1.brightbox.com\" (UID: \"fba1771aabcb20e613e62a8a701ad596\") " pod="kube-system/kube-scheduler-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.818258 kubelet[2251]: I1213 15:27:05.818223 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2cbafb8943cc3b936b7ed701951a7522-ca-certs\") pod \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" (UID: \"2cbafb8943cc3b936b7ed701951a7522\") " pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.818507 kubelet[2251]: I1213 15:27:05.818484 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2cbafb8943cc3b936b7ed701951a7522-k8s-certs\") pod \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" (UID: \"2cbafb8943cc3b936b7ed701951a7522\") " pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.818713 kubelet[2251]: I1213 15:27:05.818691 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-flexvolume-dir\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.818892 kubelet[2251]: I1213 15:27:05.818867 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-kubeconfig\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.819081 kubelet[2251]: I1213 15:27:05.819059 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2cbafb8943cc3b936b7ed701951a7522-usr-share-ca-certificates\") pod \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" (UID: \"2cbafb8943cc3b936b7ed701951a7522\") " pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.819266 kubelet[2251]: I1213 15:27:05.819244 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-ca-certs\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:05.819462 kubelet[2251]: I1213 15:27:05.819439 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e6dc292a8835ade769a0ef0d0e149b47-k8s-certs\") pod \"kube-controller-manager-srv-nlsfm.gb1.brightbox.com\" (UID: \"e6dc292a8835ade769a0ef0d0e149b47\") " pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:06.382445 kubelet[2251]: I1213 15:27:06.382362 2251 apiserver.go:52] "Watching apiserver" Dec 13 15:27:06.410422 kubelet[2251]: I1213 15:27:06.410337 2251 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 15:27:06.609792 kubelet[2251]: W1213 15:27:06.609724 2251 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:27:06.609792 kubelet[2251]: E1213 15:27:06.609825 2251 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-srv-nlsfm.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:06.629868 kubelet[2251]: W1213 15:27:06.629813 2251 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:27:06.630198 kubelet[2251]: E1213 15:27:06.629928 2251 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-srv-nlsfm.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:06.640137 kubelet[2251]: I1213 15:27:06.639904 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-nlsfm.gb1.brightbox.com" podStartSLOduration=1.639846981 podStartE2EDuration="1.639846981s" podCreationTimestamp="2024-12-13 15:27:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:27:06.639156608 +0000 UTC m=+1.542467365" watchObservedRunningTime="2024-12-13 15:27:06.639846981 +0000 UTC m=+1.543157744" Dec 13 15:27:06.698930 kubelet[2251]: I1213 15:27:06.698853 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-nlsfm.gb1.brightbox.com" podStartSLOduration=3.6987933589999997 podStartE2EDuration="3.698793359s" podCreationTimestamp="2024-12-13 15:27:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:27:06.675578467 +0000 UTC m=+1.578889228" watchObservedRunningTime="2024-12-13 15:27:06.698793359 +0000 UTC m=+1.602104120" Dec 13 15:27:09.113363 kubelet[2251]: I1213 15:27:09.113311 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-nlsfm.gb1.brightbox.com" podStartSLOduration=4.113187384 podStartE2EDuration="4.113187384s" podCreationTimestamp="2024-12-13 15:27:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:27:06.699510598 +0000 UTC m=+1.602821355" watchObservedRunningTime="2024-12-13 15:27:09.113187384 +0000 UTC m=+4.016498139" Dec 13 15:27:11.381378 sudo[1525]: pam_unix(sudo:session): session closed for user root Dec 13 15:27:11.381000 audit[1525]: USER_END pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:27:11.383850 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 15:27:11.384000 kernel: audit: type=1106 audit(1734103631.381:230): pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:27:11.382000 audit[1525]: CRED_DISP pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:27:11.395131 kernel: audit: type=1104 audit(1734103631.382:231): pid=1525 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:27:11.530578 sshd[1521]: pam_unix(sshd:session): session closed for user core Dec 13 15:27:11.532000 audit[1521]: USER_END pid=1521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:27:11.535470 systemd[1]: sshd@8-10.243.81.46:22-139.178.68.195:51400.service: Deactivated successfully. Dec 13 15:27:11.543863 kernel: audit: type=1106 audit(1734103631.532:232): pid=1521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:27:11.543335 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:27:11.543340 systemd-logind[1282]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:27:11.545270 systemd-logind[1282]: Removed session 9. Dec 13 15:27:11.532000 audit[1521]: CRED_DISP pid=1521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:27:11.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.243.81.46:22-139.178.68.195:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:27:11.558445 kernel: audit: type=1104 audit(1734103631.532:233): pid=1521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:27:11.558632 kernel: audit: type=1131 audit(1734103631.535:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.243.81.46:22-139.178.68.195:51400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:27:17.167406 kubelet[2251]: I1213 15:27:17.167304 2251 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 15:27:17.169465 env[1298]: time="2024-12-13T15:27:17.169240761Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:27:17.170088 kubelet[2251]: I1213 15:27:17.169595 2251 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 15:27:17.284150 kubelet[2251]: I1213 15:27:17.284087 2251 topology_manager.go:215] "Topology Admit Handler" podUID="538164c3-0022-4c5b-9e57-4539a5bce339" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-s2mkn" Dec 13 15:27:17.300996 kubelet[2251]: I1213 15:27:17.300948 2251 topology_manager.go:215] "Topology Admit Handler" podUID="564c5e4b-1d1b-430e-a1c0-2119aae6324e" podNamespace="kube-system" podName="kube-proxy-8vwxz" Dec 13 15:27:17.303764 kubelet[2251]: I1213 15:27:17.303733 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/538164c3-0022-4c5b-9e57-4539a5bce339-var-lib-calico\") pod \"tigera-operator-c7ccbd65-s2mkn\" (UID: \"538164c3-0022-4c5b-9e57-4539a5bce339\") " pod="tigera-operator/tigera-operator-c7ccbd65-s2mkn" Dec 13 15:27:17.303896 kubelet[2251]: I1213 15:27:17.303807 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9chbs\" (UniqueName: \"kubernetes.io/projected/538164c3-0022-4c5b-9e57-4539a5bce339-kube-api-access-9chbs\") pod \"tigera-operator-c7ccbd65-s2mkn\" (UID: \"538164c3-0022-4c5b-9e57-4539a5bce339\") " pod="tigera-operator/tigera-operator-c7ccbd65-s2mkn" Dec 13 15:27:17.404598 kubelet[2251]: I1213 15:27:17.404524 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/564c5e4b-1d1b-430e-a1c0-2119aae6324e-kube-proxy\") pod \"kube-proxy-8vwxz\" (UID: \"564c5e4b-1d1b-430e-a1c0-2119aae6324e\") " pod="kube-system/kube-proxy-8vwxz" Dec 13 15:27:17.404842 kubelet[2251]: I1213 15:27:17.404678 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dgljk\" (UniqueName: \"kubernetes.io/projected/564c5e4b-1d1b-430e-a1c0-2119aae6324e-kube-api-access-dgljk\") pod \"kube-proxy-8vwxz\" (UID: \"564c5e4b-1d1b-430e-a1c0-2119aae6324e\") " pod="kube-system/kube-proxy-8vwxz" Dec 13 15:27:17.404842 kubelet[2251]: I1213 15:27:17.404751 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/564c5e4b-1d1b-430e-a1c0-2119aae6324e-lib-modules\") pod \"kube-proxy-8vwxz\" (UID: \"564c5e4b-1d1b-430e-a1c0-2119aae6324e\") " pod="kube-system/kube-proxy-8vwxz" Dec 13 15:27:17.404842 kubelet[2251]: I1213 15:27:17.404818 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/564c5e4b-1d1b-430e-a1c0-2119aae6324e-xtables-lock\") pod \"kube-proxy-8vwxz\" (UID: \"564c5e4b-1d1b-430e-a1c0-2119aae6324e\") " pod="kube-system/kube-proxy-8vwxz" Dec 13 15:27:17.614996 env[1298]: time="2024-12-13T15:27:17.614903883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8vwxz,Uid:564c5e4b-1d1b-430e-a1c0-2119aae6324e,Namespace:kube-system,Attempt:0,}" Dec 13 15:27:17.621294 env[1298]: time="2024-12-13T15:27:17.621243607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-s2mkn,Uid:538164c3-0022-4c5b-9e57-4539a5bce339,Namespace:tigera-operator,Attempt:0,}" Dec 13 15:27:17.654062 env[1298]: time="2024-12-13T15:27:17.653474932Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:17.654400 env[1298]: time="2024-12-13T15:27:17.654326077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:17.654400 env[1298]: time="2024-12-13T15:27:17.654367567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:17.656894 env[1298]: time="2024-12-13T15:27:17.656818973Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b992487ced7204b0bb4d62cbc51695fad38841e46185a871e660251d41ae593d pid=2340 runtime=io.containerd.runc.v2 Dec 13 15:27:17.657848 env[1298]: time="2024-12-13T15:27:17.657690810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:17.657937 env[1298]: time="2024-12-13T15:27:17.657860103Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:17.657937 env[1298]: time="2024-12-13T15:27:17.657910182Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:17.658294 env[1298]: time="2024-12-13T15:27:17.658231903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e2232b5fad9c4ed10f81be191afcd9e0ac1eb98a3c1107173f11c0b6eefdb164 pid=2349 runtime=io.containerd.runc.v2 Dec 13 15:27:17.774690 env[1298]: time="2024-12-13T15:27:17.774634105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8vwxz,Uid:564c5e4b-1d1b-430e-a1c0-2119aae6324e,Namespace:kube-system,Attempt:0,} returns sandbox id \"b992487ced7204b0bb4d62cbc51695fad38841e46185a871e660251d41ae593d\"" Dec 13 15:27:17.793555 env[1298]: time="2024-12-13T15:27:17.792807106Z" level=info msg="CreateContainer within sandbox \"b992487ced7204b0bb4d62cbc51695fad38841e46185a871e660251d41ae593d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:27:17.798462 env[1298]: time="2024-12-13T15:27:17.798425211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-s2mkn,Uid:538164c3-0022-4c5b-9e57-4539a5bce339,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e2232b5fad9c4ed10f81be191afcd9e0ac1eb98a3c1107173f11c0b6eefdb164\"" Dec 13 15:27:17.803426 env[1298]: time="2024-12-13T15:27:17.802979693Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 15:27:17.812230 env[1298]: time="2024-12-13T15:27:17.812136512Z" level=info msg="CreateContainer within sandbox \"b992487ced7204b0bb4d62cbc51695fad38841e46185a871e660251d41ae593d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3cc40e787f33a0ac8b443db5619d98d306ed116c4d60229cc0ef183a8e9dd6b1\"" Dec 13 15:27:17.814896 env[1298]: time="2024-12-13T15:27:17.814258404Z" level=info msg="StartContainer for \"3cc40e787f33a0ac8b443db5619d98d306ed116c4d60229cc0ef183a8e9dd6b1\"" Dec 13 15:27:17.895112 env[1298]: time="2024-12-13T15:27:17.893581318Z" level=info msg="StartContainer for \"3cc40e787f33a0ac8b443db5619d98d306ed116c4d60229cc0ef183a8e9dd6b1\" returns successfully" Dec 13 15:27:18.208000 audit[2467]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.216387 kernel: audit: type=1325 audit(1734103638.208:235): table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.214000 audit[2468]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.230584 kernel: audit: type=1325 audit(1734103638.214:236): table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.230784 kernel: audit: type=1300 audit(1734103638.214:236): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc521d00c0 a2=0 a3=7ffc521d00ac items=0 ppid=2427 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.214000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc521d00c0 a2=0 a3=7ffc521d00ac items=0 ppid=2427 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:27:18.215000 audit[2469]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.253344 kernel: audit: type=1327 audit(1734103638.214:236): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:27:18.253454 kernel: audit: type=1325 audit(1734103638.215:237): table=nat:40 family=10 entries=1 op=nft_register_chain pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.215000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec915fa20 a2=0 a3=7ffec915fa0c items=0 ppid=2427 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.261187 kernel: audit: type=1300 audit(1734103638.215:237): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec915fa20 a2=0 a3=7ffec915fa0c items=0 ppid=2427 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:27:18.265139 kernel: audit: type=1327 audit(1734103638.215:237): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:27:18.265226 kernel: audit: type=1300 audit(1734103638.208:235): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd86a2e6b0 a2=0 a3=7ffd86a2e69c items=0 ppid=2427 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.208000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd86a2e6b0 a2=0 a3=7ffd86a2e69c items=0 ppid=2427 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.208000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:27:18.276547 kernel: audit: type=1327 audit(1734103638.208:235): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:27:18.276647 kernel: audit: type=1325 audit(1734103638.217:238): table=nat:41 family=2 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.217000 audit[2471]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.217000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa50edaf0 a2=0 a3=7fffa50edadc items=0 ppid=2427 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:27:18.217000 audit[2470]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.217000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe83441ac0 a2=0 a3=7ffe83441aac items=0 ppid=2427 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:27:18.221000 audit[2472]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.221000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff249760f0 a2=0 a3=7fff249760dc items=0 ppid=2427 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:27:18.329000 audit[2473]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.329000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd1ed51150 a2=0 a3=7ffd1ed5113c items=0 ppid=2427 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:27:18.334000 audit[2475]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.334000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb4397ad0 a2=0 a3=7ffeb4397abc items=0 ppid=2427 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:27:18.342000 audit[2478]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.342000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd0821a760 a2=0 a3=7ffd0821a74c items=0 ppid=2427 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:27:18.343000 audit[2479]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.343000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdac2da640 a2=0 a3=7ffdac2da62c items=0 ppid=2427 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:27:18.347000 audit[2481]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.347000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5ef0f6c0 a2=0 a3=7fff5ef0f6ac items=0 ppid=2427 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:27:18.349000 audit[2482]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.349000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef0104770 a2=0 a3=7ffef010475c items=0 ppid=2427 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:27:18.353000 audit[2484]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.353000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff29c37df0 a2=0 a3=7fff29c37ddc items=0 ppid=2427 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:27:18.358000 audit[2487]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.358000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc8cf99f90 a2=0 a3=7ffc8cf99f7c items=0 ppid=2427 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:27:18.360000 audit[2488]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2488 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.360000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe48ca9600 a2=0 a3=7ffe48ca95ec items=0 ppid=2427 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:27:18.363000 audit[2490]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.363000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc64cf7010 a2=0 a3=7ffc64cf6ffc items=0 ppid=2427 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:27:18.365000 audit[2491]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.365000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcffdc39c0 a2=0 a3=7ffcffdc39ac items=0 ppid=2427 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:27:18.369000 audit[2493]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.369000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb4c4a230 a2=0 a3=7ffdb4c4a21c items=0 ppid=2427 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:27:18.374000 audit[2496]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.374000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8d072340 a2=0 a3=7fff8d07232c items=0 ppid=2427 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:27:18.379000 audit[2499]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.379000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea8af0cc0 a2=0 a3=7ffea8af0cac items=0 ppid=2427 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:27:18.381000 audit[2500]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.381000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe0c46dff0 a2=0 a3=7ffe0c46dfdc items=0 ppid=2427 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:27:18.385000 audit[2502]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.385000 audit[2502]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff37fee550 a2=0 a3=7fff37fee53c items=0 ppid=2427 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.385000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:27:18.391000 audit[2505]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2505 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.391000 audit[2505]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff624bf090 a2=0 a3=7fff624bf07c items=0 ppid=2427 pid=2505 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:27:18.393000 audit[2506]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.393000 audit[2506]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda1f117a0 a2=0 a3=7ffda1f1178c items=0 ppid=2427 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:27:18.397000 audit[2508]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:27:18.397000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd887fb670 a2=0 a3=7ffd887fb65c items=0 ppid=2427 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:27:18.437000 audit[2514]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:18.437000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd2f6cd160 a2=0 a3=7ffd2f6cd14c items=0 ppid=2427 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:18.451000 audit[2514]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2514 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:18.451000 audit[2514]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd2f6cd160 a2=0 a3=7ffd2f6cd14c items=0 ppid=2427 pid=2514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.451000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:18.453000 audit[2520]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2520 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.453000 audit[2520]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffa42ce960 a2=0 a3=7fffa42ce94c items=0 ppid=2427 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:27:18.458000 audit[2522]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2522 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.458000 audit[2522]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff08334d20 a2=0 a3=7fff08334d0c items=0 ppid=2427 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:27:18.464000 audit[2525]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2525 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.464000 audit[2525]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffccaa74670 a2=0 a3=7ffccaa7465c items=0 ppid=2427 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.464000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:27:18.468000 audit[2526]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2526 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.468000 audit[2526]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4bd0ea70 a2=0 a3=7fff4bd0ea5c items=0 ppid=2427 pid=2526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:27:18.472000 audit[2528]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.472000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd36bb24b0 a2=0 a3=7ffd36bb249c items=0 ppid=2427 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:27:18.474000 audit[2529]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.474000 audit[2529]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc00fb3a40 a2=0 a3=7ffc00fb3a2c items=0 ppid=2427 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:27:18.482000 audit[2531]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2531 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.482000 audit[2531]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd015d1760 a2=0 a3=7ffd015d174c items=0 ppid=2427 pid=2531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:27:18.487000 audit[2534]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2534 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.487000 audit[2534]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcc5390e80 a2=0 a3=7ffcc5390e6c items=0 ppid=2427 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:27:18.489000 audit[2535]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2535 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.489000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc935483a0 a2=0 a3=7ffc9354838c items=0 ppid=2427 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.489000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:27:18.493000 audit[2537]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2537 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.493000 audit[2537]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccc6df3b0 a2=0 a3=7ffccc6df39c items=0 ppid=2427 pid=2537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:27:18.495000 audit[2538]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2538 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.495000 audit[2538]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8c45e520 a2=0 a3=7ffd8c45e50c items=0 ppid=2427 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:27:18.500000 audit[2540]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2540 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.500000 audit[2540]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe46d0ffb0 a2=0 a3=7ffe46d0ff9c items=0 ppid=2427 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:27:18.511000 audit[2543]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2543 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.511000 audit[2543]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd062fd900 a2=0 a3=7ffd062fd8ec items=0 ppid=2427 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:27:18.517000 audit[2546]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2546 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.517000 audit[2546]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1e0df8e0 a2=0 a3=7ffd1e0df8cc items=0 ppid=2427 pid=2546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:27:18.519000 audit[2547]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2547 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.519000 audit[2547]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffea72ec850 a2=0 a3=7ffea72ec83c items=0 ppid=2427 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:27:18.524000 audit[2549]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2549 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.524000 audit[2549]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc524cc430 a2=0 a3=7ffc524cc41c items=0 ppid=2427 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:27:18.530000 audit[2552]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2552 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.530000 audit[2552]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdfac6b850 a2=0 a3=7ffdfac6b83c items=0 ppid=2427 pid=2552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:27:18.533000 audit[2553]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2553 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.533000 audit[2553]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc27b44320 a2=0 a3=7ffc27b4430c items=0 ppid=2427 pid=2553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:27:18.537000 audit[2555]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2555 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.537000 audit[2555]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc0d902670 a2=0 a3=7ffc0d90265c items=0 ppid=2427 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:27:18.539000 audit[2556]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2556 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.539000 audit[2556]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde0524a90 a2=0 a3=7ffde0524a7c items=0 ppid=2427 pid=2556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:27:18.542000 audit[2558]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2558 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.542000 audit[2558]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffdbb95b30 a2=0 a3=7fffdbb95b1c items=0 ppid=2427 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:27:18.550000 audit[2561]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2561 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:27:18.550000 audit[2561]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe5981d250 a2=0 a3=7ffe5981d23c items=0 ppid=2427 pid=2561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:27:18.555000 audit[2563]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2563 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:27:18.555000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff5c6b3f40 a2=0 a3=7fff5c6b3f2c items=0 ppid=2427 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.555000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:18.556000 audit[2563]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2563 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:27:18.556000 audit[2563]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff5c6b3f40 a2=0 a3=7fff5c6b3f2c items=0 ppid=2427 pid=2563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:18.556000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:18.648412 kubelet[2251]: I1213 15:27:18.647908 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-8vwxz" podStartSLOduration=1.647747953 podStartE2EDuration="1.647747953s" podCreationTimestamp="2024-12-13 15:27:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:27:18.644449247 +0000 UTC m=+13.547759996" watchObservedRunningTime="2024-12-13 15:27:18.647747953 +0000 UTC m=+13.551058701" Dec 13 15:27:20.693966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3806674041.mount: Deactivated successfully. Dec 13 15:27:22.273000 env[1298]: time="2024-12-13T15:27:22.272834509Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:22.301094 env[1298]: time="2024-12-13T15:27:22.301001210Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:22.315342 env[1298]: time="2024-12-13T15:27:22.315281623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:22.328991 env[1298]: time="2024-12-13T15:27:22.328926879Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:22.329630 env[1298]: time="2024-12-13T15:27:22.329588556Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 15:27:22.334209 env[1298]: time="2024-12-13T15:27:22.333368942Z" level=info msg="CreateContainer within sandbox \"e2232b5fad9c4ed10f81be191afcd9e0ac1eb98a3c1107173f11c0b6eefdb164\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 15:27:22.394690 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount890284404.mount: Deactivated successfully. Dec 13 15:27:22.432145 env[1298]: time="2024-12-13T15:27:22.432057815Z" level=info msg="CreateContainer within sandbox \"e2232b5fad9c4ed10f81be191afcd9e0ac1eb98a3c1107173f11c0b6eefdb164\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7d506a325b4769d6a6ec1b1538d2d99dcc4da3fc9d450bdc9bd5e42e6c04ba82\"" Dec 13 15:27:22.434011 env[1298]: time="2024-12-13T15:27:22.433942097Z" level=info msg="StartContainer for \"7d506a325b4769d6a6ec1b1538d2d99dcc4da3fc9d450bdc9bd5e42e6c04ba82\"" Dec 13 15:27:22.544215 env[1298]: time="2024-12-13T15:27:22.534130216Z" level=info msg="StartContainer for \"7d506a325b4769d6a6ec1b1538d2d99dcc4da3fc9d450bdc9bd5e42e6c04ba82\" returns successfully" Dec 13 15:27:22.652252 kubelet[2251]: I1213 15:27:22.652023 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-s2mkn" podStartSLOduration=1.122901655 podStartE2EDuration="5.651966027s" podCreationTimestamp="2024-12-13 15:27:17 +0000 UTC" firstStartedPulling="2024-12-13 15:27:17.801223548 +0000 UTC m=+12.704534289" lastFinishedPulling="2024-12-13 15:27:22.330287909 +0000 UTC m=+17.233598661" observedRunningTime="2024-12-13 15:27:22.65188327 +0000 UTC m=+17.555194039" watchObservedRunningTime="2024-12-13 15:27:22.651966027 +0000 UTC m=+17.555276775" Dec 13 15:27:25.524152 kernel: kauditd_printk_skb: 143 callbacks suppressed Dec 13 15:27:25.524610 kernel: audit: type=1325 audit(1734103645.520:286): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.520000 audit[2601]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.520000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffde1cee960 a2=0 a3=7ffde1cee94c items=0 ppid=2427 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.535614 kernel: audit: type=1300 audit(1734103645.520:286): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffde1cee960 a2=0 a3=7ffde1cee94c items=0 ppid=2427 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.520000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.542218 kernel: audit: type=1327 audit(1734103645.520:286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.541000 audit[2601]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.548133 kernel: audit: type=1325 audit(1734103645.541:287): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2601 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.541000 audit[2601]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde1cee960 a2=0 a3=0 items=0 ppid=2427 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.558129 kernel: audit: type=1300 audit(1734103645.541:287): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde1cee960 a2=0 a3=0 items=0 ppid=2427 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.563141 kernel: audit: type=1327 audit(1734103645.541:287): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.571000 audit[2603]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.578129 kernel: audit: type=1325 audit(1734103645.571:288): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.571000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc1efe57c0 a2=0 a3=7ffc1efe57ac items=0 ppid=2427 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.589130 kernel: audit: type=1300 audit(1734103645.571:288): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc1efe57c0 a2=0 a3=7ffc1efe57ac items=0 ppid=2427 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.571000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.618137 kernel: audit: type=1327 audit(1734103645.571:288): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.579000 audit[2603]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.579000 audit[2603]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc1efe57c0 a2=0 a3=0 items=0 ppid=2427 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:25.579000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:25.624126 kernel: audit: type=1325 audit(1734103645.579:289): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:25.718432 kubelet[2251]: I1213 15:27:25.718379 2251 topology_manager.go:215] "Topology Admit Handler" podUID="36d292ae-a2e0-4a91-a863-9f7923c9668e" podNamespace="calico-system" podName="calico-typha-65894696cf-kcsbj" Dec 13 15:27:25.770696 kubelet[2251]: I1213 15:27:25.769204 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gp8c5\" (UniqueName: \"kubernetes.io/projected/36d292ae-a2e0-4a91-a863-9f7923c9668e-kube-api-access-gp8c5\") pod \"calico-typha-65894696cf-kcsbj\" (UID: \"36d292ae-a2e0-4a91-a863-9f7923c9668e\") " pod="calico-system/calico-typha-65894696cf-kcsbj" Dec 13 15:27:25.770696 kubelet[2251]: I1213 15:27:25.769268 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/36d292ae-a2e0-4a91-a863-9f7923c9668e-tigera-ca-bundle\") pod \"calico-typha-65894696cf-kcsbj\" (UID: \"36d292ae-a2e0-4a91-a863-9f7923c9668e\") " pod="calico-system/calico-typha-65894696cf-kcsbj" Dec 13 15:27:25.770696 kubelet[2251]: I1213 15:27:25.769327 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/36d292ae-a2e0-4a91-a863-9f7923c9668e-typha-certs\") pod \"calico-typha-65894696cf-kcsbj\" (UID: \"36d292ae-a2e0-4a91-a863-9f7923c9668e\") " pod="calico-system/calico-typha-65894696cf-kcsbj" Dec 13 15:27:25.859777 kubelet[2251]: I1213 15:27:25.859602 2251 topology_manager.go:215] "Topology Admit Handler" podUID="74464f6e-d824-4051-abc7-36796d0f2e7d" podNamespace="calico-system" podName="calico-node-hcxxs" Dec 13 15:27:25.970544 kubelet[2251]: I1213 15:27:25.970486 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-policysync\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.970894 kubelet[2251]: I1213 15:27:25.970862 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-var-run-calico\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.971072 kubelet[2251]: I1213 15:27:25.971050 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/74464f6e-d824-4051-abc7-36796d0f2e7d-tigera-ca-bundle\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.971257 kubelet[2251]: I1213 15:27:25.971235 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/74464f6e-d824-4051-abc7-36796d0f2e7d-node-certs\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.971446 kubelet[2251]: I1213 15:27:25.971415 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-lib-modules\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.971624 kubelet[2251]: I1213 15:27:25.971592 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-xtables-lock\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.971888 kubelet[2251]: I1213 15:27:25.971857 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-cni-bin-dir\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.972061 kubelet[2251]: I1213 15:27:25.972031 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-flexvol-driver-host\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.972281 kubelet[2251]: I1213 15:27:25.972260 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-var-lib-calico\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.972490 kubelet[2251]: I1213 15:27:25.972439 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-cni-log-dir\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.972674 kubelet[2251]: I1213 15:27:25.972645 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-trdc5\" (UniqueName: \"kubernetes.io/projected/74464f6e-d824-4051-abc7-36796d0f2e7d-kube-api-access-trdc5\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:25.972893 kubelet[2251]: I1213 15:27:25.972872 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/74464f6e-d824-4051-abc7-36796d0f2e7d-cni-net-dir\") pod \"calico-node-hcxxs\" (UID: \"74464f6e-d824-4051-abc7-36796d0f2e7d\") " pod="calico-system/calico-node-hcxxs" Dec 13 15:27:26.014517 kubelet[2251]: I1213 15:27:26.014459 2251 topology_manager.go:215] "Topology Admit Handler" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" podNamespace="calico-system" podName="csi-node-driver-w69sr" Dec 13 15:27:26.015535 kubelet[2251]: E1213 15:27:26.015503 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:26.041203 env[1298]: time="2024-12-13T15:27:26.041114192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-65894696cf-kcsbj,Uid:36d292ae-a2e0-4a91-a863-9f7923c9668e,Namespace:calico-system,Attempt:0,}" Dec 13 15:27:26.081776 kubelet[2251]: I1213 15:27:26.081733 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1d292037-b0b7-47ce-be09-23f232570d7c-socket-dir\") pod \"csi-node-driver-w69sr\" (UID: \"1d292037-b0b7-47ce-be09-23f232570d7c\") " pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:26.082041 kubelet[2251]: I1213 15:27:26.082007 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1d292037-b0b7-47ce-be09-23f232570d7c-kubelet-dir\") pod \"csi-node-driver-w69sr\" (UID: \"1d292037-b0b7-47ce-be09-23f232570d7c\") " pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:26.082222 kubelet[2251]: I1213 15:27:26.082199 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tl6wh\" (UniqueName: \"kubernetes.io/projected/1d292037-b0b7-47ce-be09-23f232570d7c-kube-api-access-tl6wh\") pod \"csi-node-driver-w69sr\" (UID: \"1d292037-b0b7-47ce-be09-23f232570d7c\") " pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:26.082520 kubelet[2251]: I1213 15:27:26.082486 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1d292037-b0b7-47ce-be09-23f232570d7c-varrun\") pod \"csi-node-driver-w69sr\" (UID: \"1d292037-b0b7-47ce-be09-23f232570d7c\") " pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:26.082723 kubelet[2251]: I1213 15:27:26.082670 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1d292037-b0b7-47ce-be09-23f232570d7c-registration-dir\") pod \"csi-node-driver-w69sr\" (UID: \"1d292037-b0b7-47ce-be09-23f232570d7c\") " pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:26.108525 kubelet[2251]: E1213 15:27:26.108472 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.108525 kubelet[2251]: W1213 15:27:26.108516 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.108950 kubelet[2251]: E1213 15:27:26.108579 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.126460 kubelet[2251]: E1213 15:27:26.126365 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.126460 kubelet[2251]: W1213 15:27:26.126388 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.126460 kubelet[2251]: E1213 15:27:26.126416 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.129143 env[1298]: time="2024-12-13T15:27:26.129005271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:26.129341 env[1298]: time="2024-12-13T15:27:26.129297365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:26.129534 env[1298]: time="2024-12-13T15:27:26.129475519Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:26.129977 env[1298]: time="2024-12-13T15:27:26.129932383Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5db5cc560ffbc0d44c8424f23a21f7765e70f1cfef5ab67964a28aed406c050 pid=2617 runtime=io.containerd.runc.v2 Dec 13 15:27:26.185273 kubelet[2251]: E1213 15:27:26.184778 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.185273 kubelet[2251]: W1213 15:27:26.184803 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.185273 kubelet[2251]: E1213 15:27:26.184827 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.185273 kubelet[2251]: E1213 15:27:26.185127 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.185273 kubelet[2251]: W1213 15:27:26.185140 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.185273 kubelet[2251]: E1213 15:27:26.185157 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.186129 kubelet[2251]: E1213 15:27:26.185702 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.186129 kubelet[2251]: W1213 15:27:26.185715 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.186129 kubelet[2251]: E1213 15:27:26.185741 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.186591 kubelet[2251]: E1213 15:27:26.186571 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.186718 kubelet[2251]: W1213 15:27:26.186695 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.186856 kubelet[2251]: E1213 15:27:26.186832 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.187617 kubelet[2251]: E1213 15:27:26.187387 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.187617 kubelet[2251]: W1213 15:27:26.187425 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.187617 kubelet[2251]: E1213 15:27:26.187454 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.188170 kubelet[2251]: E1213 15:27:26.188080 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.188170 kubelet[2251]: W1213 15:27:26.188132 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.188378 kubelet[2251]: E1213 15:27:26.188357 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.190118 kubelet[2251]: E1213 15:27:26.188491 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.190118 kubelet[2251]: W1213 15:27:26.188512 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.190307 kubelet[2251]: E1213 15:27:26.190284 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.191260 kubelet[2251]: E1213 15:27:26.191233 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.191260 kubelet[2251]: W1213 15:27:26.191258 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.191883 kubelet[2251]: E1213 15:27:26.191863 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.192259 kubelet[2251]: E1213 15:27:26.192235 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.192362 kubelet[2251]: W1213 15:27:26.192274 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.192495 kubelet[2251]: E1213 15:27:26.192473 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.192947 env[1298]: time="2024-12-13T15:27:26.192900345Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hcxxs,Uid:74464f6e-d824-4051-abc7-36796d0f2e7d,Namespace:calico-system,Attempt:0,}" Dec 13 15:27:26.193224 kubelet[2251]: E1213 15:27:26.193199 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.193319 kubelet[2251]: W1213 15:27:26.193226 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.193479 kubelet[2251]: E1213 15:27:26.193457 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.196264 kubelet[2251]: E1213 15:27:26.196237 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.196264 kubelet[2251]: W1213 15:27:26.196264 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.196482 kubelet[2251]: E1213 15:27:26.196458 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.197598 kubelet[2251]: E1213 15:27:26.197531 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.197598 kubelet[2251]: W1213 15:27:26.197567 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.197779 kubelet[2251]: E1213 15:27:26.197757 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.199121 kubelet[2251]: E1213 15:27:26.199079 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.199121 kubelet[2251]: W1213 15:27:26.199116 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.199327 kubelet[2251]: E1213 15:27:26.199304 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.199448 kubelet[2251]: E1213 15:27:26.199416 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.199448 kubelet[2251]: W1213 15:27:26.199437 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.199659 kubelet[2251]: E1213 15:27:26.199636 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.199794 kubelet[2251]: E1213 15:27:26.199715 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.199918 kubelet[2251]: W1213 15:27:26.199895 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.200148 kubelet[2251]: E1213 15:27:26.200123 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.203959 kubelet[2251]: E1213 15:27:26.203938 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.204148 kubelet[2251]: W1213 15:27:26.204123 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.204536 kubelet[2251]: E1213 15:27:26.204516 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.204948 kubelet[2251]: W1213 15:27:26.204923 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.205417 kubelet[2251]: E1213 15:27:26.205398 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.205573 kubelet[2251]: W1213 15:27:26.205537 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.205720 kubelet[2251]: E1213 15:27:26.205692 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.205797 kubelet[2251]: E1213 15:27:26.205755 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.205865 kubelet[2251]: E1213 15:27:26.205796 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.206152 kubelet[2251]: E1213 15:27:26.206132 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.206281 kubelet[2251]: W1213 15:27:26.206258 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.206451 kubelet[2251]: E1213 15:27:26.206420 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.206770 kubelet[2251]: E1213 15:27:26.206751 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.206970 kubelet[2251]: W1213 15:27:26.206930 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.207721 kubelet[2251]: E1213 15:27:26.207698 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.208071 kubelet[2251]: E1213 15:27:26.208032 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.208354 kubelet[2251]: W1213 15:27:26.208330 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.208644 kubelet[2251]: E1213 15:27:26.208615 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.209239 kubelet[2251]: E1213 15:27:26.209219 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.209429 kubelet[2251]: W1213 15:27:26.209406 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.209913 kubelet[2251]: E1213 15:27:26.209824 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.217078 kubelet[2251]: E1213 15:27:26.217017 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.217342 kubelet[2251]: W1213 15:27:26.217276 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.217654 kubelet[2251]: E1213 15:27:26.217630 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.220356 kubelet[2251]: E1213 15:27:26.220286 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.220728 kubelet[2251]: W1213 15:27:26.220654 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.221353 kubelet[2251]: E1213 15:27:26.221330 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.222679 kubelet[2251]: E1213 15:27:26.222622 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.223173 kubelet[2251]: W1213 15:27:26.223148 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.223445 kubelet[2251]: E1213 15:27:26.223422 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.240051 env[1298]: time="2024-12-13T15:27:26.239858251Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:26.240497 env[1298]: time="2024-12-13T15:27:26.240424032Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:26.240671 env[1298]: time="2024-12-13T15:27:26.240630358Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:26.241785 env[1298]: time="2024-12-13T15:27:26.241717828Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f pid=2679 runtime=io.containerd.runc.v2 Dec 13 15:27:26.247297 kubelet[2251]: E1213 15:27:26.247256 2251 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:27:26.247297 kubelet[2251]: W1213 15:27:26.247293 2251 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:27:26.247554 kubelet[2251]: E1213 15:27:26.247336 2251 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:27:26.407908 env[1298]: time="2024-12-13T15:27:26.407731289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hcxxs,Uid:74464f6e-d824-4051-abc7-36796d0f2e7d,Namespace:calico-system,Attempt:0,} returns sandbox id \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\"" Dec 13 15:27:26.417690 env[1298]: time="2024-12-13T15:27:26.417615004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:27:26.431223 env[1298]: time="2024-12-13T15:27:26.431163552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-65894696cf-kcsbj,Uid:36d292ae-a2e0-4a91-a863-9f7923c9668e,Namespace:calico-system,Attempt:0,} returns sandbox id \"f5db5cc560ffbc0d44c8424f23a21f7765e70f1cfef5ab67964a28aed406c050\"" Dec 13 15:27:26.627000 audit[2722]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:26.627000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffef8563720 a2=0 a3=7ffef856370c items=0 ppid=2427 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:26.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:26.631000 audit[2722]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:26.631000 audit[2722]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffef8563720 a2=0 a3=0 items=0 ppid=2427 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:26.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:27.428620 kubelet[2251]: E1213 15:27:27.428571 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:28.094788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1641579592.mount: Deactivated successfully. Dec 13 15:27:28.319942 env[1298]: time="2024-12-13T15:27:28.319853746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:28.324267 env[1298]: time="2024-12-13T15:27:28.324224013Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:28.327347 env[1298]: time="2024-12-13T15:27:28.327314331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:28.330649 env[1298]: time="2024-12-13T15:27:28.330615383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:28.332457 env[1298]: time="2024-12-13T15:27:28.332420184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:27:28.335813 env[1298]: time="2024-12-13T15:27:28.335358833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 15:27:28.336990 env[1298]: time="2024-12-13T15:27:28.336953400Z" level=info msg="CreateContainer within sandbox \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:27:28.354796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2679186668.mount: Deactivated successfully. Dec 13 15:27:28.389706 env[1298]: time="2024-12-13T15:27:28.389629842Z" level=info msg="CreateContainer within sandbox \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2a183daf471ecaad373d7b637f549dded75e46bcac3932643ac372dcf6738048\"" Dec 13 15:27:28.392194 env[1298]: time="2024-12-13T15:27:28.392157705Z" level=info msg="StartContainer for \"2a183daf471ecaad373d7b637f549dded75e46bcac3932643ac372dcf6738048\"" Dec 13 15:27:28.485156 env[1298]: time="2024-12-13T15:27:28.485086090Z" level=info msg="StartContainer for \"2a183daf471ecaad373d7b637f549dded75e46bcac3932643ac372dcf6738048\" returns successfully" Dec 13 15:27:28.555642 env[1298]: time="2024-12-13T15:27:28.555556223Z" level=info msg="shim disconnected" id=2a183daf471ecaad373d7b637f549dded75e46bcac3932643ac372dcf6738048 Dec 13 15:27:28.556114 env[1298]: time="2024-12-13T15:27:28.556065700Z" level=warning msg="cleaning up after shim disconnected" id=2a183daf471ecaad373d7b637f549dded75e46bcac3932643ac372dcf6738048 namespace=k8s.io Dec 13 15:27:28.556252 env[1298]: time="2024-12-13T15:27:28.556224668Z" level=info msg="cleaning up dead shim" Dec 13 15:27:28.569361 env[1298]: time="2024-12-13T15:27:28.569290028Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:27:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2769 runtime=io.containerd.runc.v2\n" Dec 13 15:27:29.015845 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2a183daf471ecaad373d7b637f549dded75e46bcac3932643ac372dcf6738048-rootfs.mount: Deactivated successfully. Dec 13 15:27:29.425665 kubelet[2251]: E1213 15:27:29.425381 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:31.427172 kubelet[2251]: E1213 15:27:31.426845 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:31.618465 env[1298]: time="2024-12-13T15:27:31.618369260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:31.622078 env[1298]: time="2024-12-13T15:27:31.622045341Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:31.624005 env[1298]: time="2024-12-13T15:27:31.623966202Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:31.628049 env[1298]: time="2024-12-13T15:27:31.628013774Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:31.629179 env[1298]: time="2024-12-13T15:27:31.629097051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 15:27:31.637381 env[1298]: time="2024-12-13T15:27:31.637309470Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:27:31.659533 env[1298]: time="2024-12-13T15:27:31.659475532Z" level=info msg="CreateContainer within sandbox \"f5db5cc560ffbc0d44c8424f23a21f7765e70f1cfef5ab67964a28aed406c050\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 15:27:31.692828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4183829982.mount: Deactivated successfully. Dec 13 15:27:31.699264 env[1298]: time="2024-12-13T15:27:31.699206781Z" level=info msg="CreateContainer within sandbox \"f5db5cc560ffbc0d44c8424f23a21f7765e70f1cfef5ab67964a28aed406c050\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b908b95931e6882635ec3ed4b7afb510c2edc2e5aebc8a5f5fd6ac1c8a22c614\"" Dec 13 15:27:31.700416 env[1298]: time="2024-12-13T15:27:31.700373911Z" level=info msg="StartContainer for \"b908b95931e6882635ec3ed4b7afb510c2edc2e5aebc8a5f5fd6ac1c8a22c614\"" Dec 13 15:27:31.850636 env[1298]: time="2024-12-13T15:27:31.850571013Z" level=info msg="StartContainer for \"b908b95931e6882635ec3ed4b7afb510c2edc2e5aebc8a5f5fd6ac1c8a22c614\" returns successfully" Dec 13 15:27:32.685574 kubelet[2251]: I1213 15:27:32.684963 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-65894696cf-kcsbj" podStartSLOduration=2.489075582 podStartE2EDuration="7.68480129s" podCreationTimestamp="2024-12-13 15:27:25 +0000 UTC" firstStartedPulling="2024-12-13 15:27:26.434208322 +0000 UTC m=+21.337519070" lastFinishedPulling="2024-12-13 15:27:31.629934023 +0000 UTC m=+26.533244778" observedRunningTime="2024-12-13 15:27:32.682384864 +0000 UTC m=+27.585695620" watchObservedRunningTime="2024-12-13 15:27:32.68480129 +0000 UTC m=+27.588112051" Dec 13 15:27:32.735000 audit[2830]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:32.740832 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 15:27:32.741036 kernel: audit: type=1325 audit(1734103652.735:292): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:32.735000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff32620d30 a2=0 a3=7fff32620d1c items=0 ppid=2427 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:32.752533 kernel: audit: type=1300 audit(1734103652.735:292): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff32620d30 a2=0 a3=7fff32620d1c items=0 ppid=2427 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:32.752678 kernel: audit: type=1327 audit(1734103652.735:292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:32.735000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:32.752000 audit[2830]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:32.760131 kernel: audit: type=1325 audit(1734103652.752:293): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:32.760228 kernel: audit: type=1300 audit(1734103652.752:293): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff32620d30 a2=0 a3=7fff32620d1c items=0 ppid=2427 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:32.752000 audit[2830]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff32620d30 a2=0 a3=7fff32620d1c items=0 ppid=2427 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:32.752000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:32.780477 kernel: audit: type=1327 audit(1734103652.752:293): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:33.426429 kubelet[2251]: E1213 15:27:33.426383 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:35.425783 kubelet[2251]: E1213 15:27:35.425691 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:37.427828 kubelet[2251]: E1213 15:27:37.427723 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:38.656764 env[1298]: time="2024-12-13T15:27:38.656642873Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:38.658948 env[1298]: time="2024-12-13T15:27:38.658912360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:38.661350 env[1298]: time="2024-12-13T15:27:38.661318379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:38.663124 env[1298]: time="2024-12-13T15:27:38.663063119Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:38.664253 env[1298]: time="2024-12-13T15:27:38.664206808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:27:38.669794 env[1298]: time="2024-12-13T15:27:38.669750931Z" level=info msg="CreateContainer within sandbox \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:27:38.692343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4127802021.mount: Deactivated successfully. Dec 13 15:27:38.698666 env[1298]: time="2024-12-13T15:27:38.698618536Z" level=info msg="CreateContainer within sandbox \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56\"" Dec 13 15:27:38.700078 env[1298]: time="2024-12-13T15:27:38.699244228Z" level=info msg="StartContainer for \"84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56\"" Dec 13 15:27:38.812234 env[1298]: time="2024-12-13T15:27:38.812179666Z" level=info msg="StartContainer for \"84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56\" returns successfully" Dec 13 15:27:39.554872 kubelet[2251]: E1213 15:27:39.554542 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:39.685171 systemd[1]: run-containerd-runc-k8s.io-84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56-runc.FIV9U6.mount: Deactivated successfully. Dec 13 15:27:39.875739 env[1298]: time="2024-12-13T15:27:39.875553885Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:27:39.903112 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56-rootfs.mount: Deactivated successfully. Dec 13 15:27:39.908226 env[1298]: time="2024-12-13T15:27:39.908172306Z" level=info msg="shim disconnected" id=84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56 Dec 13 15:27:39.908390 env[1298]: time="2024-12-13T15:27:39.908236965Z" level=warning msg="cleaning up after shim disconnected" id=84f89922ac6cf3595583230838a1dc917a85555f50c1a689455fcf21de694d56 namespace=k8s.io Dec 13 15:27:39.908390 env[1298]: time="2024-12-13T15:27:39.908255204Z" level=info msg="cleaning up dead shim" Dec 13 15:27:39.919315 env[1298]: time="2024-12-13T15:27:39.919246881Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:27:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2879 runtime=io.containerd.runc.v2\n" Dec 13 15:27:39.978595 kubelet[2251]: I1213 15:27:39.977497 2251 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:27:40.012703 kubelet[2251]: I1213 15:27:40.012658 2251 topology_manager.go:215] "Topology Admit Handler" podUID="75cd7585-3d93-4389-9c8d-3efde0c081a7" podNamespace="kube-system" podName="coredns-76f75df574-cmbtx" Dec 13 15:27:40.017255 kubelet[2251]: I1213 15:27:40.017222 2251 topology_manager.go:215] "Topology Admit Handler" podUID="4e943bfa-0399-48dd-a990-def40cc80910" podNamespace="calico-system" podName="calico-kube-controllers-6bc4c74bf9-6z4bm" Dec 13 15:27:40.017780 kubelet[2251]: I1213 15:27:40.017757 2251 topology_manager.go:215] "Topology Admit Handler" podUID="4aa72178-d3cd-442a-a144-2b7c73ee25a9" podNamespace="kube-system" podName="coredns-76f75df574-ms5nq" Dec 13 15:27:40.038443 kubelet[2251]: I1213 15:27:40.038403 2251 topology_manager.go:215] "Topology Admit Handler" podUID="f856e181-45df-4e67-b0d6-0f15ff0043ee" podNamespace="calico-apiserver" podName="calico-apiserver-79c4b7b9bd-88j78" Dec 13 15:27:40.038674 kubelet[2251]: I1213 15:27:40.038618 2251 topology_manager.go:215] "Topology Admit Handler" podUID="10ceaf60-95eb-4d04-90bb-0bed37f49bd8" podNamespace="calico-apiserver" podName="calico-apiserver-79c4b7b9bd-wvsnl" Dec 13 15:27:40.056712 kubelet[2251]: I1213 15:27:40.056671 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bhjsz\" (UniqueName: \"kubernetes.io/projected/75cd7585-3d93-4389-9c8d-3efde0c081a7-kube-api-access-bhjsz\") pod \"coredns-76f75df574-cmbtx\" (UID: \"75cd7585-3d93-4389-9c8d-3efde0c081a7\") " pod="kube-system/coredns-76f75df574-cmbtx" Dec 13 15:27:40.057052 kubelet[2251]: I1213 15:27:40.057016 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4e943bfa-0399-48dd-a990-def40cc80910-tigera-ca-bundle\") pod \"calico-kube-controllers-6bc4c74bf9-6z4bm\" (UID: \"4e943bfa-0399-48dd-a990-def40cc80910\") " pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" Dec 13 15:27:40.057243 kubelet[2251]: I1213 15:27:40.057219 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f856e181-45df-4e67-b0d6-0f15ff0043ee-calico-apiserver-certs\") pod \"calico-apiserver-79c4b7b9bd-88j78\" (UID: \"f856e181-45df-4e67-b0d6-0f15ff0043ee\") " pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" Dec 13 15:27:40.057411 kubelet[2251]: I1213 15:27:40.057387 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/75cd7585-3d93-4389-9c8d-3efde0c081a7-config-volume\") pod \"coredns-76f75df574-cmbtx\" (UID: \"75cd7585-3d93-4389-9c8d-3efde0c081a7\") " pod="kube-system/coredns-76f75df574-cmbtx" Dec 13 15:27:40.057580 kubelet[2251]: I1213 15:27:40.057557 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h7jcd\" (UniqueName: \"kubernetes.io/projected/10ceaf60-95eb-4d04-90bb-0bed37f49bd8-kube-api-access-h7jcd\") pod \"calico-apiserver-79c4b7b9bd-wvsnl\" (UID: \"10ceaf60-95eb-4d04-90bb-0bed37f49bd8\") " pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" Dec 13 15:27:40.057740 kubelet[2251]: I1213 15:27:40.057717 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4aa72178-d3cd-442a-a144-2b7c73ee25a9-config-volume\") pod \"coredns-76f75df574-ms5nq\" (UID: \"4aa72178-d3cd-442a-a144-2b7c73ee25a9\") " pod="kube-system/coredns-76f75df574-ms5nq" Dec 13 15:27:40.057908 kubelet[2251]: I1213 15:27:40.057885 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-df9xc\" (UniqueName: \"kubernetes.io/projected/4e943bfa-0399-48dd-a990-def40cc80910-kube-api-access-df9xc\") pod \"calico-kube-controllers-6bc4c74bf9-6z4bm\" (UID: \"4e943bfa-0399-48dd-a990-def40cc80910\") " pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" Dec 13 15:27:40.058082 kubelet[2251]: I1213 15:27:40.058059 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/10ceaf60-95eb-4d04-90bb-0bed37f49bd8-calico-apiserver-certs\") pod \"calico-apiserver-79c4b7b9bd-wvsnl\" (UID: \"10ceaf60-95eb-4d04-90bb-0bed37f49bd8\") " pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" Dec 13 15:27:40.058251 kubelet[2251]: I1213 15:27:40.058228 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8xq6d\" (UniqueName: \"kubernetes.io/projected/4aa72178-d3cd-442a-a144-2b7c73ee25a9-kube-api-access-8xq6d\") pod \"coredns-76f75df574-ms5nq\" (UID: \"4aa72178-d3cd-442a-a144-2b7c73ee25a9\") " pod="kube-system/coredns-76f75df574-ms5nq" Dec 13 15:27:40.058626 kubelet[2251]: I1213 15:27:40.058403 2251 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xsl65\" (UniqueName: \"kubernetes.io/projected/f856e181-45df-4e67-b0d6-0f15ff0043ee-kube-api-access-xsl65\") pod \"calico-apiserver-79c4b7b9bd-88j78\" (UID: \"f856e181-45df-4e67-b0d6-0f15ff0043ee\") " pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" Dec 13 15:27:40.322735 env[1298]: time="2024-12-13T15:27:40.322156337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bc4c74bf9-6z4bm,Uid:4e943bfa-0399-48dd-a990-def40cc80910,Namespace:calico-system,Attempt:0,}" Dec 13 15:27:40.336456 env[1298]: time="2024-12-13T15:27:40.336410276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cmbtx,Uid:75cd7585-3d93-4389-9c8d-3efde0c081a7,Namespace:kube-system,Attempt:0,}" Dec 13 15:27:40.358127 env[1298]: time="2024-12-13T15:27:40.358065520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-88j78,Uid:f856e181-45df-4e67-b0d6-0f15ff0043ee,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:27:40.358893 env[1298]: time="2024-12-13T15:27:40.358808787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ms5nq,Uid:4aa72178-d3cd-442a-a144-2b7c73ee25a9,Namespace:kube-system,Attempt:0,}" Dec 13 15:27:40.359191 env[1298]: time="2024-12-13T15:27:40.359151952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-wvsnl,Uid:10ceaf60-95eb-4d04-90bb-0bed37f49bd8,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:27:40.643049 env[1298]: time="2024-12-13T15:27:40.642146199Z" level=error msg="Failed to destroy network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.644260 env[1298]: time="2024-12-13T15:27:40.644215087Z" level=error msg="encountered an error cleaning up failed sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.644469 env[1298]: time="2024-12-13T15:27:40.644414622Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bc4c74bf9-6z4bm,Uid:4e943bfa-0399-48dd-a990-def40cc80910,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.645626 kubelet[2251]: E1213 15:27:40.645173 2251 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.645626 kubelet[2251]: E1213 15:27:40.645361 2251 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" Dec 13 15:27:40.645626 kubelet[2251]: E1213 15:27:40.645421 2251 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" Dec 13 15:27:40.646796 kubelet[2251]: E1213 15:27:40.645561 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bc4c74bf9-6z4bm_calico-system(4e943bfa-0399-48dd-a990-def40cc80910)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bc4c74bf9-6z4bm_calico-system(4e943bfa-0399-48dd-a990-def40cc80910)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" podUID="4e943bfa-0399-48dd-a990-def40cc80910" Dec 13 15:27:40.654625 env[1298]: time="2024-12-13T15:27:40.654557475Z" level=error msg="Failed to destroy network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.656299 env[1298]: time="2024-12-13T15:27:40.656255231Z" level=error msg="Failed to destroy network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.656892 env[1298]: time="2024-12-13T15:27:40.656850575Z" level=error msg="encountered an error cleaning up failed sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.657222 env[1298]: time="2024-12-13T15:27:40.657173229Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-wvsnl,Uid:10ceaf60-95eb-4d04-90bb-0bed37f49bd8,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.657527 env[1298]: time="2024-12-13T15:27:40.657120308Z" level=error msg="encountered an error cleaning up failed sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.657954 env[1298]: time="2024-12-13T15:27:40.657904357Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-88j78,Uid:f856e181-45df-4e67-b0d6-0f15ff0043ee,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.658094 kubelet[2251]: E1213 15:27:40.657927 2251 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.658094 kubelet[2251]: E1213 15:27:40.657983 2251 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" Dec 13 15:27:40.658341 kubelet[2251]: E1213 15:27:40.658307 2251 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" Dec 13 15:27:40.658441 kubelet[2251]: E1213 15:27:40.658390 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-79c4b7b9bd-wvsnl_calico-apiserver(10ceaf60-95eb-4d04-90bb-0bed37f49bd8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-79c4b7b9bd-wvsnl_calico-apiserver(10ceaf60-95eb-4d04-90bb-0bed37f49bd8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" podUID="10ceaf60-95eb-4d04-90bb-0bed37f49bd8" Dec 13 15:27:40.661428 kubelet[2251]: E1213 15:27:40.660943 2251 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.661428 kubelet[2251]: E1213 15:27:40.661070 2251 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" Dec 13 15:27:40.661428 kubelet[2251]: E1213 15:27:40.661285 2251 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" Dec 13 15:27:40.661655 kubelet[2251]: E1213 15:27:40.661376 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-79c4b7b9bd-88j78_calico-apiserver(f856e181-45df-4e67-b0d6-0f15ff0043ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-79c4b7b9bd-88j78_calico-apiserver(f856e181-45df-4e67-b0d6-0f15ff0043ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" podUID="f856e181-45df-4e67-b0d6-0f15ff0043ee" Dec 13 15:27:40.670563 env[1298]: time="2024-12-13T15:27:40.670507361Z" level=error msg="Failed to destroy network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.671309 env[1298]: time="2024-12-13T15:27:40.671219818Z" level=error msg="encountered an error cleaning up failed sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.672201 env[1298]: time="2024-12-13T15:27:40.672147247Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cmbtx,Uid:75cd7585-3d93-4389-9c8d-3efde0c081a7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.674596 kubelet[2251]: E1213 15:27:40.672638 2251 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.674596 kubelet[2251]: E1213 15:27:40.672714 2251 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cmbtx" Dec 13 15:27:40.674596 kubelet[2251]: E1213 15:27:40.672785 2251 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cmbtx" Dec 13 15:27:40.674849 kubelet[2251]: E1213 15:27:40.672877 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-cmbtx_kube-system(75cd7585-3d93-4389-9c8d-3efde0c081a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-cmbtx_kube-system(75cd7585-3d93-4389-9c8d-3efde0c081a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cmbtx" podUID="75cd7585-3d93-4389-9c8d-3efde0c081a7" Dec 13 15:27:40.680750 env[1298]: time="2024-12-13T15:27:40.680694862Z" level=error msg="Failed to destroy network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.681443 env[1298]: time="2024-12-13T15:27:40.681400927Z" level=error msg="encountered an error cleaning up failed sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.681635 env[1298]: time="2024-12-13T15:27:40.681581448Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ms5nq,Uid:4aa72178-d3cd-442a-a144-2b7c73ee25a9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.693076 kubelet[2251]: E1213 15:27:40.690786 2251 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.693076 kubelet[2251]: E1213 15:27:40.690892 2251 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-ms5nq" Dec 13 15:27:40.693076 kubelet[2251]: E1213 15:27:40.690951 2251 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-ms5nq" Dec 13 15:27:40.693372 kubelet[2251]: E1213 15:27:40.691063 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-ms5nq_kube-system(4aa72178-d3cd-442a-a144-2b7c73ee25a9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-ms5nq_kube-system(4aa72178-d3cd-442a-a144-2b7c73ee25a9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-ms5nq" podUID="4aa72178-d3cd-442a-a144-2b7c73ee25a9" Dec 13 15:27:40.702316 kubelet[2251]: I1213 15:27:40.702266 2251 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:27:40.705693 kubelet[2251]: I1213 15:27:40.705668 2251 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:27:40.710822 kubelet[2251]: I1213 15:27:40.710781 2251 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:27:40.714999 kubelet[2251]: I1213 15:27:40.714954 2251 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:27:40.717962 kubelet[2251]: I1213 15:27:40.717912 2251 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:27:40.722665 env[1298]: time="2024-12-13T15:27:40.722600117Z" level=info msg="StopPodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\"" Dec 13 15:27:40.723598 env[1298]: time="2024-12-13T15:27:40.723200409Z" level=info msg="StopPodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\"" Dec 13 15:27:40.723868 env[1298]: time="2024-12-13T15:27:40.723826760Z" level=info msg="StopPodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\"" Dec 13 15:27:40.724363 env[1298]: time="2024-12-13T15:27:40.724270247Z" level=info msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" Dec 13 15:27:40.724756 env[1298]: time="2024-12-13T15:27:40.724723222Z" level=info msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" Dec 13 15:27:40.729813 env[1298]: time="2024-12-13T15:27:40.728352659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:27:40.820796 env[1298]: time="2024-12-13T15:27:40.820722336Z" level=error msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" failed" error="failed to destroy network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.821535 kubelet[2251]: E1213 15:27:40.821348 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:27:40.822810 kubelet[2251]: E1213 15:27:40.822650 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6"} Dec 13 15:27:40.822810 kubelet[2251]: E1213 15:27:40.822709 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f856e181-45df-4e67-b0d6-0f15ff0043ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:40.822810 kubelet[2251]: E1213 15:27:40.822772 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f856e181-45df-4e67-b0d6-0f15ff0043ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" podUID="f856e181-45df-4e67-b0d6-0f15ff0043ee" Dec 13 15:27:40.856302 env[1298]: time="2024-12-13T15:27:40.856198843Z" level=error msg="StopPodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" failed" error="failed to destroy network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.856980 kubelet[2251]: E1213 15:27:40.856773 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:27:40.856980 kubelet[2251]: E1213 15:27:40.856828 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8"} Dec 13 15:27:40.856980 kubelet[2251]: E1213 15:27:40.856875 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"75cd7585-3d93-4389-9c8d-3efde0c081a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:40.856980 kubelet[2251]: E1213 15:27:40.856917 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"75cd7585-3d93-4389-9c8d-3efde0c081a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cmbtx" podUID="75cd7585-3d93-4389-9c8d-3efde0c081a7" Dec 13 15:27:40.857620 env[1298]: time="2024-12-13T15:27:40.857578268Z" level=error msg="StopPodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" failed" error="failed to destroy network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.858217 kubelet[2251]: E1213 15:27:40.857872 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:27:40.858217 kubelet[2251]: E1213 15:27:40.857905 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb"} Dec 13 15:27:40.860553 kubelet[2251]: E1213 15:27:40.858734 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4aa72178-d3cd-442a-a144-2b7c73ee25a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:40.860553 kubelet[2251]: E1213 15:27:40.858941 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4aa72178-d3cd-442a-a144-2b7c73ee25a9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-ms5nq" podUID="4aa72178-d3cd-442a-a144-2b7c73ee25a9" Dec 13 15:27:40.881958 env[1298]: time="2024-12-13T15:27:40.881871340Z" level=error msg="StopPodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" failed" error="failed to destroy network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.883056 kubelet[2251]: E1213 15:27:40.883022 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:27:40.883265 kubelet[2251]: E1213 15:27:40.883241 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9"} Dec 13 15:27:40.883469 kubelet[2251]: E1213 15:27:40.883444 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"10ceaf60-95eb-4d04-90bb-0bed37f49bd8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:40.883676 kubelet[2251]: E1213 15:27:40.883654 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"10ceaf60-95eb-4d04-90bb-0bed37f49bd8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" podUID="10ceaf60-95eb-4d04-90bb-0bed37f49bd8" Dec 13 15:27:40.892890 env[1298]: time="2024-12-13T15:27:40.892813569Z" level=error msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" failed" error="failed to destroy network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:40.895744 kubelet[2251]: E1213 15:27:40.893301 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:27:40.895744 kubelet[2251]: E1213 15:27:40.893362 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8"} Dec 13 15:27:40.895744 kubelet[2251]: E1213 15:27:40.893416 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e943bfa-0399-48dd-a990-def40cc80910\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:40.895744 kubelet[2251]: E1213 15:27:40.893465 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e943bfa-0399-48dd-a990-def40cc80910\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" podUID="4e943bfa-0399-48dd-a990-def40cc80910" Dec 13 15:27:41.431678 env[1298]: time="2024-12-13T15:27:41.431575399Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w69sr,Uid:1d292037-b0b7-47ce-be09-23f232570d7c,Namespace:calico-system,Attempt:0,}" Dec 13 15:27:41.522898 env[1298]: time="2024-12-13T15:27:41.522825882Z" level=error msg="Failed to destroy network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:41.529864 env[1298]: time="2024-12-13T15:27:41.524449233Z" level=error msg="encountered an error cleaning up failed sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:41.529864 env[1298]: time="2024-12-13T15:27:41.524520214Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w69sr,Uid:1d292037-b0b7-47ce-be09-23f232570d7c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:41.526995 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f-shm.mount: Deactivated successfully. Dec 13 15:27:41.530826 kubelet[2251]: E1213 15:27:41.524847 2251 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:41.530826 kubelet[2251]: E1213 15:27:41.524923 2251 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:41.530826 kubelet[2251]: E1213 15:27:41.524961 2251 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-w69sr" Dec 13 15:27:41.531056 kubelet[2251]: E1213 15:27:41.525043 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-w69sr_calico-system(1d292037-b0b7-47ce-be09-23f232570d7c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-w69sr_calico-system(1d292037-b0b7-47ce-be09-23f232570d7c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:41.734136 kubelet[2251]: I1213 15:27:41.734041 2251 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:27:41.735257 env[1298]: time="2024-12-13T15:27:41.735214099Z" level=info msg="StopPodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\"" Dec 13 15:27:41.775542 env[1298]: time="2024-12-13T15:27:41.775443714Z" level=error msg="StopPodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" failed" error="failed to destroy network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:41.776224 kubelet[2251]: E1213 15:27:41.775946 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:27:41.776224 kubelet[2251]: E1213 15:27:41.776030 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f"} Dec 13 15:27:41.776224 kubelet[2251]: E1213 15:27:41.776121 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1d292037-b0b7-47ce-be09-23f232570d7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:41.776224 kubelet[2251]: E1213 15:27:41.776175 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1d292037-b0b7-47ce-be09-23f232570d7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-w69sr" podUID="1d292037-b0b7-47ce-be09-23f232570d7c" Dec 13 15:27:51.429500 env[1298]: time="2024-12-13T15:27:51.429282161Z" level=info msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" Dec 13 15:27:51.505626 env[1298]: time="2024-12-13T15:27:51.505474283Z" level=error msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" failed" error="failed to destroy network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:51.506877 kubelet[2251]: E1213 15:27:51.506794 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:27:51.507916 kubelet[2251]: E1213 15:27:51.507086 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6"} Dec 13 15:27:51.507916 kubelet[2251]: E1213 15:27:51.507219 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f856e181-45df-4e67-b0d6-0f15ff0043ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:51.507916 kubelet[2251]: E1213 15:27:51.507425 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f856e181-45df-4e67-b0d6-0f15ff0043ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" podUID="f856e181-45df-4e67-b0d6-0f15ff0043ee" Dec 13 15:27:52.405846 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3554439737.mount: Deactivated successfully. Dec 13 15:27:52.428207 env[1298]: time="2024-12-13T15:27:52.428140485Z" level=info msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" Dec 13 15:27:52.473774 env[1298]: time="2024-12-13T15:27:52.473713828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:52.479897 env[1298]: time="2024-12-13T15:27:52.479857429Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:52.483852 env[1298]: time="2024-12-13T15:27:52.483798119Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:52.485499 env[1298]: time="2024-12-13T15:27:52.485465777Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:27:52.486267 env[1298]: time="2024-12-13T15:27:52.486231704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:27:52.524641 env[1298]: time="2024-12-13T15:27:52.524584205Z" level=info msg="CreateContainer within sandbox \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:27:52.539981 env[1298]: time="2024-12-13T15:27:52.539873681Z" level=error msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" failed" error="failed to destroy network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:27:52.540429 kubelet[2251]: E1213 15:27:52.540385 2251 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:27:52.541005 kubelet[2251]: E1213 15:27:52.540472 2251 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8"} Dec 13 15:27:52.541005 kubelet[2251]: E1213 15:27:52.540564 2251 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4e943bfa-0399-48dd-a990-def40cc80910\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:27:52.541005 kubelet[2251]: E1213 15:27:52.540688 2251 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4e943bfa-0399-48dd-a990-def40cc80910\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" podUID="4e943bfa-0399-48dd-a990-def40cc80910" Dec 13 15:27:52.555519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2743169410.mount: Deactivated successfully. Dec 13 15:27:52.562287 env[1298]: time="2024-12-13T15:27:52.562242419Z" level=info msg="CreateContainer within sandbox \"82b7d86202d1c1f5a395a5b94f982bfe2dca0a76f46ea352624c18488a57e42f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c\"" Dec 13 15:27:52.563534 env[1298]: time="2024-12-13T15:27:52.563502819Z" level=info msg="StartContainer for \"c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c\"" Dec 13 15:27:52.704558 env[1298]: time="2024-12-13T15:27:52.704446586Z" level=info msg="StartContainer for \"c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c\" returns successfully" Dec 13 15:27:53.052350 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:27:53.052684 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:27:53.427143 env[1298]: time="2024-12-13T15:27:53.427045738Z" level=info msg="StopPodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\"" Dec 13 15:27:53.596695 kubelet[2251]: I1213 15:27:53.596589 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hcxxs" podStartSLOduration=2.5196663299999997 podStartE2EDuration="28.591057416s" podCreationTimestamp="2024-12-13 15:27:25 +0000 UTC" firstStartedPulling="2024-12-13 15:27:26.415505515 +0000 UTC m=+21.318816260" lastFinishedPulling="2024-12-13 15:27:52.486896592 +0000 UTC m=+47.390207346" observedRunningTime="2024-12-13 15:27:52.826060707 +0000 UTC m=+47.729371468" watchObservedRunningTime="2024-12-13 15:27:53.591057416 +0000 UTC m=+48.494368175" Dec 13 15:27:53.812819 systemd[1]: run-containerd-runc-k8s.io-c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c-runc.teUHSo.mount: Deactivated successfully. Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.592 [INFO][3344] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.593 [INFO][3344] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" iface="eth0" netns="/var/run/netns/cni-ab79e5a4-69ea-ffbd-859f-ca66ab14520f" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.595 [INFO][3344] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" iface="eth0" netns="/var/run/netns/cni-ab79e5a4-69ea-ffbd-859f-ca66ab14520f" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.598 [INFO][3344] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" iface="eth0" netns="/var/run/netns/cni-ab79e5a4-69ea-ffbd-859f-ca66ab14520f" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.598 [INFO][3344] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.598 [INFO][3344] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.777 [INFO][3361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.783 [INFO][3361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.784 [INFO][3361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.815 [WARNING][3361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.815 [INFO][3361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.818 [INFO][3361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:53.821594 env[1298]: 2024-12-13 15:27:53.819 [INFO][3344] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:27:53.833714 env[1298]: time="2024-12-13T15:27:53.825679949Z" level=info msg="TearDown network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" successfully" Dec 13 15:27:53.833714 env[1298]: time="2024-12-13T15:27:53.825758260Z" level=info msg="StopPodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" returns successfully" Dec 13 15:27:53.828330 systemd[1]: run-netns-cni\x2dab79e5a4\x2d69ea\x2dffbd\x2d859f\x2dca66ab14520f.mount: Deactivated successfully. Dec 13 15:27:53.834341 env[1298]: time="2024-12-13T15:27:53.833547459Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cmbtx,Uid:75cd7585-3d93-4389-9c8d-3efde0c081a7,Namespace:kube-system,Attempt:1,}" Dec 13 15:27:54.068924 systemd-networkd[1083]: cali51a93c320a4: Link UP Dec 13 15:27:54.077230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:27:54.077395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali51a93c320a4: link becomes ready Dec 13 15:27:54.077698 systemd-networkd[1083]: cali51a93c320a4: Gained carrier Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.906 [INFO][3390] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.923 [INFO][3390] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0 coredns-76f75df574- kube-system 75cd7585-3d93-4389-9c8d-3efde0c081a7 783 0 2024-12-13 15:27:17 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-nlsfm.gb1.brightbox.com coredns-76f75df574-cmbtx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali51a93c320a4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.924 [INFO][3390] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.973 [INFO][3400] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" HandleID="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.985 [INFO][3400] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" HandleID="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002cf770), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-nlsfm.gb1.brightbox.com", "pod":"coredns-76f75df574-cmbtx", "timestamp":"2024-12-13 15:27:53.973625908 +0000 UTC"}, Hostname:"srv-nlsfm.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.986 [INFO][3400] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.986 [INFO][3400] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.986 [INFO][3400] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-nlsfm.gb1.brightbox.com' Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.988 [INFO][3400] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:53.999 [INFO][3400] ipam/ipam.go 372: Looking up existing affinities for host host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.005 [INFO][3400] ipam/ipam.go 489: Trying affinity for 192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.008 [INFO][3400] ipam/ipam.go 155: Attempting to load block cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.011 [INFO][3400] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.011 [INFO][3400] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.128/26 handle="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.013 [INFO][3400] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.027 [INFO][3400] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.16.128/26 handle="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.037 [INFO][3400] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.16.129/26] block=192.168.16.128/26 handle="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.037 [INFO][3400] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.129/26] handle="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.037 [INFO][3400] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:54.103177 env[1298]: 2024-12-13 15:27:54.037 [INFO][3400] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.16.129/26] IPv6=[] ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" HandleID="k8s-pod-network.a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.107284 env[1298]: 2024-12-13 15:27:54.041 [INFO][3390] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"75cd7585-3d93-4389-9c8d-3efde0c081a7", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-cmbtx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali51a93c320a4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:54.107284 env[1298]: 2024-12-13 15:27:54.041 [INFO][3390] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.16.129/32] ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.107284 env[1298]: 2024-12-13 15:27:54.041 [INFO][3390] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali51a93c320a4 ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.107284 env[1298]: 2024-12-13 15:27:54.079 [INFO][3390] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.107284 env[1298]: 2024-12-13 15:27:54.086 [INFO][3390] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"75cd7585-3d93-4389-9c8d-3efde0c081a7", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a", Pod:"coredns-76f75df574-cmbtx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali51a93c320a4", MAC:"4a:a9:c7:c6:54:f0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:54.107284 env[1298]: 2024-12-13 15:27:54.098 [INFO][3390] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a" Namespace="kube-system" Pod="coredns-76f75df574-cmbtx" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:27:54.120869 env[1298]: time="2024-12-13T15:27:54.120708115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:54.121062 env[1298]: time="2024-12-13T15:27:54.120894068Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:54.121062 env[1298]: time="2024-12-13T15:27:54.120963943Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:54.121488 env[1298]: time="2024-12-13T15:27:54.121434471Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a pid=3423 runtime=io.containerd.runc.v2 Dec 13 15:27:54.207818 env[1298]: time="2024-12-13T15:27:54.207762279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cmbtx,Uid:75cd7585-3d93-4389-9c8d-3efde0c081a7,Namespace:kube-system,Attempt:1,} returns sandbox id \"a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a\"" Dec 13 15:27:54.213396 env[1298]: time="2024-12-13T15:27:54.213346603Z" level=info msg="CreateContainer within sandbox \"a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:27:54.237809 env[1298]: time="2024-12-13T15:27:54.237737311Z" level=info msg="CreateContainer within sandbox \"a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1a52adc6ac2bf2e34fb88dee87d721d525383dc5ade652927f0ac45579655a97\"" Dec 13 15:27:54.240028 env[1298]: time="2024-12-13T15:27:54.238786082Z" level=info msg="StartContainer for \"1a52adc6ac2bf2e34fb88dee87d721d525383dc5ade652927f0ac45579655a97\"" Dec 13 15:27:54.325284 env[1298]: time="2024-12-13T15:27:54.325147071Z" level=info msg="StartContainer for \"1a52adc6ac2bf2e34fb88dee87d721d525383dc5ade652927f0ac45579655a97\" returns successfully" Dec 13 15:27:54.427575 env[1298]: time="2024-12-13T15:27:54.427138821Z" level=info msg="StopPodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\"" Dec 13 15:27:54.579000 audit[3537]: AVC avc: denied { write } for pid=3537 comm="tee" name="fd" dev="proc" ino=29398 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.589142 kernel: audit: type=1400 audit(1734103674.579:294): avc: denied { write } for pid=3537 comm="tee" name="fd" dev="proc" ino=29398 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.579000 audit[3537]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde8f56a0c a2=241 a3=1b6 items=1 ppid=3530 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.603173 kernel: audit: type=1300 audit(1734103674.579:294): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde8f56a0c a2=241 a3=1b6 items=1 ppid=3530 pid=3537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.579000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:27:54.579000 audit: PATH item=0 name="/dev/fd/63" inode=29394 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.615264 kernel: audit: type=1307 audit(1734103674.579:294): cwd="/etc/service/enabled/cni/log" Dec 13 15:27:54.615478 kernel: audit: type=1302 audit(1734103674.579:294): item=0 name="/dev/fd/63" inode=29394 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.579000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.624124 kernel: audit: type=1327 audit(1734103674.579:294): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.516 [INFO][3505] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.516 [INFO][3505] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" iface="eth0" netns="/var/run/netns/cni-276e0ebf-da22-88e0-09f7-7fca94093f28" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.516 [INFO][3505] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" iface="eth0" netns="/var/run/netns/cni-276e0ebf-da22-88e0-09f7-7fca94093f28" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.517 [INFO][3505] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" iface="eth0" netns="/var/run/netns/cni-276e0ebf-da22-88e0-09f7-7fca94093f28" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.517 [INFO][3505] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.517 [INFO][3505] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.578 [INFO][3511] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.578 [INFO][3511] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.578 [INFO][3511] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.616 [WARNING][3511] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.616 [INFO][3511] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.619 [INFO][3511] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:54.627371 env[1298]: 2024-12-13 15:27:54.625 [INFO][3505] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:27:54.632279 systemd[1]: run-netns-cni\x2d276e0ebf\x2dda22\x2d88e0\x2d09f7\x2d7fca94093f28.mount: Deactivated successfully. Dec 13 15:27:54.635351 env[1298]: time="2024-12-13T15:27:54.635291241Z" level=info msg="TearDown network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" successfully" Dec 13 15:27:54.635527 env[1298]: time="2024-12-13T15:27:54.635494957Z" level=info msg="StopPodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" returns successfully" Dec 13 15:27:54.638561 env[1298]: time="2024-12-13T15:27:54.636629000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ms5nq,Uid:4aa72178-d3cd-442a-a144-2b7c73ee25a9,Namespace:kube-system,Attempt:1,}" Dec 13 15:27:54.672000 audit[3563]: AVC avc: denied { write } for pid=3563 comm="tee" name="fd" dev="proc" ino=30013 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.672000 audit[3563]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffda753a0b a2=241 a3=1b6 items=1 ppid=3539 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.686259 kernel: audit: type=1400 audit(1734103674.672:295): avc: denied { write } for pid=3563 comm="tee" name="fd" dev="proc" ino=30013 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.686446 kernel: audit: type=1300 audit(1734103674.672:295): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffda753a0b a2=241 a3=1b6 items=1 ppid=3539 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.672000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:27:54.706162 kernel: audit: type=1307 audit(1734103674.672:295): cwd="/etc/service/enabled/bird/log" Dec 13 15:27:54.706273 kernel: audit: type=1302 audit(1734103674.672:295): item=0 name="/dev/fd/63" inode=29417 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.672000 audit: PATH item=0 name="/dev/fd/63" inode=29417 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.672000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.722160 kernel: audit: type=1327 audit(1734103674.672:295): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.735000 audit[3580]: AVC avc: denied { write } for pid=3580 comm="tee" name="fd" dev="proc" ino=29501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.735000 audit[3580]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc927249fa a2=241 a3=1b6 items=1 ppid=3541 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.735000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:27:54.735000 audit: PATH item=0 name="/dev/fd/63" inode=29494 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.735000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.746000 audit[3573]: AVC avc: denied { write } for pid=3573 comm="tee" name="fd" dev="proc" ino=30047 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.746000 audit[3573]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcca92ca0a a2=241 a3=1b6 items=1 ppid=3528 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.746000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:27:54.746000 audit: PATH item=0 name="/dev/fd/63" inode=29485 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.746000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.776000 audit[3602]: AVC avc: denied { write } for pid=3602 comm="tee" name="fd" dev="proc" ino=30052 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.776000 audit[3602]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa76559fb a2=241 a3=1b6 items=1 ppid=3544 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.776000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:27:54.776000 audit: PATH item=0 name="/dev/fd/63" inode=29511 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.796000 audit[3598]: AVC avc: denied { write } for pid=3598 comm="tee" name="fd" dev="proc" ino=29520 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.796000 audit[3598]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd49a3fa0a a2=241 a3=1b6 items=1 ppid=3540 pid=3598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.796000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:27:54.796000 audit: PATH item=0 name="/dev/fd/63" inode=29506 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.796000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.824382 kubelet[2251]: I1213 15:27:54.824315 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-cmbtx" podStartSLOduration=37.824222439 podStartE2EDuration="37.824222439s" podCreationTimestamp="2024-12-13 15:27:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:27:54.822640052 +0000 UTC m=+49.725950811" watchObservedRunningTime="2024-12-13 15:27:54.824222439 +0000 UTC m=+49.727533198" Dec 13 15:27:54.826000 audit[3613]: AVC avc: denied { write } for pid=3613 comm="tee" name="fd" dev="proc" ino=29526 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:27:54.826000 audit[3613]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6ab68a0a a2=241 a3=1b6 items=1 ppid=3546 pid=3613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.826000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:27:54.826000 audit: PATH item=0 name="/dev/fd/63" inode=29521 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:27:54.826000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:27:54.931000 audit[3639]: NETFILTER_CFG table=filter:97 family=2 entries=13 op=nft_register_rule pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:54.931000 audit[3639]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcf17d3c60 a2=0 a3=7ffcf17d3c4c items=0 ppid=2427 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.931000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:54.936000 audit[3639]: NETFILTER_CFG table=nat:98 family=2 entries=35 op=nft_register_chain pid=3639 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:54.936000 audit[3639]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffcf17d3c60 a2=0 a3=7ffcf17d3c4c items=0 ppid=2427 pid=3639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:54.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:55.034000 audit[3643]: NETFILTER_CFG table=filter:99 family=2 entries=10 op=nft_register_rule pid=3643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:55.034000 audit[3643]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff803d18f0 a2=0 a3=7fff803d18dc items=0 ppid=2427 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:55.034000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:55.041000 audit[3643]: NETFILTER_CFG table=nat:100 family=2 entries=20 op=nft_register_rule pid=3643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:55.041000 audit[3643]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff803d18f0 a2=0 a3=7fff803d18dc items=0 ppid=2427 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:55.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:55.077287 systemd-networkd[1083]: calia53697492c7: Link UP Dec 13 15:27:55.085560 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:27:55.085688 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia53697492c7: link becomes ready Dec 13 15:27:55.085052 systemd-networkd[1083]: calia53697492c7: Gained carrier Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:54.766 [INFO][3560] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:54.875 [INFO][3560] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0 coredns-76f75df574- kube-system 4aa72178-d3cd-442a-a144-2b7c73ee25a9 792 0 2024-12-13 15:27:17 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-nlsfm.gb1.brightbox.com coredns-76f75df574-ms5nq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia53697492c7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:54.875 [INFO][3560] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:54.980 [INFO][3625] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" HandleID="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.006 [INFO][3625] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" HandleID="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ede0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-nlsfm.gb1.brightbox.com", "pod":"coredns-76f75df574-ms5nq", "timestamp":"2024-12-13 15:27:54.980228121 +0000 UTC"}, Hostname:"srv-nlsfm.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.006 [INFO][3625] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.006 [INFO][3625] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.007 [INFO][3625] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-nlsfm.gb1.brightbox.com' Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.009 [INFO][3625] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.021 [INFO][3625] ipam/ipam.go 372: Looking up existing affinities for host host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.027 [INFO][3625] ipam/ipam.go 489: Trying affinity for 192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.030 [INFO][3625] ipam/ipam.go 155: Attempting to load block cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.033 [INFO][3625] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.033 [INFO][3625] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.128/26 handle="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.038 [INFO][3625] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.044 [INFO][3625] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.16.128/26 handle="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.053 [INFO][3625] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.16.130/26] block=192.168.16.128/26 handle="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.053 [INFO][3625] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.130/26] handle="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.053 [INFO][3625] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:55.112981 env[1298]: 2024-12-13 15:27:55.053 [INFO][3625] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.16.130/26] IPv6=[] ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" HandleID="k8s-pod-network.2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.115345 env[1298]: 2024-12-13 15:27:55.055 [INFO][3560] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4aa72178-d3cd-442a-a144-2b7c73ee25a9", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"", Pod:"coredns-76f75df574-ms5nq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia53697492c7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:55.115345 env[1298]: 2024-12-13 15:27:55.055 [INFO][3560] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.16.130/32] ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.115345 env[1298]: 2024-12-13 15:27:55.056 [INFO][3560] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia53697492c7 ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.115345 env[1298]: 2024-12-13 15:27:55.087 [INFO][3560] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.115345 env[1298]: 2024-12-13 15:27:55.090 [INFO][3560] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4aa72178-d3cd-442a-a144-2b7c73ee25a9", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd", Pod:"coredns-76f75df574-ms5nq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia53697492c7", MAC:"a2:f9:50:85:6c:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:55.115345 env[1298]: 2024-12-13 15:27:55.111 [INFO][3560] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd" Namespace="kube-system" Pod="coredns-76f75df574-ms5nq" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:27:55.149304 env[1298]: time="2024-12-13T15:27:55.146890255Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:55.149304 env[1298]: time="2024-12-13T15:27:55.146961862Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:55.149304 env[1298]: time="2024-12-13T15:27:55.146978258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:55.149304 env[1298]: time="2024-12-13T15:27:55.147200324Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd pid=3663 runtime=io.containerd.runc.v2 Dec 13 15:27:55.272760 env[1298]: time="2024-12-13T15:27:55.272702851Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-ms5nq,Uid:4aa72178-d3cd-442a-a144-2b7c73ee25a9,Namespace:kube-system,Attempt:1,} returns sandbox id \"2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd\"" Dec 13 15:27:55.282146 env[1298]: time="2024-12-13T15:27:55.281931921Z" level=info msg="CreateContainer within sandbox \"2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:27:55.303535 env[1298]: time="2024-12-13T15:27:55.303470412Z" level=info msg="CreateContainer within sandbox \"2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0497f5b562449f2fb8df524f6076a737c113eb537bd7c80f6674f0c864202364\"" Dec 13 15:27:55.304583 env[1298]: time="2024-12-13T15:27:55.304545702Z" level=info msg="StartContainer for \"0497f5b562449f2fb8df524f6076a737c113eb537bd7c80f6674f0c864202364\"" Dec 13 15:27:55.461639 env[1298]: time="2024-12-13T15:27:55.461588829Z" level=info msg="StopPodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\"" Dec 13 15:27:55.484406 env[1298]: time="2024-12-13T15:27:55.484344048Z" level=info msg="StartContainer for \"0497f5b562449f2fb8df524f6076a737c113eb537bd7c80f6674f0c864202364\" returns successfully" Dec 13 15:27:55.489629 systemd-networkd[1083]: cali51a93c320a4: Gained IPv6LL Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.783000 audit: BPF prog-id=10 op=LOAD Dec 13 15:27:55.783000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc42e7c980 a2=98 a3=3 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:55.783000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:55.786000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.810000 audit: BPF prog-id=11 op=LOAD Dec 13 15:27:55.810000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc42e7c760 a2=74 a3=540051 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:55.810000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:55.811000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:55.812000 audit: BPF prog-id=12 op=LOAD Dec 13 15:27:55.812000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc42e7c790 a2=94 a3=2 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:55.812000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:55.812000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:27:55.850017 kubelet[2251]: I1213 15:27:55.849978 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-ms5nq" podStartSLOduration=38.849911367 podStartE2EDuration="38.849911367s" podCreationTimestamp="2024-12-13 15:27:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:27:55.832081269 +0000 UTC m=+50.735392030" watchObservedRunningTime="2024-12-13 15:27:55.849911367 +0000 UTC m=+50.753222127" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.699 [INFO][3762] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.699 [INFO][3762] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" iface="eth0" netns="/var/run/netns/cni-b0199127-f373-5a54-650f-f7664a9a6171" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.700 [INFO][3762] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" iface="eth0" netns="/var/run/netns/cni-b0199127-f373-5a54-650f-f7664a9a6171" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.700 [INFO][3762] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" iface="eth0" netns="/var/run/netns/cni-b0199127-f373-5a54-650f-f7664a9a6171" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.700 [INFO][3762] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.700 [INFO][3762] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.831 [INFO][3794] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.833 [INFO][3794] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.833 [INFO][3794] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.848 [WARNING][3794] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.848 [INFO][3794] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.857 [INFO][3794] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:55.866893 env[1298]: 2024-12-13 15:27:55.859 [INFO][3762] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:27:55.872026 env[1298]: time="2024-12-13T15:27:55.867122835Z" level=info msg="TearDown network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" successfully" Dec 13 15:27:55.872026 env[1298]: time="2024-12-13T15:27:55.867167901Z" level=info msg="StopPodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" returns successfully" Dec 13 15:27:55.873712 systemd[1]: run-netns-cni\x2db0199127\x2df373\x2d5a54\x2d650f\x2df7664a9a6171.mount: Deactivated successfully. Dec 13 15:27:55.874501 env[1298]: time="2024-12-13T15:27:55.874362920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-wvsnl,Uid:10ceaf60-95eb-4d04-90bb-0bed37f49bd8,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:27:56.067000 audit[3819]: NETFILTER_CFG table=filter:101 family=2 entries=10 op=nft_register_rule pid=3819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:56.067000 audit[3819]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffca8f60320 a2=0 a3=7ffca8f6030c items=0 ppid=2427 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit: BPF prog-id=13 op=LOAD Dec 13 15:27:56.085000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc42e7c650 a2=40 a3=1 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.085000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.085000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:27:56.085000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.085000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc42e7c720 a2=50 a3=7ffc42e7c800 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.085000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.093000 audit[3819]: NETFILTER_CFG table=nat:102 family=2 entries=56 op=nft_register_chain pid=3819 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:27:56.093000 audit[3819]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffca8f60320 a2=0 a3=7ffca8f6030c items=0 ppid=2427 pid=3819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc42e7c660 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc42e7c690 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc42e7c5a0 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc42e7c6b0 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc42e7c690 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc42e7c680 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc42e7c6b0 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc42e7c690 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc42e7c6b0 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc42e7c680 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.102000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.102000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc42e7c6f0 a2=28 a3=0 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc42e7c4a0 a2=50 a3=1 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.103000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit: BPF prog-id=14 op=LOAD Dec 13 15:27:56.103000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc42e7c4a0 a2=94 a3=5 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.103000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.103000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc42e7c550 a2=50 a3=1 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.103000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc42e7c670 a2=4 a3=38 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.103000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.103000 audit[3792]: AVC avc: denied { confidentiality } for pid=3792 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:27:56.103000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc42e7c6c0 a2=94 a3=6 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.103000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { confidentiality } for pid=3792 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:27:56.104000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc42e7be70 a2=94 a3=83 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.104000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { perfmon } for pid=3792 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { bpf } for pid=3792 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.104000 audit[3792]: AVC avc: denied { confidentiality } for pid=3792 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:27:56.104000 audit[3792]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc42e7be70 a2=94 a3=83 items=0 ppid=3529 pid=3792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.104000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.128000 audit: BPF prog-id=15 op=LOAD Dec 13 15:27:56.128000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff14b20280 a2=98 a3=1999999999999999 items=0 ppid=3529 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.128000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:27:56.131000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit: BPF prog-id=16 op=LOAD Dec 13 15:27:56.131000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff14b20160 a2=74 a3=ffff items=0 ppid=3529 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.131000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:27:56.131000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { perfmon } for pid=3823 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit[3823]: AVC avc: denied { bpf } for pid=3823 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.131000 audit: BPF prog-id=17 op=LOAD Dec 13 15:27:56.131000 audit[3823]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff14b201a0 a2=40 a3=7fff14b20380 items=0 ppid=3529 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.131000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:27:56.131000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:27:56.144202 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:27:56.144314 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2047db57834: link becomes ready Dec 13 15:27:56.148964 systemd-networkd[1083]: cali2047db57834: Link UP Dec 13 15:27:56.150072 systemd-networkd[1083]: cali2047db57834: Gained carrier Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:55.981 [INFO][3802] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0 calico-apiserver-79c4b7b9bd- calico-apiserver 10ceaf60-95eb-4d04-90bb-0bed37f49bd8 812 0 2024-12-13 15:27:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79c4b7b9bd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-nlsfm.gb1.brightbox.com calico-apiserver-79c4b7b9bd-wvsnl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2047db57834 [] []}} ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:55.982 [INFO][3802] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.040 [INFO][3812] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" HandleID="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.054 [INFO][3812] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" HandleID="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310a50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-nlsfm.gb1.brightbox.com", "pod":"calico-apiserver-79c4b7b9bd-wvsnl", "timestamp":"2024-12-13 15:27:56.040413752 +0000 UTC"}, Hostname:"srv-nlsfm.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.054 [INFO][3812] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.054 [INFO][3812] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.055 [INFO][3812] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-nlsfm.gb1.brightbox.com' Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.057 [INFO][3812] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.081 [INFO][3812] ipam/ipam.go 372: Looking up existing affinities for host host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.089 [INFO][3812] ipam/ipam.go 489: Trying affinity for 192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.099 [INFO][3812] ipam/ipam.go 155: Attempting to load block cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.102 [INFO][3812] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.102 [INFO][3812] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.128/26 handle="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.110 [INFO][3812] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5 Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.118 [INFO][3812] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.16.128/26 handle="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.132 [INFO][3812] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.16.131/26] block=192.168.16.128/26 handle="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.132 [INFO][3812] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.131/26] handle="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.132 [INFO][3812] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:56.159844 env[1298]: 2024-12-13 15:27:56.132 [INFO][3812] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.16.131/26] IPv6=[] ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" HandleID="k8s-pod-network.9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.161371 env[1298]: 2024-12-13 15:27:56.138 [INFO][3802] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"10ceaf60-95eb-4d04-90bb-0bed37f49bd8", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-79c4b7b9bd-wvsnl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2047db57834", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:56.161371 env[1298]: 2024-12-13 15:27:56.139 [INFO][3802] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.16.131/32] ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.161371 env[1298]: 2024-12-13 15:27:56.139 [INFO][3802] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2047db57834 ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.161371 env[1298]: 2024-12-13 15:27:56.144 [INFO][3802] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.161371 env[1298]: 2024-12-13 15:27:56.144 [INFO][3802] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"10ceaf60-95eb-4d04-90bb-0bed37f49bd8", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5", Pod:"calico-apiserver-79c4b7b9bd-wvsnl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2047db57834", MAC:"ee:4f:25:58:a5:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:56.161371 env[1298]: 2024-12-13 15:27:56.155 [INFO][3802] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-wvsnl" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:27:56.191701 env[1298]: time="2024-12-13T15:27:56.191560107Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:56.192100 env[1298]: time="2024-12-13T15:27:56.192056216Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:56.192642 env[1298]: time="2024-12-13T15:27:56.192599355Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:56.193395 env[1298]: time="2024-12-13T15:27:56.193326569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5 pid=3853 runtime=io.containerd.runc.v2 Dec 13 15:27:56.258313 systemd-networkd[1083]: calia53697492c7: Gained IPv6LL Dec 13 15:27:56.314817 systemd-networkd[1083]: vxlan.calico: Link UP Dec 13 15:27:56.314831 systemd-networkd[1083]: vxlan.calico: Gained carrier Dec 13 15:27:56.405293 systemd[1]: run-containerd-runc-k8s.io-9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5-runc.XUSYFP.mount: Deactivated successfully. Dec 13 15:27:56.428481 env[1298]: time="2024-12-13T15:27:56.426590218Z" level=info msg="StopPodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\"" Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.461000 audit: BPF prog-id=18 op=LOAD Dec 13 15:27:56.461000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb0bffca0 a2=98 a3=100 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.461000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.461000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit: BPF prog-id=19 op=LOAD Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb0bffab0 a2=74 a3=540051 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit: BPF prog-id=20 op=LOAD Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcb0bffae0 a2=94 a3=2 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb0bff9b0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb0bff9e0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb0bff8f0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb0bffa00 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb0bff9e0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb0bff9d0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb0bffa00 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb0bff9e0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb0bffa00 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcb0bff9d0 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcb0bffa40 a2=28 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.466000 audit: BPF prog-id=21 op=LOAD Dec 13 15:27:56.466000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb0bff8b0 a2=40 a3=0 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.466000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:27:56.475000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.475000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcb0bff8a0 a2=50 a3=2800 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.475000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcb0bff8a0 a2=50 a3=2800 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit: BPF prog-id=22 op=LOAD Dec 13 15:27:56.476000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb0bff0c0 a2=94 a3=2 items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.476000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { perfmon } for pid=3915 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit[3915]: AVC avc: denied { bpf } for pid=3915 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.476000 audit: BPF prog-id=23 op=LOAD Dec 13 15:27:56.476000 audit[3915]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcb0bff1c0 a2=94 a3=2d items=0 ppid=3529 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.476000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.489000 audit: BPF prog-id=24 op=LOAD Dec 13 15:27:56.489000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca81f2a30 a2=98 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.489000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.489000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.503000 audit: BPF prog-id=25 op=LOAD Dec 13 15:27:56.503000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca81f2810 a2=74 a3=540051 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.503000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.503000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.504000 audit: BPF prog-id=26 op=LOAD Dec 13 15:27:56.504000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca81f2840 a2=94 a3=2 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.504000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.504000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:27:56.657399 env[1298]: time="2024-12-13T15:27:56.657211448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-wvsnl,Uid:10ceaf60-95eb-4d04-90bb-0bed37f49bd8,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5\"" Dec 13 15:27:56.667757 env[1298]: time="2024-12-13T15:27:56.667707886Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.668 [INFO][3910] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.668 [INFO][3910] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" iface="eth0" netns="/var/run/netns/cni-c7f7212b-7588-986b-d77e-003daa14f1a8" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.669 [INFO][3910] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" iface="eth0" netns="/var/run/netns/cni-c7f7212b-7588-986b-d77e-003daa14f1a8" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.669 [INFO][3910] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" iface="eth0" netns="/var/run/netns/cni-c7f7212b-7588-986b-d77e-003daa14f1a8" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.669 [INFO][3910] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.669 [INFO][3910] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.814 [INFO][3937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.815 [INFO][3937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.815 [INFO][3937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.827 [WARNING][3937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.827 [INFO][3937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.830 [INFO][3937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:56.833989 env[1298]: 2024-12-13 15:27:56.832 [INFO][3910] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:27:56.838639 env[1298]: time="2024-12-13T15:27:56.838587442Z" level=info msg="TearDown network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" successfully" Dec 13 15:27:56.838782 env[1298]: time="2024-12-13T15:27:56.838750610Z" level=info msg="StopPodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" returns successfully" Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit: BPF prog-id=27 op=LOAD Dec 13 15:27:56.838000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca81f2700 a2=40 a3=1 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.838000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:27:56.838000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.838000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca81f27d0 a2=50 a3=7ffca81f28b0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.838000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.841457 env[1298]: time="2024-12-13T15:27:56.840607984Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w69sr,Uid:1d292037-b0b7-47ce-be09-23f232570d7c,Namespace:calico-system,Attempt:1,}" Dec 13 15:27:56.842593 systemd[1]: run-netns-cni\x2dc7f7212b\x2d7588\x2d986b\x2dd77e\x2d003daa14f1a8.mount: Deactivated successfully. Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca81f2710 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca81f2740 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca81f2650 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca81f2760 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca81f2740 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca81f2730 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca81f2760 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca81f2740 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca81f2760 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca81f2730 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca81f27a0 a2=28 a3=0 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca81f2550 a2=50 a3=1 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.855000 audit: BPF prog-id=28 op=LOAD Dec 13 15:27:56.855000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca81f2550 a2=94 a3=5 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.855000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.856000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca81f2600 a2=50 a3=1 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffca81f2720 a2=4 a3=38 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { confidentiality } for pid=3929 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:27:56.856000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca81f2770 a2=94 a3=6 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { confidentiality } for pid=3929 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:27:56.856000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca81f1f20 a2=94 a3=83 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.856000 audit[3929]: AVC avc: denied { confidentiality } for pid=3929 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:27:56.856000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca81f1f20 a2=94 a3=83 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.856000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.858000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.858000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca81f3960 a2=10 a3=f1f00800 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.858000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.859000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.859000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca81f3800 a2=10 a3=3 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.859000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.859000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca81f37a0 a2=10 a3=3 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.859000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:27:56.859000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca81f37a0 a2=10 a3=7 items=0 ppid=3529 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:56.859000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:27:56.868000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:27:57.086000 audit[3998]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=3998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:27:57.086000 audit[3998]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff30dc5280 a2=0 a3=7fff30dc526c items=0 ppid=3529 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:57.086000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:27:57.126000 audit[4005]: NETFILTER_CFG table=mangle:104 family=2 entries=16 op=nft_register_chain pid=4005 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:27:57.134000 audit[4002]: NETFILTER_CFG table=filter:105 family=2 entries=127 op=nft_register_chain pid=4002 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:27:57.136000 audit[4000]: NETFILTER_CFG table=raw:106 family=2 entries=21 op=nft_register_chain pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:27:57.136000 audit[4000]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffea600820 a2=0 a3=7fffea60080c items=0 ppid=3529 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:57.136000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:27:57.134000 audit[4002]: SYSCALL arch=c000003e syscall=46 success=yes exit=72316 a0=3 a1=7fffe1ae4ac0 a2=0 a3=7fffe1ae4aac items=0 ppid=3529 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:57.134000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:27:57.126000 audit[4005]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff42f6ce30 a2=0 a3=7fff42f6ce1c items=0 ppid=3529 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:57.126000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:27:57.265162 systemd-networkd[1083]: cali27a8eacee1e: Link UP Dec 13 15:27:57.269662 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali27a8eacee1e: link becomes ready Dec 13 15:27:57.269180 systemd-networkd[1083]: cali27a8eacee1e: Gained carrier Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.036 [INFO][3948] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0 csi-node-driver- calico-system 1d292037-b0b7-47ce-be09-23f232570d7c 826 0 2024-12-13 15:27:25 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-nlsfm.gb1.brightbox.com csi-node-driver-w69sr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali27a8eacee1e [] []}} ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.036 [INFO][3948] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.178 [INFO][3989] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" HandleID="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.190 [INFO][3989] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" HandleID="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031a7c0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-nlsfm.gb1.brightbox.com", "pod":"csi-node-driver-w69sr", "timestamp":"2024-12-13 15:27:57.178740799 +0000 UTC"}, Hostname:"srv-nlsfm.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.190 [INFO][3989] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.190 [INFO][3989] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.190 [INFO][3989] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-nlsfm.gb1.brightbox.com' Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.193 [INFO][3989] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.201 [INFO][3989] ipam/ipam.go 372: Looking up existing affinities for host host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.211 [INFO][3989] ipam/ipam.go 489: Trying affinity for 192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.224 [INFO][3989] ipam/ipam.go 155: Attempting to load block cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.230 [INFO][3989] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.230 [INFO][3989] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.128/26 handle="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.233 [INFO][3989] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64 Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.247 [INFO][3989] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.16.128/26 handle="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.259 [INFO][3989] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.16.132/26] block=192.168.16.128/26 handle="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.260 [INFO][3989] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.132/26] handle="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.260 [INFO][3989] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:27:57.292839 env[1298]: 2024-12-13 15:27:57.260 [INFO][3989] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.16.132/26] IPv6=[] ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" HandleID="k8s-pod-network.071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.295577 env[1298]: 2024-12-13 15:27:57.262 [INFO][3948] cni-plugin/k8s.go 386: Populated endpoint ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1d292037-b0b7-47ce-be09-23f232570d7c", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-w69sr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.16.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27a8eacee1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:57.295577 env[1298]: 2024-12-13 15:27:57.262 [INFO][3948] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.16.132/32] ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.295577 env[1298]: 2024-12-13 15:27:57.262 [INFO][3948] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali27a8eacee1e ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.295577 env[1298]: 2024-12-13 15:27:57.265 [INFO][3948] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.295577 env[1298]: 2024-12-13 15:27:57.265 [INFO][3948] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1d292037-b0b7-47ce-be09-23f232570d7c", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64", Pod:"csi-node-driver-w69sr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.16.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27a8eacee1e", MAC:"c2:2f:52:d5:35:be", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:27:57.295577 env[1298]: 2024-12-13 15:27:57.279 [INFO][3948] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64" Namespace="calico-system" Pod="csi-node-driver-w69sr" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:27:57.314000 audit[4029]: NETFILTER_CFG table=filter:107 family=2 entries=52 op=nft_register_chain pid=4029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:27:57.314000 audit[4029]: SYSCALL arch=c000003e syscall=46 success=yes exit=25564 a0=3 a1=7ffdd56f8540 a2=0 a3=7ffdd56f852c items=0 ppid=3529 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:27:57.314000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:27:57.328886 env[1298]: time="2024-12-13T15:27:57.328771570Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:27:57.328886 env[1298]: time="2024-12-13T15:27:57.328845757Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:27:57.329286 env[1298]: time="2024-12-13T15:27:57.329224360Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:27:57.329688 env[1298]: time="2024-12-13T15:27:57.329623219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64 pid=4042 runtime=io.containerd.runc.v2 Dec 13 15:27:57.399966 env[1298]: time="2024-12-13T15:27:57.399907587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-w69sr,Uid:1d292037-b0b7-47ce-be09-23f232570d7c,Namespace:calico-system,Attempt:1,} returns sandbox id \"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64\"" Dec 13 15:27:57.406232 systemd[1]: run-containerd-runc-k8s.io-c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c-runc.2eptjN.mount: Deactivated successfully. Dec 13 15:27:57.478231 systemd-networkd[1083]: vxlan.calico: Gained IPv6LL Dec 13 15:27:58.177385 systemd-networkd[1083]: cali2047db57834: Gained IPv6LL Dec 13 15:27:58.369777 systemd-networkd[1083]: cali27a8eacee1e: Gained IPv6LL Dec 13 15:28:00.616054 env[1298]: time="2024-12-13T15:28:00.615951016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:00.620145 env[1298]: time="2024-12-13T15:28:00.620069165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:00.622801 env[1298]: time="2024-12-13T15:28:00.622746949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:00.624269 env[1298]: time="2024-12-13T15:28:00.624235775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:00.625378 env[1298]: time="2024-12-13T15:28:00.625292538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:28:00.629214 env[1298]: time="2024-12-13T15:28:00.627533648Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:28:00.632079 env[1298]: time="2024-12-13T15:28:00.632041632Z" level=info msg="CreateContainer within sandbox \"9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:28:00.653723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2290144487.mount: Deactivated successfully. Dec 13 15:28:00.657909 env[1298]: time="2024-12-13T15:28:00.657855759Z" level=info msg="CreateContainer within sandbox \"9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"972e0c53118c1a3556d8db7ba0bd6ab06939322d8f7c000fe5d9e2ac3e28fd3b\"" Dec 13 15:28:00.659215 env[1298]: time="2024-12-13T15:28:00.659182377Z" level=info msg="StartContainer for \"972e0c53118c1a3556d8db7ba0bd6ab06939322d8f7c000fe5d9e2ac3e28fd3b\"" Dec 13 15:28:00.706596 systemd[1]: run-containerd-runc-k8s.io-972e0c53118c1a3556d8db7ba0bd6ab06939322d8f7c000fe5d9e2ac3e28fd3b-runc.ZrPdrY.mount: Deactivated successfully. Dec 13 15:28:00.805578 env[1298]: time="2024-12-13T15:28:00.805523417Z" level=info msg="StartContainer for \"972e0c53118c1a3556d8db7ba0bd6ab06939322d8f7c000fe5d9e2ac3e28fd3b\" returns successfully" Dec 13 15:28:00.853062 kubelet[2251]: I1213 15:28:00.852998 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-wvsnl" podStartSLOduration=31.889163807 podStartE2EDuration="35.852814457s" podCreationTimestamp="2024-12-13 15:27:25 +0000 UTC" firstStartedPulling="2024-12-13 15:27:56.662600955 +0000 UTC m=+51.565911703" lastFinishedPulling="2024-12-13 15:28:00.6262516 +0000 UTC m=+55.529562353" observedRunningTime="2024-12-13 15:28:00.851554431 +0000 UTC m=+55.754865186" watchObservedRunningTime="2024-12-13 15:28:00.852814457 +0000 UTC m=+55.756125216" Dec 13 15:28:00.912000 audit[4111]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:00.915700 kernel: kauditd_printk_skb: 526 callbacks suppressed Dec 13 15:28:00.915850 kernel: audit: type=1325 audit(1734103680.912:403): table=filter:108 family=2 entries=10 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:00.912000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff85119930 a2=0 a3=7fff8511991c items=0 ppid=2427 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:00.929180 kernel: audit: type=1300 audit(1734103680.912:403): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff85119930 a2=0 a3=7fff8511991c items=0 ppid=2427 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:00.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:00.932000 audit[4111]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:00.944906 kernel: audit: type=1327 audit(1734103680.912:403): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:00.945044 kernel: audit: type=1325 audit(1734103680.932:404): table=nat:109 family=2 entries=20 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:00.932000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff85119930 a2=0 a3=7fff8511991c items=0 ppid=2427 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:00.958198 kernel: audit: type=1300 audit(1734103680.932:404): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff85119930 a2=0 a3=7fff8511991c items=0 ppid=2427 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:00.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:00.963191 kernel: audit: type=1327 audit(1734103680.932:404): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:02.779965 env[1298]: time="2024-12-13T15:28:02.779849882Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:02.784167 env[1298]: time="2024-12-13T15:28:02.784134704Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:02.787253 env[1298]: time="2024-12-13T15:28:02.787221525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:02.790818 env[1298]: time="2024-12-13T15:28:02.790784743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:02.791918 env[1298]: time="2024-12-13T15:28:02.791882903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:28:02.798191 env[1298]: time="2024-12-13T15:28:02.798143484Z" level=info msg="CreateContainer within sandbox \"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:28:02.833862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4197247393.mount: Deactivated successfully. Dec 13 15:28:02.840027 env[1298]: time="2024-12-13T15:28:02.839979785Z" level=info msg="CreateContainer within sandbox \"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9f5d53ae36af7a3bfd672c1f212f71a056034fbbfb3a5ea19b6de0d076f56533\"" Dec 13 15:28:02.841276 env[1298]: time="2024-12-13T15:28:02.841241838Z" level=info msg="StartContainer for \"9f5d53ae36af7a3bfd672c1f212f71a056034fbbfb3a5ea19b6de0d076f56533\"" Dec 13 15:28:02.917207 systemd[1]: run-containerd-runc-k8s.io-9f5d53ae36af7a3bfd672c1f212f71a056034fbbfb3a5ea19b6de0d076f56533-runc.0AcfbN.mount: Deactivated successfully. Dec 13 15:28:03.045726 env[1298]: time="2024-12-13T15:28:03.045131714Z" level=info msg="StartContainer for \"9f5d53ae36af7a3bfd672c1f212f71a056034fbbfb3a5ea19b6de0d076f56533\" returns successfully" Dec 13 15:28:03.050483 env[1298]: time="2024-12-13T15:28:03.050232214Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:28:03.245000 audit[4159]: NETFILTER_CFG table=filter:110 family=2 entries=9 op=nft_register_rule pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:03.251242 kernel: audit: type=1325 audit(1734103683.245:405): table=filter:110 family=2 entries=9 op=nft_register_rule pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:03.245000 audit[4159]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffec0416df0 a2=0 a3=7ffec0416ddc items=0 ppid=2427 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:03.260231 kernel: audit: type=1300 audit(1734103683.245:405): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffec0416df0 a2=0 a3=7ffec0416ddc items=0 ppid=2427 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:03.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:03.267170 kernel: audit: type=1327 audit(1734103683.245:405): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:03.266000 audit[4159]: NETFILTER_CFG table=nat:111 family=2 entries=27 op=nft_register_chain pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:03.266000 audit[4159]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffec0416df0 a2=0 a3=7ffec0416ddc items=0 ppid=2427 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:03.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:03.272133 kernel: audit: type=1325 audit(1734103683.266:406): table=nat:111 family=2 entries=27 op=nft_register_chain pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:03.431647 env[1298]: time="2024-12-13T15:28:03.431393521Z" level=info msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.656 [INFO][4175] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.657 [INFO][4175] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" iface="eth0" netns="/var/run/netns/cni-d238b88b-e606-65f9-13bb-fe19c1dae202" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.657 [INFO][4175] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" iface="eth0" netns="/var/run/netns/cni-d238b88b-e606-65f9-13bb-fe19c1dae202" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.658 [INFO][4175] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" iface="eth0" netns="/var/run/netns/cni-d238b88b-e606-65f9-13bb-fe19c1dae202" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.658 [INFO][4175] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.658 [INFO][4175] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.753 [INFO][4181] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.754 [INFO][4181] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.754 [INFO][4181] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.764 [WARNING][4181] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.764 [INFO][4181] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.767 [INFO][4181] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:03.774062 env[1298]: 2024-12-13 15:28:03.769 [INFO][4175] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:03.776334 env[1298]: time="2024-12-13T15:28:03.774516273Z" level=info msg="TearDown network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" successfully" Dec 13 15:28:03.776334 env[1298]: time="2024-12-13T15:28:03.774643198Z" level=info msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" returns successfully" Dec 13 15:28:03.777049 env[1298]: time="2024-12-13T15:28:03.777013520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bc4c74bf9-6z4bm,Uid:4e943bfa-0399-48dd-a990-def40cc80910,Namespace:calico-system,Attempt:1,}" Dec 13 15:28:03.827450 systemd[1]: run-netns-cni\x2dd238b88b\x2de606\x2d65f9\x2d13bb\x2dfe19c1dae202.mount: Deactivated successfully. Dec 13 15:28:04.111568 systemd-networkd[1083]: cali8f531f0d20a: Link UP Dec 13 15:28:04.119809 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:28:04.120016 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f531f0d20a: link becomes ready Dec 13 15:28:04.124899 systemd-networkd[1083]: cali8f531f0d20a: Gained carrier Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:03.896 [INFO][4187] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0 calico-kube-controllers-6bc4c74bf9- calico-system 4e943bfa-0399-48dd-a990-def40cc80910 869 0 2024-12-13 15:27:26 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6bc4c74bf9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-nlsfm.gb1.brightbox.com calico-kube-controllers-6bc4c74bf9-6z4bm eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali8f531f0d20a [] []}} ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:03.897 [INFO][4187] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:03.990 [INFO][4199] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" HandleID="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.028 [INFO][4199] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" HandleID="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003aec80), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-nlsfm.gb1.brightbox.com", "pod":"calico-kube-controllers-6bc4c74bf9-6z4bm", "timestamp":"2024-12-13 15:28:03.990511821 +0000 UTC"}, Hostname:"srv-nlsfm.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.033 [INFO][4199] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.042 [INFO][4199] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.042 [INFO][4199] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-nlsfm.gb1.brightbox.com' Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.046 [INFO][4199] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.052 [INFO][4199] ipam/ipam.go 372: Looking up existing affinities for host host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.059 [INFO][4199] ipam/ipam.go 489: Trying affinity for 192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.062 [INFO][4199] ipam/ipam.go 155: Attempting to load block cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.066 [INFO][4199] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.066 [INFO][4199] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.128/26 handle="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.069 [INFO][4199] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.076 [INFO][4199] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.16.128/26 handle="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.086 [INFO][4199] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.16.133/26] block=192.168.16.128/26 handle="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.086 [INFO][4199] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.133/26] handle="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.086 [INFO][4199] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:04.139058 env[1298]: 2024-12-13 15:28:04.086 [INFO][4199] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.16.133/26] IPv6=[] ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" HandleID="k8s-pod-network.dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.142347 env[1298]: 2024-12-13 15:28:04.089 [INFO][4187] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0", GenerateName:"calico-kube-controllers-6bc4c74bf9-", Namespace:"calico-system", SelfLink:"", UID:"4e943bfa-0399-48dd-a990-def40cc80910", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bc4c74bf9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-6bc4c74bf9-6z4bm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.16.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8f531f0d20a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:04.142347 env[1298]: 2024-12-13 15:28:04.091 [INFO][4187] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.16.133/32] ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.142347 env[1298]: 2024-12-13 15:28:04.091 [INFO][4187] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8f531f0d20a ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.142347 env[1298]: 2024-12-13 15:28:04.110 [INFO][4187] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.142347 env[1298]: 2024-12-13 15:28:04.110 [INFO][4187] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0", GenerateName:"calico-kube-controllers-6bc4c74bf9-", Namespace:"calico-system", SelfLink:"", UID:"4e943bfa-0399-48dd-a990-def40cc80910", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bc4c74bf9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb", Pod:"calico-kube-controllers-6bc4c74bf9-6z4bm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.16.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8f531f0d20a", MAC:"82:55:47:c1:d4:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:04.142347 env[1298]: 2024-12-13 15:28:04.134 [INFO][4187] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb" Namespace="calico-system" Pod="calico-kube-controllers-6bc4c74bf9-6z4bm" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:04.213208 env[1298]: time="2024-12-13T15:28:04.208001413Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:28:04.213208 env[1298]: time="2024-12-13T15:28:04.208145747Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:28:04.213208 env[1298]: time="2024-12-13T15:28:04.208166853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:28:04.213208 env[1298]: time="2024-12-13T15:28:04.208672430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb pid=4225 runtime=io.containerd.runc.v2 Dec 13 15:28:04.291062 systemd[1]: run-containerd-runc-k8s.io-dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb-runc.71pbYT.mount: Deactivated successfully. Dec 13 15:28:04.289000 audit[4236]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4236 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:28:04.289000 audit[4236]: SYSCALL arch=c000003e syscall=46 success=yes exit=21000 a0=3 a1=7ffd342a7b70 a2=0 a3=7ffd342a7b5c items=0 ppid=3529 pid=4236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:04.289000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:28:04.429122 env[1298]: time="2024-12-13T15:28:04.428859144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bc4c74bf9-6z4bm,Uid:4e943bfa-0399-48dd-a990-def40cc80910,Namespace:calico-system,Attempt:1,} returns sandbox id \"dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb\"" Dec 13 15:28:05.485929 env[1298]: time="2024-12-13T15:28:05.485864418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:05.497654 env[1298]: time="2024-12-13T15:28:05.497536004Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:05.505202 env[1298]: time="2024-12-13T15:28:05.503263804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:05.506088 env[1298]: time="2024-12-13T15:28:05.506036987Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:05.507914 env[1298]: time="2024-12-13T15:28:05.507795142Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:28:05.526062 env[1298]: time="2024-12-13T15:28:05.526007372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 15:28:05.528087 env[1298]: time="2024-12-13T15:28:05.528049545Z" level=info msg="CreateContainer within sandbox \"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:28:05.594700 env[1298]: time="2024-12-13T15:28:05.594652050Z" level=info msg="StopPodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\"" Dec 13 15:28:05.602632 systemd-networkd[1083]: cali8f531f0d20a: Gained IPv6LL Dec 13 15:28:05.664613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3054008514.mount: Deactivated successfully. Dec 13 15:28:05.760316 env[1298]: time="2024-12-13T15:28:05.759674272Z" level=info msg="CreateContainer within sandbox \"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dfca66916a3633c0add430988bb4fa17e65e8614c936b3fa2cb4691901ee6019\"" Dec 13 15:28:05.762137 env[1298]: time="2024-12-13T15:28:05.761439884Z" level=info msg="StartContainer for \"dfca66916a3633c0add430988bb4fa17e65e8614c936b3fa2cb4691901ee6019\"" Dec 13 15:28:05.821505 systemd[1]: run-containerd-runc-k8s.io-dfca66916a3633c0add430988bb4fa17e65e8614c936b3fa2cb4691901ee6019-runc.bVmlNB.mount: Deactivated successfully. Dec 13 15:28:06.068283 env[1298]: time="2024-12-13T15:28:06.067939658Z" level=info msg="StartContainer for \"dfca66916a3633c0add430988bb4fa17e65e8614c936b3fa2cb4691901ee6019\" returns successfully" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:05.951 [WARNING][4298] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"75cd7585-3d93-4389-9c8d-3efde0c081a7", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a", Pod:"coredns-76f75df574-cmbtx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali51a93c320a4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:05.970 [INFO][4298] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:05.970 [INFO][4298] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" iface="eth0" netns="" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:05.970 [INFO][4298] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:05.970 [INFO][4298] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.088 [INFO][4304] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.098 [INFO][4304] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.098 [INFO][4304] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.109 [WARNING][4304] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.109 [INFO][4304] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.111 [INFO][4304] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:06.131453 env[1298]: 2024-12-13 15:28:06.120 [INFO][4298] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.140771 env[1298]: time="2024-12-13T15:28:06.132903863Z" level=info msg="TearDown network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" successfully" Dec 13 15:28:06.140771 env[1298]: time="2024-12-13T15:28:06.133006112Z" level=info msg="StopPodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" returns successfully" Dec 13 15:28:06.158979 env[1298]: time="2024-12-13T15:28:06.158922302Z" level=info msg="RemovePodSandbox for \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\"" Dec 13 15:28:06.159205 env[1298]: time="2024-12-13T15:28:06.158988924Z" level=info msg="Forcibly stopping sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\"" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.246 [WARNING][4335] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"75cd7585-3d93-4389-9c8d-3efde0c081a7", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"a4a32d863993084c0e81e1eb1dea7148da2159bb893fa322de6f2f8a3e32693a", Pod:"coredns-76f75df574-cmbtx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali51a93c320a4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.246 [INFO][4335] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.246 [INFO][4335] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" iface="eth0" netns="" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.246 [INFO][4335] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.246 [INFO][4335] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.289 [INFO][4342] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.289 [INFO][4342] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.289 [INFO][4342] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.298 [WARNING][4342] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.298 [INFO][4342] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" HandleID="k8s-pod-network.361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--cmbtx-eth0" Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.303 [INFO][4342] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:06.310008 env[1298]: 2024-12-13 15:28:06.306 [INFO][4335] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8" Dec 13 15:28:06.310008 env[1298]: time="2024-12-13T15:28:06.309542611Z" level=info msg="TearDown network for sandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" successfully" Dec 13 15:28:06.319520 env[1298]: time="2024-12-13T15:28:06.318286553Z" level=info msg="RemovePodSandbox \"361a253281dc96af74d3779f05dc6e268dff48bf0a1d9ab1027571be326c9ba8\" returns successfully" Dec 13 15:28:06.320001 env[1298]: time="2024-12-13T15:28:06.319964166Z" level=info msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" Dec 13 15:28:06.427899 env[1298]: time="2024-12-13T15:28:06.427783783Z" level=info msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.392 [WARNING][4361] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0", GenerateName:"calico-kube-controllers-6bc4c74bf9-", Namespace:"calico-system", SelfLink:"", UID:"4e943bfa-0399-48dd-a990-def40cc80910", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bc4c74bf9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb", Pod:"calico-kube-controllers-6bc4c74bf9-6z4bm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.16.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8f531f0d20a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.392 [INFO][4361] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.392 [INFO][4361] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" iface="eth0" netns="" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.392 [INFO][4361] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.392 [INFO][4361] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.445 [INFO][4368] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.446 [INFO][4368] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.446 [INFO][4368] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.457 [WARNING][4368] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.457 [INFO][4368] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.459 [INFO][4368] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:06.463715 env[1298]: 2024-12-13 15:28:06.461 [INFO][4361] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.465403 env[1298]: time="2024-12-13T15:28:06.464896349Z" level=info msg="TearDown network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" successfully" Dec 13 15:28:06.465403 env[1298]: time="2024-12-13T15:28:06.464964131Z" level=info msg="StopPodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" returns successfully" Dec 13 15:28:06.466970 env[1298]: time="2024-12-13T15:28:06.466806050Z" level=info msg="RemovePodSandbox for \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" Dec 13 15:28:06.467387 env[1298]: time="2024-12-13T15:28:06.467090041Z" level=info msg="Forcibly stopping sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\"" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.557 [INFO][4388] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.557 [INFO][4388] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" iface="eth0" netns="/var/run/netns/cni-4e3afe11-581d-2346-3a59-11eb5ab9749d" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.560 [INFO][4388] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" iface="eth0" netns="/var/run/netns/cni-4e3afe11-581d-2346-3a59-11eb5ab9749d" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.563 [INFO][4388] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" iface="eth0" netns="/var/run/netns/cni-4e3afe11-581d-2346-3a59-11eb5ab9749d" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.563 [INFO][4388] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.563 [INFO][4388] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.665 [INFO][4413] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.667 [INFO][4413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.667 [INFO][4413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.683 [WARNING][4413] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.683 [INFO][4413] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.686 [INFO][4413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:06.692867 env[1298]: 2024-12-13 15:28:06.690 [INFO][4388] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:28:06.702352 env[1298]: time="2024-12-13T15:28:06.697255771Z" level=info msg="TearDown network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" successfully" Dec 13 15:28:06.702352 env[1298]: time="2024-12-13T15:28:06.697329551Z" level=info msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" returns successfully" Dec 13 15:28:06.696984 systemd[1]: run-netns-cni\x2d4e3afe11\x2d581d\x2d2346\x2d3a59\x2d11eb5ab9749d.mount: Deactivated successfully. Dec 13 15:28:06.702986 env[1298]: time="2024-12-13T15:28:06.702415516Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-88j78,Uid:f856e181-45df-4e67-b0d6-0f15ff0043ee,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.617 [WARNING][4408] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0", GenerateName:"calico-kube-controllers-6bc4c74bf9-", Namespace:"calico-system", SelfLink:"", UID:"4e943bfa-0399-48dd-a990-def40cc80910", ResourceVersion:"872", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bc4c74bf9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb", Pod:"calico-kube-controllers-6bc4c74bf9-6z4bm", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.16.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali8f531f0d20a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.618 [INFO][4408] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.618 [INFO][4408] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" iface="eth0" netns="" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.618 [INFO][4408] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.618 [INFO][4408] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.750 [INFO][4418] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.751 [INFO][4418] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.751 [INFO][4418] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.776 [WARNING][4418] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.776 [INFO][4418] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" HandleID="k8s-pod-network.989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--kube--controllers--6bc4c74bf9--6z4bm-eth0" Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.782 [INFO][4418] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:06.789518 env[1298]: 2024-12-13 15:28:06.785 [INFO][4408] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8" Dec 13 15:28:06.791567 env[1298]: time="2024-12-13T15:28:06.791485992Z" level=info msg="TearDown network for sandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" successfully" Dec 13 15:28:06.806867 env[1298]: time="2024-12-13T15:28:06.804444889Z" level=info msg="RemovePodSandbox \"989b8c5bff6308221725e3ac1b594e49aa5d391ed055c5070a67da1b013751e8\" returns successfully" Dec 13 15:28:06.808868 env[1298]: time="2024-12-13T15:28:06.808546400Z" level=info msg="StopPodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\"" Dec 13 15:28:06.834806 kubelet[2251]: I1213 15:28:06.834750 2251 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:28:06.836922 kubelet[2251]: I1213 15:28:06.836873 2251 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:28:06.925716 kubelet[2251]: I1213 15:28:06.925663 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-w69sr" podStartSLOduration=33.818523676 podStartE2EDuration="41.925497636s" podCreationTimestamp="2024-12-13 15:27:25 +0000 UTC" firstStartedPulling="2024-12-13 15:27:57.40801826 +0000 UTC m=+52.311329002" lastFinishedPulling="2024-12-13 15:28:05.514992214 +0000 UTC m=+60.418302962" observedRunningTime="2024-12-13 15:28:06.920198412 +0000 UTC m=+61.823509171" watchObservedRunningTime="2024-12-13 15:28:06.925497636 +0000 UTC m=+61.828808397" Dec 13 15:28:07.096166 systemd-networkd[1083]: cali941b788bb3f: Link UP Dec 13 15:28:07.105160 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:28:07.105269 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali941b788bb3f: link becomes ready Dec 13 15:28:07.105492 systemd-networkd[1083]: cali941b788bb3f: Gained carrier Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:06.868 [INFO][4426] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0 calico-apiserver-79c4b7b9bd- calico-apiserver f856e181-45df-4e67-b0d6-0f15ff0043ee 886 0 2024-12-13 15:27:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79c4b7b9bd projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-nlsfm.gb1.brightbox.com calico-apiserver-79c4b7b9bd-88j78 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali941b788bb3f [] []}} ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:06.868 [INFO][4426] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.032 [INFO][4456] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" HandleID="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.045 [INFO][4456] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" HandleID="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003113c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-nlsfm.gb1.brightbox.com", "pod":"calico-apiserver-79c4b7b9bd-88j78", "timestamp":"2024-12-13 15:28:07.03192039 +0000 UTC"}, Hostname:"srv-nlsfm.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.045 [INFO][4456] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.045 [INFO][4456] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.045 [INFO][4456] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-nlsfm.gb1.brightbox.com' Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.048 [INFO][4456] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.054 [INFO][4456] ipam/ipam.go 372: Looking up existing affinities for host host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.061 [INFO][4456] ipam/ipam.go 489: Trying affinity for 192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.064 [INFO][4456] ipam/ipam.go 155: Attempting to load block cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.067 [INFO][4456] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.128/26 host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.067 [INFO][4456] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.128/26 handle="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.070 [INFO][4456] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9 Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.076 [INFO][4456] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.16.128/26 handle="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.085 [INFO][4456] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.16.134/26] block=192.168.16.128/26 handle="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.085 [INFO][4456] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.134/26] handle="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" host="srv-nlsfm.gb1.brightbox.com" Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.085 [INFO][4456] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:07.157328 env[1298]: 2024-12-13 15:28:07.085 [INFO][4456] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.16.134/26] IPv6=[] ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" HandleID="k8s-pod-network.9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.161409 env[1298]: 2024-12-13 15:28:07.088 [INFO][4426] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"f856e181-45df-4e67-b0d6-0f15ff0043ee", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-79c4b7b9bd-88j78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali941b788bb3f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:07.161409 env[1298]: 2024-12-13 15:28:07.088 [INFO][4426] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.16.134/32] ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.161409 env[1298]: 2024-12-13 15:28:07.089 [INFO][4426] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali941b788bb3f ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.161409 env[1298]: 2024-12-13 15:28:07.108 [INFO][4426] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.161409 env[1298]: 2024-12-13 15:28:07.110 [INFO][4426] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"f856e181-45df-4e67-b0d6-0f15ff0043ee", ResourceVersion:"886", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9", Pod:"calico-apiserver-79c4b7b9bd-88j78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali941b788bb3f", MAC:"4e:ca:99:3a:42:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:07.161409 env[1298]: 2024-12-13 15:28:07.144 [INFO][4426] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9" Namespace="calico-apiserver" Pod="calico-apiserver-79c4b7b9bd-88j78" WorkloadEndpoint="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:28:07.222415 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 15:28:07.222607 kernel: audit: type=1325 audit(1734103687.215:408): table=filter:113 family=2 entries=46 op=nft_register_chain pid=4480 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:28:07.215000 audit[4480]: NETFILTER_CFG table=filter:113 family=2 entries=46 op=nft_register_chain pid=4480 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:28:07.232158 kernel: audit: type=1300 audit(1734103687.215:408): arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffc9ee009c0 a2=0 a3=7ffc9ee009ac items=0 ppid=3529 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:07.215000 audit[4480]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffc9ee009c0 a2=0 a3=7ffc9ee009ac items=0 ppid=3529 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:07.250177 kernel: audit: type=1327 audit(1734103687.215:408): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:28:07.215000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.028 [WARNING][4452] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"10ceaf60-95eb-4d04-90bb-0bed37f49bd8", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5", Pod:"calico-apiserver-79c4b7b9bd-wvsnl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2047db57834", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.029 [INFO][4452] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.029 [INFO][4452] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" iface="eth0" netns="" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.029 [INFO][4452] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.030 [INFO][4452] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.209 [INFO][4464] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.214 [INFO][4464] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.215 [INFO][4464] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.267 [WARNING][4464] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.274 [INFO][4464] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.291 [INFO][4464] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:07.298354 env[1298]: 2024-12-13 15:28:07.296 [INFO][4452] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.299448 env[1298]: time="2024-12-13T15:28:07.299364680Z" level=info msg="TearDown network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" successfully" Dec 13 15:28:07.299613 env[1298]: time="2024-12-13T15:28:07.299580767Z" level=info msg="StopPodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" returns successfully" Dec 13 15:28:07.300457 env[1298]: time="2024-12-13T15:28:07.300427032Z" level=info msg="RemovePodSandbox for \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\"" Dec 13 15:28:07.300655 env[1298]: time="2024-12-13T15:28:07.300603749Z" level=info msg="Forcibly stopping sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\"" Dec 13 15:28:07.347974 env[1298]: time="2024-12-13T15:28:07.339385947Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:28:07.347974 env[1298]: time="2024-12-13T15:28:07.339448571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:28:07.347974 env[1298]: time="2024-12-13T15:28:07.339465009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:28:07.347974 env[1298]: time="2024-12-13T15:28:07.339668621Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9 pid=4505 runtime=io.containerd.runc.v2 Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.552 [WARNING][4520] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"10ceaf60-95eb-4d04-90bb-0bed37f49bd8", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"9ffc8eaa96669d8cd1645839f07d5377a19661b225f05211fd3f6db75b8e8be5", Pod:"calico-apiserver-79c4b7b9bd-wvsnl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2047db57834", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.553 [INFO][4520] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.553 [INFO][4520] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" iface="eth0" netns="" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.553 [INFO][4520] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.553 [INFO][4520] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.616 [INFO][4540] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.616 [INFO][4540] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.616 [INFO][4540] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.629 [WARNING][4540] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.629 [INFO][4540] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" HandleID="k8s-pod-network.4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--wvsnl-eth0" Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.632 [INFO][4540] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:07.639540 env[1298]: 2024-12-13 15:28:07.637 [INFO][4520] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9" Dec 13 15:28:07.641666 env[1298]: time="2024-12-13T15:28:07.640873419Z" level=info msg="TearDown network for sandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" successfully" Dec 13 15:28:07.648625 env[1298]: time="2024-12-13T15:28:07.648570522Z" level=info msg="RemovePodSandbox \"4a59edbcc95137b612bbb7d95c2ade44a0258df44d2b3a29310a22dc05b282a9\" returns successfully" Dec 13 15:28:07.653933 env[1298]: time="2024-12-13T15:28:07.653867294Z" level=info msg="StopPodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\"" Dec 13 15:28:07.690799 env[1298]: time="2024-12-13T15:28:07.690728335Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c4b7b9bd-88j78,Uid:f856e181-45df-4e67-b0d6-0f15ff0043ee,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9\"" Dec 13 15:28:07.697608 systemd[1]: run-containerd-runc-k8s.io-9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9-runc.B3Upys.mount: Deactivated successfully. Dec 13 15:28:07.774144 env[1298]: time="2024-12-13T15:28:07.770438413Z" level=info msg="CreateContainer within sandbox \"9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:28:07.795805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount441794538.mount: Deactivated successfully. Dec 13 15:28:07.809326 env[1298]: time="2024-12-13T15:28:07.809259555Z" level=info msg="CreateContainer within sandbox \"9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f1e93fdabe79f67efffa90dbc1b8affe6704dde02f5bd99e5406107f1f213d6a\"" Dec 13 15:28:07.810757 env[1298]: time="2024-12-13T15:28:07.810694642Z" level=info msg="StartContainer for \"f1e93fdabe79f67efffa90dbc1b8affe6704dde02f5bd99e5406107f1f213d6a\"" Dec 13 15:28:08.045238 env[1298]: time="2024-12-13T15:28:08.045138649Z" level=info msg="StartContainer for \"f1e93fdabe79f67efffa90dbc1b8affe6704dde02f5bd99e5406107f1f213d6a\" returns successfully" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.038 [WARNING][4570] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1d292037-b0b7-47ce-be09-23f232570d7c", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64", Pod:"csi-node-driver-w69sr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.16.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27a8eacee1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.045 [INFO][4570] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.045 [INFO][4570] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" iface="eth0" netns="" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.046 [INFO][4570] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.046 [INFO][4570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.090 [INFO][4606] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.090 [INFO][4606] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.090 [INFO][4606] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.104 [WARNING][4606] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.105 [INFO][4606] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.107 [INFO][4606] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:08.112091 env[1298]: 2024-12-13 15:28:08.110 [INFO][4570] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.114814 env[1298]: time="2024-12-13T15:28:08.112124452Z" level=info msg="TearDown network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" successfully" Dec 13 15:28:08.114814 env[1298]: time="2024-12-13T15:28:08.112168547Z" level=info msg="StopPodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" returns successfully" Dec 13 15:28:08.115357 env[1298]: time="2024-12-13T15:28:08.115322647Z" level=info msg="RemovePodSandbox for \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\"" Dec 13 15:28:08.115490 env[1298]: time="2024-12-13T15:28:08.115366585Z" level=info msg="Forcibly stopping sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\"" Dec 13 15:28:08.244644 systemd-networkd[1083]: cali941b788bb3f: Gained IPv6LL Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.298 [WARNING][4629] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1d292037-b0b7-47ce-be09-23f232570d7c", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"071a1ef665be137cf1cca7cd6197ef6e749dbec619d3b6669586fd655a11cc64", Pod:"csi-node-driver-w69sr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.16.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali27a8eacee1e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.298 [INFO][4629] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.298 [INFO][4629] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" iface="eth0" netns="" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.298 [INFO][4629] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.298 [INFO][4629] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.446 [INFO][4639] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.446 [INFO][4639] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.446 [INFO][4639] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.466 [WARNING][4639] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.466 [INFO][4639] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" HandleID="k8s-pod-network.004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Workload="srv--nlsfm.gb1.brightbox.com-k8s-csi--node--driver--w69sr-eth0" Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.475 [INFO][4639] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:08.484725 env[1298]: 2024-12-13 15:28:08.482 [INFO][4629] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f" Dec 13 15:28:08.485804 env[1298]: time="2024-12-13T15:28:08.484878038Z" level=info msg="TearDown network for sandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" successfully" Dec 13 15:28:08.491404 env[1298]: time="2024-12-13T15:28:08.491366907Z" level=info msg="RemovePodSandbox \"004665af692ac302829538748d83b5b32a0c6f73ef3163cd6d799d4f797f326f\" returns successfully" Dec 13 15:28:08.494033 env[1298]: time="2024-12-13T15:28:08.493992625Z" level=info msg="StopPodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\"" Dec 13 15:28:08.697488 systemd[1]: run-containerd-runc-k8s.io-f1e93fdabe79f67efffa90dbc1b8affe6704dde02f5bd99e5406107f1f213d6a-runc.KWRKeB.mount: Deactivated successfully. Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.647 [WARNING][4657] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4aa72178-d3cd-442a-a144-2b7c73ee25a9", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd", Pod:"coredns-76f75df574-ms5nq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia53697492c7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.648 [INFO][4657] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.648 [INFO][4657] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" iface="eth0" netns="" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.648 [INFO][4657] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.648 [INFO][4657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.795 [INFO][4663] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.801 [INFO][4663] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.802 [INFO][4663] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.820 [WARNING][4663] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.820 [INFO][4663] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.832 [INFO][4663] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:08.837525 env[1298]: 2024-12-13 15:28:08.835 [INFO][4657] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:08.839529 env[1298]: time="2024-12-13T15:28:08.838088377Z" level=info msg="TearDown network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" successfully" Dec 13 15:28:08.839708 env[1298]: time="2024-12-13T15:28:08.839674141Z" level=info msg="StopPodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" returns successfully" Dec 13 15:28:08.842438 env[1298]: time="2024-12-13T15:28:08.842400350Z" level=info msg="RemovePodSandbox for \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\"" Dec 13 15:28:08.842733 env[1298]: time="2024-12-13T15:28:08.842628538Z" level=info msg="Forcibly stopping sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\"" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.035 [WARNING][4683] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4aa72178-d3cd-442a-a144-2b7c73ee25a9", ResourceVersion:"816", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"2c95a640d5ddf9ff3cb0c5fb178170cb38e45abde32e672fe563b5953bddf2fd", Pod:"coredns-76f75df574-ms5nq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.16.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia53697492c7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.035 [INFO][4683] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.035 [INFO][4683] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" iface="eth0" netns="" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.035 [INFO][4683] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.035 [INFO][4683] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.136 [INFO][4689] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.136 [INFO][4689] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.137 [INFO][4689] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.145 [WARNING][4689] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.145 [INFO][4689] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" HandleID="k8s-pod-network.02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Workload="srv--nlsfm.gb1.brightbox.com-k8s-coredns--76f75df574--ms5nq-eth0" Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.150 [INFO][4689] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:28:09.154410 env[1298]: 2024-12-13 15:28:09.152 [INFO][4683] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb" Dec 13 15:28:09.155439 env[1298]: time="2024-12-13T15:28:09.154340364Z" level=info msg="TearDown network for sandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" successfully" Dec 13 15:28:09.161483 env[1298]: time="2024-12-13T15:28:09.161393275Z" level=info msg="RemovePodSandbox \"02530902a1b4d4803dd1b3339e68deb75e769e8bac49ca821128e430c77a58fb\" returns successfully" Dec 13 15:28:09.233000 audit[4696]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:09.246149 kernel: audit: type=1325 audit(1734103689.233:409): table=filter:114 family=2 entries=8 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:09.233000 audit[4696]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd4c8f3540 a2=0 a3=7ffd4c8f352c items=0 ppid=2427 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:09.259154 kernel: audit: type=1300 audit(1734103689.233:409): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd4c8f3540 a2=0 a3=7ffd4c8f352c items=0 ppid=2427 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:09.233000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:09.269122 kernel: audit: type=1327 audit(1734103689.233:409): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:09.305000 audit[4696]: NETFILTER_CFG table=nat:115 family=2 entries=30 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:09.311126 kernel: audit: type=1325 audit(1734103689.305:410): table=nat:115 family=2 entries=30 op=nft_register_rule pid=4696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:09.305000 audit[4696]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd4c8f3540 a2=0 a3=7ffd4c8f352c items=0 ppid=2427 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:09.336127 kernel: audit: type=1300 audit(1734103689.305:410): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd4c8f3540 a2=0 a3=7ffd4c8f352c items=0 ppid=2427 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:09.336244 kernel: audit: type=1327 audit(1734103689.305:410): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:09.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:09.944744 kubelet[2251]: I1213 15:28:09.944673 2251 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:28:10.208678 env[1298]: time="2024-12-13T15:28:10.208449507Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:10.211505 env[1298]: time="2024-12-13T15:28:10.211474437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:10.213809 env[1298]: time="2024-12-13T15:28:10.213743298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:10.216493 env[1298]: time="2024-12-13T15:28:10.216447340Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:28:10.217468 env[1298]: time="2024-12-13T15:28:10.217425042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 15:28:10.316897 env[1298]: time="2024-12-13T15:28:10.316835590Z" level=info msg="CreateContainer within sandbox \"dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 15:28:10.354885 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4115431810.mount: Deactivated successfully. Dec 13 15:28:10.360615 env[1298]: time="2024-12-13T15:28:10.360148340Z" level=info msg="CreateContainer within sandbox \"dfbb6637f9b7059866adc980a95682c2b5933d7e36872f6ffed3ec34b46ed2cb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e8e0db400b65d4c4153b5909a8b385bd07a0db16d2ea6e94752bc3e575f2cb79\"" Dec 13 15:28:10.370847 env[1298]: time="2024-12-13T15:28:10.370801909Z" level=info msg="StartContainer for \"e8e0db400b65d4c4153b5909a8b385bd07a0db16d2ea6e94752bc3e575f2cb79\"" Dec 13 15:28:10.516043 env[1298]: time="2024-12-13T15:28:10.515870418Z" level=info msg="StartContainer for \"e8e0db400b65d4c4153b5909a8b385bd07a0db16d2ea6e94752bc3e575f2cb79\" returns successfully" Dec 13 15:28:10.989089 kubelet[2251]: I1213 15:28:10.989016 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79c4b7b9bd-88j78" podStartSLOduration=45.985081777 podStartE2EDuration="45.985081777s" podCreationTimestamp="2024-12-13 15:27:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:28:08.979883093 +0000 UTC m=+63.883193860" watchObservedRunningTime="2024-12-13 15:28:10.985081777 +0000 UTC m=+65.888392538" Dec 13 15:28:10.989954 kubelet[2251]: I1213 15:28:10.989410 2251 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6bc4c74bf9-6z4bm" podStartSLOduration=39.20641637 podStartE2EDuration="44.989362961s" podCreationTimestamp="2024-12-13 15:27:26 +0000 UTC" firstStartedPulling="2024-12-13 15:28:04.435939878 +0000 UTC m=+59.339250626" lastFinishedPulling="2024-12-13 15:28:10.218886466 +0000 UTC m=+65.122197217" observedRunningTime="2024-12-13 15:28:10.971357341 +0000 UTC m=+65.874668092" watchObservedRunningTime="2024-12-13 15:28:10.989362961 +0000 UTC m=+65.892673715" Dec 13 15:28:24.879773 systemd[1]: Started sshd@9-10.243.81.46:22-139.178.68.195:38338.service. Dec 13 15:28:24.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.243.81.46:22-139.178.68.195:38338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:24.895042 kernel: audit: type=1130 audit(1734103704.882:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.243.81.46:22-139.178.68.195:38338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:25.847000 audit[4768]: USER_ACCT pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.857350 sshd[4768]: Accepted publickey for core from 139.178.68.195 port 38338 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:25.859152 kernel: audit: type=1101 audit(1734103705.847:412): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.863913 sshd[4768]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:25.860000 audit[4768]: CRED_ACQ pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.873160 kernel: audit: type=1103 audit(1734103705.860:413): pid=4768 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.899086 systemd-logind[1282]: New session 10 of user core. Dec 13 15:28:25.900168 systemd[1]: Started session-10.scope. Dec 13 15:28:25.907140 kernel: audit: type=1006 audit(1734103705.860:414): pid=4768 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 15:28:25.860000 audit[4768]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4002ee80 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:25.924243 kernel: audit: type=1300 audit(1734103705.860:414): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4002ee80 a2=3 a3=0 items=0 ppid=1 pid=4768 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:25.860000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:25.938242 kernel: audit: type=1327 audit(1734103705.860:414): proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:25.932000 audit[4768]: USER_START pid=4768 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.948264 kernel: audit: type=1105 audit(1734103705.932:415): pid=4768 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.936000 audit[4771]: CRED_ACQ pid=4771 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:25.964250 kernel: audit: type=1103 audit(1734103705.936:416): pid=4771 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:27.291940 sshd[4768]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:27.293000 audit[4768]: USER_END pid=4768 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:27.296597 systemd[1]: sshd@9-10.243.81.46:22-139.178.68.195:38338.service: Deactivated successfully. Dec 13 15:28:27.297906 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 15:28:27.302171 kernel: audit: type=1106 audit(1734103707.293:417): pid=4768 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:27.293000 audit[4768]: CRED_DISP pid=4768 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:27.308678 systemd-logind[1282]: Session 10 logged out. Waiting for processes to exit. Dec 13 15:28:27.310718 kernel: audit: type=1104 audit(1734103707.293:418): pid=4768 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:27.311143 systemd-logind[1282]: Removed session 10. Dec 13 15:28:27.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.243.81.46:22-139.178.68.195:38338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:31.220812 kubelet[2251]: I1213 15:28:31.217507 2251 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:28:31.354000 audit[4806]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:31.361318 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:28:31.361721 kernel: audit: type=1325 audit(1734103711.354:420): table=filter:116 family=2 entries=8 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:31.354000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff75cbfb90 a2=0 a3=7fff75cbfb7c items=0 ppid=2427 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:31.377147 kernel: audit: type=1300 audit(1734103711.354:420): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff75cbfb90 a2=0 a3=7fff75cbfb7c items=0 ppid=2427 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:31.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:31.370000 audit[4806]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:31.385817 kernel: audit: type=1327 audit(1734103711.354:420): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:31.385935 kernel: audit: type=1325 audit(1734103711.370:421): table=nat:117 family=2 entries=34 op=nft_register_chain pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:28:31.386332 kernel: audit: type=1300 audit(1734103711.370:421): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff75cbfb90 a2=0 a3=7fff75cbfb7c items=0 ppid=2427 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:31.370000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff75cbfb90 a2=0 a3=7fff75cbfb7c items=0 ppid=2427 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:31.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:31.397518 kernel: audit: type=1327 audit(1734103711.370:421): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:28:32.460220 systemd[1]: Started sshd@10-10.243.81.46:22-139.178.68.195:50768.service. Dec 13 15:28:32.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.243.81.46:22-139.178.68.195:50768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:32.468136 kernel: audit: type=1130 audit(1734103712.460:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.243.81.46:22-139.178.68.195:50768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:33.367000 audit[4807]: USER_ACCT pid=4807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:33.372192 sshd[4807]: Accepted publickey for core from 139.178.68.195 port 50768 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:33.379135 kernel: audit: type=1101 audit(1734103713.367:423): pid=4807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:33.381236 sshd[4807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:33.392492 systemd-logind[1282]: New session 11 of user core. Dec 13 15:28:33.394165 systemd[1]: Started session-11.scope. Dec 13 15:28:33.379000 audit[4807]: CRED_ACQ pid=4807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:33.405368 kernel: audit: type=1103 audit(1734103713.379:424): pid=4807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:33.423141 kernel: audit: type=1006 audit(1734103713.379:425): pid=4807 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 15:28:33.379000 audit[4807]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2b47b990 a2=3 a3=0 items=0 ppid=1 pid=4807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:33.379000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:33.410000 audit[4807]: USER_START pid=4807 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:33.412000 audit[4810]: CRED_ACQ pid=4810 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:34.194662 sshd[4807]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:34.195000 audit[4807]: USER_END pid=4807 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:34.195000 audit[4807]: CRED_DISP pid=4807 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:34.198749 systemd[1]: sshd@10-10.243.81.46:22-139.178.68.195:50768.service: Deactivated successfully. Dec 13 15:28:34.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.243.81.46:22-139.178.68.195:50768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:34.200553 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 15:28:34.200583 systemd-logind[1282]: Session 11 logged out. Waiting for processes to exit. Dec 13 15:28:34.202665 systemd-logind[1282]: Removed session 11. Dec 13 15:28:39.343011 systemd[1]: Started sshd@11-10.243.81.46:22-139.178.68.195:40850.service. Dec 13 15:28:39.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.243.81.46:22-139.178.68.195:40850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:39.350733 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 15:28:39.350844 kernel: audit: type=1130 audit(1734103719.342:431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.243.81.46:22-139.178.68.195:40850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:40.399050 sshd[4827]: Accepted publickey for core from 139.178.68.195 port 40850 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:40.397000 audit[4827]: USER_ACCT pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.411152 kernel: audit: type=1101 audit(1734103720.397:432): pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.412000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.415700 sshd[4827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:40.421147 kernel: audit: type=1103 audit(1734103720.412:433): pid=4827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.412000 audit[4827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff416e810 a2=3 a3=0 items=0 ppid=1 pid=4827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:40.435646 kernel: audit: type=1006 audit(1734103720.412:434): pid=4827 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 15:28:40.435769 kernel: audit: type=1300 audit(1734103720.412:434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff416e810 a2=3 a3=0 items=0 ppid=1 pid=4827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:40.412000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:40.446360 kernel: audit: type=1327 audit(1734103720.412:434): proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:40.444537 systemd[1]: Started session-12.scope. Dec 13 15:28:40.444916 systemd-logind[1282]: New session 12 of user core. Dec 13 15:28:40.458000 audit[4827]: USER_START pid=4827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.468756 kernel: audit: type=1105 audit(1734103720.458:435): pid=4827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.468925 kernel: audit: type=1103 audit(1734103720.467:436): pid=4846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:40.467000 audit[4846]: CRED_ACQ pid=4846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:41.153078 sshd[4827]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:41.155000 audit[4827]: USER_END pid=4827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:41.158738 systemd[1]: sshd@11-10.243.81.46:22-139.178.68.195:40850.service: Deactivated successfully. Dec 13 15:28:41.160448 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 15:28:41.164150 kernel: audit: type=1106 audit(1734103721.155:437): pid=4827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:41.165086 systemd-logind[1282]: Session 12 logged out. Waiting for processes to exit. Dec 13 15:28:41.155000 audit[4827]: CRED_DISP pid=4827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:41.172133 kernel: audit: type=1104 audit(1734103721.155:438): pid=4827 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:41.172593 systemd-logind[1282]: Removed session 12. Dec 13 15:28:41.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.243.81.46:22-139.178.68.195:40850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:46.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.243.81.46:22-139.178.68.195:35974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:46.299416 systemd[1]: Started sshd@12-10.243.81.46:22-139.178.68.195:35974.service. Dec 13 15:28:46.301332 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:28:46.301410 kernel: audit: type=1130 audit(1734103726.299:440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.243.81.46:22-139.178.68.195:35974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:47.195613 sshd[4861]: Accepted publickey for core from 139.178.68.195 port 35974 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:47.195000 audit[4861]: USER_ACCT pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.202278 kernel: audit: type=1101 audit(1734103727.195:441): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.202000 audit[4861]: CRED_ACQ pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.211369 sshd[4861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:47.213353 kernel: audit: type=1103 audit(1734103727.202:442): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.213441 kernel: audit: type=1006 audit(1734103727.202:443): pid=4861 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 15:28:47.202000 audit[4861]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36c09ad0 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:47.225750 kernel: audit: type=1300 audit(1734103727.202:443): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36c09ad0 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:47.225914 kernel: audit: type=1327 audit(1734103727.202:443): proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:47.202000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:47.232250 systemd-logind[1282]: New session 13 of user core. Dec 13 15:28:47.233440 systemd[1]: Started session-13.scope. Dec 13 15:28:47.242000 audit[4861]: USER_START pid=4861 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.251205 kernel: audit: type=1105 audit(1734103727.242:444): pid=4861 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.251000 audit[4864]: CRED_ACQ pid=4864 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.260134 kernel: audit: type=1103 audit(1734103727.251:445): pid=4864 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.933247 sshd[4861]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:47.936000 audit[4861]: USER_END pid=4861 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.944139 kernel: audit: type=1106 audit(1734103727.936:446): pid=4861 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.944356 kernel: audit: type=1104 audit(1734103727.937:447): pid=4861 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.937000 audit[4861]: CRED_DISP pid=4861 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:47.950893 systemd[1]: sshd@12-10.243.81.46:22-139.178.68.195:35974.service: Deactivated successfully. Dec 13 15:28:47.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.243.81.46:22-139.178.68.195:35974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:47.955931 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 15:28:47.956596 systemd-logind[1282]: Session 13 logged out. Waiting for processes to exit. Dec 13 15:28:47.958890 systemd-logind[1282]: Removed session 13. Dec 13 15:28:48.081342 systemd[1]: Started sshd@13-10.243.81.46:22-139.178.68.195:35978.service. Dec 13 15:28:48.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.243.81.46:22-139.178.68.195:35978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:48.972000 audit[4877]: USER_ACCT pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:48.973405 sshd[4877]: Accepted publickey for core from 139.178.68.195 port 35978 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:48.973000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:48.975000 audit[4877]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff02cae5a0 a2=3 a3=0 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:48.975000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:48.976128 sshd[4877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:48.984206 systemd-logind[1282]: New session 14 of user core. Dec 13 15:28:48.985228 systemd[1]: Started session-14.scope. Dec 13 15:28:48.992000 audit[4877]: USER_START pid=4877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:48.995000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:49.901228 sshd[4877]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:49.902000 audit[4877]: USER_END pid=4877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:49.902000 audit[4877]: CRED_DISP pid=4877 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:49.905303 systemd[1]: sshd@13-10.243.81.46:22-139.178.68.195:35978.service: Deactivated successfully. Dec 13 15:28:49.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.243.81.46:22-139.178.68.195:35978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:49.906949 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 15:28:49.906977 systemd-logind[1282]: Session 14 logged out. Waiting for processes to exit. Dec 13 15:28:49.908739 systemd-logind[1282]: Removed session 14. Dec 13 15:28:50.045545 systemd[1]: Started sshd@14-10.243.81.46:22-139.178.68.195:35994.service. Dec 13 15:28:50.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.243.81.46:22-139.178.68.195:35994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:50.943000 audit[4889]: USER_ACCT pid=4889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:50.945242 sshd[4889]: Accepted publickey for core from 139.178.68.195 port 35994 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:50.945000 audit[4889]: CRED_ACQ pid=4889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:50.945000 audit[4889]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd722a630 a2=3 a3=0 items=0 ppid=1 pid=4889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:50.945000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:50.947867 sshd[4889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:50.955593 systemd-logind[1282]: New session 15 of user core. Dec 13 15:28:50.956477 systemd[1]: Started session-15.scope. Dec 13 15:28:50.963000 audit[4889]: USER_START pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:50.967000 audit[4892]: CRED_ACQ pid=4892 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:51.681546 sshd[4889]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:51.683000 audit[4889]: USER_END pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:51.686020 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:28:51.686173 kernel: audit: type=1106 audit(1734103731.683:464): pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:51.685000 audit[4889]: CRED_DISP pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:51.700136 kernel: audit: type=1104 audit(1734103731.685:465): pid=4889 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:51.700377 systemd[1]: sshd@14-10.243.81.46:22-139.178.68.195:35994.service: Deactivated successfully. Dec 13 15:28:51.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.243.81.46:22-139.178.68.195:35994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:51.702812 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 15:28:51.703512 systemd-logind[1282]: Session 15 logged out. Waiting for processes to exit. Dec 13 15:28:51.707213 kernel: audit: type=1131 audit(1734103731.699:466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.243.81.46:22-139.178.68.195:35994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:51.705275 systemd-logind[1282]: Removed session 15. Dec 13 15:28:56.829946 systemd[1]: Started sshd@15-10.243.81.46:22-139.178.68.195:54400.service. Dec 13 15:28:56.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.243.81.46:22-139.178.68.195:54400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:56.839115 kernel: audit: type=1130 audit(1734103736.829:467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.243.81.46:22-139.178.68.195:54400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:56.917348 systemd[1]: run-containerd-runc-k8s.io-c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c-runc.Fv4XUf.mount: Deactivated successfully. Dec 13 15:28:57.754000 audit[4908]: USER_ACCT pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.757563 sshd[4908]: Accepted publickey for core from 139.178.68.195 port 54400 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:28:57.763138 kernel: audit: type=1101 audit(1734103737.754:468): pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.763000 audit[4908]: CRED_ACQ pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.766054 sshd[4908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:28:57.775273 kernel: audit: type=1103 audit(1734103737.763:469): pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.775401 kernel: audit: type=1006 audit(1734103737.763:470): pid=4908 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 15:28:57.763000 audit[4908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1e1d3960 a2=3 a3=0 items=0 ppid=1 pid=4908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:57.781928 kernel: audit: type=1300 audit(1734103737.763:470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1e1d3960 a2=3 a3=0 items=0 ppid=1 pid=4908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:28:57.763000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:57.785152 kernel: audit: type=1327 audit(1734103737.763:470): proctitle=737368643A20636F7265205B707269765D Dec 13 15:28:57.789573 systemd[1]: Started session-16.scope. Dec 13 15:28:57.789885 systemd-logind[1282]: New session 16 of user core. Dec 13 15:28:57.798000 audit[4908]: USER_START pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.808138 kernel: audit: type=1105 audit(1734103737.798:471): pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.801000 audit[4931]: CRED_ACQ pid=4931 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:57.815200 kernel: audit: type=1103 audit(1734103737.801:472): pid=4931 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:58.543641 sshd[4908]: pam_unix(sshd:session): session closed for user core Dec 13 15:28:58.545000 audit[4908]: USER_END pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:58.546000 audit[4908]: CRED_DISP pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:58.555497 systemd[1]: sshd@15-10.243.81.46:22-139.178.68.195:54400.service: Deactivated successfully. Dec 13 15:28:58.559228 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 15:28:58.559962 kernel: audit: type=1106 audit(1734103738.545:473): pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:58.560025 kernel: audit: type=1104 audit(1734103738.546:474): pid=4908 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:28:58.561445 systemd-logind[1282]: Session 16 logged out. Waiting for processes to exit. Dec 13 15:28:58.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.243.81.46:22-139.178.68.195:54400 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:28:58.565642 systemd-logind[1282]: Removed session 16. Dec 13 15:29:03.692226 systemd[1]: Started sshd@16-10.243.81.46:22-139.178.68.195:54404.service. Dec 13 15:29:03.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.243.81.46:22-139.178.68.195:54404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:03.696418 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:29:03.696573 kernel: audit: type=1130 audit(1734103743.693:476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.243.81.46:22-139.178.68.195:54404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:04.588000 audit[4940]: USER_ACCT pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.590543 sshd[4940]: Accepted publickey for core from 139.178.68.195 port 54404 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:04.597151 kernel: audit: type=1101 audit(1734103744.588:477): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.596000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.598831 sshd[4940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:04.604184 kernel: audit: type=1103 audit(1734103744.596:478): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.604269 kernel: audit: type=1006 audit(1734103744.597:479): pid=4940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 15:29:04.597000 audit[4940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff80713b70 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:04.597000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:04.619456 kernel: audit: type=1300 audit(1734103744.597:479): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff80713b70 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:04.619558 kernel: audit: type=1327 audit(1734103744.597:479): proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:04.621234 systemd-logind[1282]: New session 17 of user core. Dec 13 15:29:04.621667 systemd[1]: Started session-17.scope. Dec 13 15:29:04.637000 audit[4940]: USER_START pid=4940 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.648104 kernel: audit: type=1105 audit(1734103744.637:480): pid=4940 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.646000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:04.655158 kernel: audit: type=1103 audit(1734103744.646:481): pid=4943 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:05.425527 sshd[4940]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:05.427000 audit[4940]: USER_END pid=4940 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:05.430710 systemd[1]: sshd@16-10.243.81.46:22-139.178.68.195:54404.service: Deactivated successfully. Dec 13 15:29:05.432167 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 15:29:05.433717 systemd-logind[1282]: Session 17 logged out. Waiting for processes to exit. Dec 13 15:29:05.435093 systemd-logind[1282]: Removed session 17. Dec 13 15:29:05.427000 audit[4940]: CRED_DISP pid=4940 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:05.443125 kernel: audit: type=1106 audit(1734103745.427:482): pid=4940 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:05.443345 kernel: audit: type=1104 audit(1734103745.427:483): pid=4940 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:05.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.243.81.46:22-139.178.68.195:54404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:09.175878 env[1298]: time="2024-12-13T15:29:09.174593941Z" level=info msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.555 [WARNING][4968] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"f856e181-45df-4e67-b0d6-0f15ff0043ee", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9", Pod:"calico-apiserver-79c4b7b9bd-88j78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali941b788bb3f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.558 [INFO][4968] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.558 [INFO][4968] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" iface="eth0" netns="" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.558 [INFO][4968] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.558 [INFO][4968] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.852 [INFO][4974] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.854 [INFO][4974] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.854 [INFO][4974] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.869 [WARNING][4974] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.869 [INFO][4974] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.871 [INFO][4974] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:29:09.876227 env[1298]: 2024-12-13 15:29:09.874 [INFO][4968] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.881672 env[1298]: time="2024-12-13T15:29:09.876649300Z" level=info msg="TearDown network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" successfully" Dec 13 15:29:09.881672 env[1298]: time="2024-12-13T15:29:09.876721783Z" level=info msg="StopPodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" returns successfully" Dec 13 15:29:09.883411 env[1298]: time="2024-12-13T15:29:09.883360219Z" level=info msg="RemovePodSandbox for \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" Dec 13 15:29:09.883746 env[1298]: time="2024-12-13T15:29:09.883621282Z" level=info msg="Forcibly stopping sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\"" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.947 [WARNING][4994] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0", GenerateName:"calico-apiserver-79c4b7b9bd-", Namespace:"calico-apiserver", SelfLink:"", UID:"f856e181-45df-4e67-b0d6-0f15ff0043ee", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 27, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c4b7b9bd", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-nlsfm.gb1.brightbox.com", ContainerID:"9878dbdfb5aa3115e35869d3332b15aa8af106163a7807c51b924da48b6e6ef9", Pod:"calico-apiserver-79c4b7b9bd-88j78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali941b788bb3f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.948 [INFO][4994] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.948 [INFO][4994] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" iface="eth0" netns="" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.948 [INFO][4994] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.948 [INFO][4994] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.976 [INFO][5000] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.976 [INFO][5000] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.976 [INFO][5000] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.985 [WARNING][5000] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.985 [INFO][5000] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" HandleID="k8s-pod-network.28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Workload="srv--nlsfm.gb1.brightbox.com-k8s-calico--apiserver--79c4b7b9bd--88j78-eth0" Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.988 [INFO][5000] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:29:09.994447 env[1298]: 2024-12-13 15:29:09.991 [INFO][4994] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6" Dec 13 15:29:09.995754 env[1298]: time="2024-12-13T15:29:09.995545027Z" level=info msg="TearDown network for sandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" successfully" Dec 13 15:29:10.002052 env[1298]: time="2024-12-13T15:29:10.002011606Z" level=info msg="RemovePodSandbox \"28e931606ad0cba7e1a531d645f837548f4393da8fb2ab6250d568885d658ea6\" returns successfully" Dec 13 15:29:10.573563 systemd[1]: Started sshd@17-10.243.81.46:22-139.178.68.195:35986.service. Dec 13 15:29:10.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.243.81.46:22-139.178.68.195:35986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:10.579488 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:29:10.579641 kernel: audit: type=1130 audit(1734103750.576:485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.243.81.46:22-139.178.68.195:35986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:11.533599 sshd[5024]: Accepted publickey for core from 139.178.68.195 port 35986 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:11.532000 audit[5024]: USER_ACCT pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.545128 kernel: audit: type=1101 audit(1734103751.532:486): pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.545248 kernel: audit: type=1103 audit(1734103751.542:487): pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.542000 audit[5024]: CRED_ACQ pid=5024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.566459 sshd[5024]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:11.570159 kernel: audit: type=1006 audit(1734103751.542:488): pid=5024 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 15:29:11.542000 audit[5024]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff75957e00 a2=3 a3=0 items=0 ppid=1 pid=5024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:11.578122 kernel: audit: type=1300 audit(1734103751.542:488): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff75957e00 a2=3 a3=0 items=0 ppid=1 pid=5024 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:11.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:11.584123 kernel: audit: type=1327 audit(1734103751.542:488): proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:11.588277 systemd-logind[1282]: New session 18 of user core. Dec 13 15:29:11.590971 systemd[1]: Started session-18.scope. Dec 13 15:29:11.599000 audit[5024]: USER_START pid=5024 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.608155 kernel: audit: type=1105 audit(1734103751.599:489): pid=5024 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.609000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:11.617123 kernel: audit: type=1103 audit(1734103751.609:490): pid=5027 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:12.380258 sshd[5024]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:12.381000 audit[5024]: USER_END pid=5024 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:12.385449 systemd[1]: sshd@17-10.243.81.46:22-139.178.68.195:35986.service: Deactivated successfully. Dec 13 15:29:12.386923 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 15:29:12.391142 kernel: audit: type=1106 audit(1734103752.381:491): pid=5024 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:12.381000 audit[5024]: CRED_DISP pid=5024 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:12.391477 systemd-logind[1282]: Session 18 logged out. Waiting for processes to exit. Dec 13 15:29:12.399673 kernel: audit: type=1104 audit(1734103752.381:492): pid=5024 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:12.400038 systemd-logind[1282]: Removed session 18. Dec 13 15:29:12.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.243.81.46:22-139.178.68.195:35986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:13.139662 systemd[1]: run-containerd-runc-k8s.io-e8e0db400b65d4c4153b5909a8b385bd07a0db16d2ea6e94752bc3e575f2cb79-runc.jN0SdI.mount: Deactivated successfully. Dec 13 15:29:17.530371 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:29:17.530673 kernel: audit: type=1130 audit(1734103757.524:494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.243.81.46:22-139.178.68.195:47220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:17.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.243.81.46:22-139.178.68.195:47220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:17.525463 systemd[1]: Started sshd@18-10.243.81.46:22-139.178.68.195:47220.service. Dec 13 15:29:18.428000 audit[5061]: USER_ACCT pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.436717 sshd[5061]: Accepted publickey for core from 139.178.68.195 port 47220 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:18.437308 kernel: audit: type=1101 audit(1734103758.428:495): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.444379 kernel: audit: type=1103 audit(1734103758.435:496): pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.435000 audit[5061]: CRED_ACQ pid=5061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.437389 sshd[5061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:18.449132 kernel: audit: type=1006 audit(1734103758.435:497): pid=5061 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 15:29:18.435000 audit[5061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b6cd070 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:18.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:18.459083 kernel: audit: type=1300 audit(1734103758.435:497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7b6cd070 a2=3 a3=0 items=0 ppid=1 pid=5061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:18.459196 kernel: audit: type=1327 audit(1734103758.435:497): proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:18.462227 systemd-logind[1282]: New session 19 of user core. Dec 13 15:29:18.463373 systemd[1]: Started session-19.scope. Dec 13 15:29:18.471000 audit[5061]: USER_START pid=5061 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.481210 kernel: audit: type=1105 audit(1734103758.471:498): pid=5061 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.480000 audit[5066]: CRED_ACQ pid=5066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:18.488181 kernel: audit: type=1103 audit(1734103758.480:499): pid=5066 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:19.194418 sshd[5061]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:19.195000 audit[5061]: USER_END pid=5061 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:19.195000 audit[5061]: CRED_DISP pid=5061 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:19.205538 systemd[1]: sshd@18-10.243.81.46:22-139.178.68.195:47220.service: Deactivated successfully. Dec 13 15:29:19.206826 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 15:29:19.209642 kernel: audit: type=1106 audit(1734103759.195:500): pid=5061 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:19.214783 kernel: audit: type=1104 audit(1734103759.195:501): pid=5061 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:19.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.243.81.46:22-139.178.68.195:47220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:19.211266 systemd-logind[1282]: Session 19 logged out. Waiting for processes to exit. Dec 13 15:29:19.212823 systemd-logind[1282]: Removed session 19. Dec 13 15:29:19.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.243.81.46:22-139.178.68.195:47226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:19.339375 systemd[1]: Started sshd@19-10.243.81.46:22-139.178.68.195:47226.service. Dec 13 15:29:20.229000 audit[5075]: USER_ACCT pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:20.231436 sshd[5075]: Accepted publickey for core from 139.178.68.195 port 47226 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:20.232000 audit[5075]: CRED_ACQ pid=5075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:20.232000 audit[5075]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8f6c96e0 a2=3 a3=0 items=0 ppid=1 pid=5075 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:20.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:20.234248 sshd[5075]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:20.242924 systemd-logind[1282]: New session 20 of user core. Dec 13 15:29:20.244368 systemd[1]: Started session-20.scope. Dec 13 15:29:20.256000 audit[5075]: USER_START pid=5075 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:20.258000 audit[5078]: CRED_ACQ pid=5078 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:21.298516 sshd[5075]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:21.300000 audit[5075]: USER_END pid=5075 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:21.300000 audit[5075]: CRED_DISP pid=5075 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:21.304062 systemd[1]: sshd@19-10.243.81.46:22-139.178.68.195:47226.service: Deactivated successfully. Dec 13 15:29:21.305385 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 15:29:21.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.243.81.46:22-139.178.68.195:47226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.306744 systemd-logind[1282]: Session 20 logged out. Waiting for processes to exit. Dec 13 15:29:21.308478 systemd-logind[1282]: Removed session 20. Dec 13 15:29:21.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.243.81.46:22-139.178.68.195:47242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:21.443067 systemd[1]: Started sshd@20-10.243.81.46:22-139.178.68.195:47242.service. Dec 13 15:29:22.347000 audit[5086]: USER_ACCT pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:22.348851 sshd[5086]: Accepted publickey for core from 139.178.68.195 port 47242 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:22.348000 audit[5086]: CRED_ACQ pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:22.349000 audit[5086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc933c8fb0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:22.349000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:22.351246 sshd[5086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:22.358187 systemd-logind[1282]: New session 21 of user core. Dec 13 15:29:22.359699 systemd[1]: Started session-21.scope. Dec 13 15:29:22.367000 audit[5086]: USER_START pid=5086 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:22.371000 audit[5089]: CRED_ACQ pid=5089 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:25.981000 audit[5099]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:25.992457 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:29:25.993603 kernel: audit: type=1325 audit(1734103765.981:518): table=filter:118 family=2 entries=20 op=nft_register_rule pid=5099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:25.993788 kernel: audit: type=1300 audit(1734103765.981:518): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdb73f3230 a2=0 a3=7ffdb73f321c items=0 ppid=2427 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.981000 audit[5099]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffdb73f3230 a2=0 a3=7ffdb73f321c items=0 ppid=2427 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:25.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:26.001412 kernel: audit: type=1327 audit(1734103765.981:518): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:26.002000 audit[5099]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:26.002000 audit[5099]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb73f3230 a2=0 a3=0 items=0 ppid=2427 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:26.016635 kernel: audit: type=1325 audit(1734103766.002:519): table=nat:119 family=2 entries=22 op=nft_register_rule pid=5099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:26.016739 kernel: audit: type=1300 audit(1734103766.002:519): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdb73f3230 a2=0 a3=0 items=0 ppid=2427 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:26.018411 kernel: audit: type=1327 audit(1734103766.002:519): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:26.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:26.027842 sshd[5086]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:26.039000 audit[5086]: USER_END pid=5086 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:26.048156 kernel: audit: type=1106 audit(1734103766.039:520): pid=5086 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:26.040000 audit[5086]: CRED_DISP pid=5086 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:26.047000 audit[5101]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:26.060845 kernel: audit: type=1104 audit(1734103766.040:521): pid=5086 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:26.060935 kernel: audit: type=1325 audit(1734103766.047:522): table=filter:120 family=2 entries=32 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:26.061002 kernel: audit: type=1300 audit(1734103766.047:522): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe22806ad0 a2=0 a3=7ffe22806abc items=0 ppid=2427 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:26.047000 audit[5101]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe22806ad0 a2=0 a3=7ffe22806abc items=0 ppid=2427 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:26.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:26.059000 audit[5101]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:26.059000 audit[5101]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe22806ad0 a2=0 a3=0 items=0 ppid=2427 pid=5101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:26.059000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:26.076143 systemd[1]: sshd@20-10.243.81.46:22-139.178.68.195:47242.service: Deactivated successfully. Dec 13 15:29:26.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.243.81.46:22-139.178.68.195:47242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:26.079216 systemd-logind[1282]: Session 21 logged out. Waiting for processes to exit. Dec 13 15:29:26.079284 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 15:29:26.084677 systemd-logind[1282]: Removed session 21. Dec 13 15:29:26.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.243.81.46:22-139.178.68.195:47244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:26.136329 systemd[1]: Started sshd@21-10.243.81.46:22-139.178.68.195:47244.service. Dec 13 15:29:26.924738 systemd[1]: run-containerd-runc-k8s.io-c2582cde16a05e140b98831b1c6bc667f4e21fdee0e9f33c3b4e44bf4261a06c-runc.G3RaIp.mount: Deactivated successfully. Dec 13 15:29:27.058000 audit[5104]: USER_ACCT pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:27.059919 sshd[5104]: Accepted publickey for core from 139.178.68.195 port 47244 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:27.060000 audit[5104]: CRED_ACQ pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:27.060000 audit[5104]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffee9854e0 a2=3 a3=0 items=0 ppid=1 pid=5104 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:27.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:27.063583 sshd[5104]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:27.071422 systemd-logind[1282]: New session 22 of user core. Dec 13 15:29:27.072256 systemd[1]: Started session-22.scope. Dec 13 15:29:27.082000 audit[5104]: USER_START pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:27.085000 audit[5126]: CRED_ACQ pid=5126 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:28.608989 sshd[5104]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:28.610000 audit[5104]: USER_END pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:28.612000 audit[5104]: CRED_DISP pid=5104 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:28.615356 systemd[1]: sshd@21-10.243.81.46:22-139.178.68.195:47244.service: Deactivated successfully. Dec 13 15:29:28.616504 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 15:29:28.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.243.81.46:22-139.178.68.195:47244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:28.617940 systemd-logind[1282]: Session 22 logged out. Waiting for processes to exit. Dec 13 15:29:28.619550 systemd-logind[1282]: Removed session 22. Dec 13 15:29:28.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.243.81.46:22-139.178.68.195:58734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:28.755819 systemd[1]: Started sshd@22-10.243.81.46:22-139.178.68.195:58734.service. Dec 13 15:29:29.681000 audit[5143]: USER_ACCT pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:29.683533 sshd[5143]: Accepted publickey for core from 139.178.68.195 port 58734 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:29.683000 audit[5143]: CRED_ACQ pid=5143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:29.683000 audit[5143]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc77fadb70 a2=3 a3=0 items=0 ppid=1 pid=5143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:29.683000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:29.685374 sshd[5143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:29.693437 systemd[1]: Started session-23.scope. Dec 13 15:29:29.694188 systemd-logind[1282]: New session 23 of user core. Dec 13 15:29:29.702000 audit[5143]: USER_START pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:29.705000 audit[5146]: CRED_ACQ pid=5146 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:30.610204 sshd[5143]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:30.613000 audit[5143]: USER_END pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:30.614000 audit[5143]: CRED_DISP pid=5143 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:30.617522 systemd[1]: sshd@22-10.243.81.46:22-139.178.68.195:58734.service: Deactivated successfully. Dec 13 15:29:30.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.243.81.46:22-139.178.68.195:58734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:30.619534 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 15:29:30.620341 systemd-logind[1282]: Session 23 logged out. Waiting for processes to exit. Dec 13 15:29:30.623222 systemd-logind[1282]: Removed session 23. Dec 13 15:29:34.529000 audit[5156]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:34.532089 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 15:29:34.532298 kernel: audit: type=1325 audit(1734103774.529:543): table=filter:122 family=2 entries=20 op=nft_register_rule pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:34.529000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca74d47e0 a2=0 a3=7ffca74d47cc items=0 ppid=2427 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:34.543416 kernel: audit: type=1300 audit(1734103774.529:543): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca74d47e0 a2=0 a3=7ffca74d47cc items=0 ppid=2427 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:34.543873 kernel: audit: type=1327 audit(1734103774.529:543): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:34.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:34.551000 audit[5156]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:34.551000 audit[5156]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffca74d47e0 a2=0 a3=7ffca74d47cc items=0 ppid=2427 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:34.566094 kernel: audit: type=1325 audit(1734103774.551:544): table=nat:123 family=2 entries=106 op=nft_register_chain pid=5156 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:29:34.566534 kernel: audit: type=1300 audit(1734103774.551:544): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffca74d47e0 a2=0 a3=7ffca74d47cc items=0 ppid=2427 pid=5156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:34.551000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:34.571125 kernel: audit: type=1327 audit(1734103774.551:544): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:29:35.759045 systemd[1]: Started sshd@23-10.243.81.46:22-139.178.68.195:58736.service. Dec 13 15:29:35.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.243.81.46:22-139.178.68.195:58736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:35.769612 kernel: audit: type=1130 audit(1734103775.760:545): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.243.81.46:22-139.178.68.195:58736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:36.703000 audit[5169]: USER_ACCT pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:36.705547 sshd[5169]: Accepted publickey for core from 139.178.68.195 port 58736 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:36.712255 kernel: audit: type=1101 audit(1734103776.703:546): pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:36.711000 audit[5169]: CRED_ACQ pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:36.723619 kernel: audit: type=1103 audit(1734103776.711:547): pid=5169 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:36.723756 kernel: audit: type=1006 audit(1734103776.712:548): pid=5169 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 15:29:36.712000 audit[5169]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e3f20f0 a2=3 a3=0 items=0 ppid=1 pid=5169 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:36.712000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:36.727224 sshd[5169]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:36.738496 systemd-logind[1282]: New session 24 of user core. Dec 13 15:29:36.739874 systemd[1]: Started session-24.scope. Dec 13 15:29:36.748000 audit[5169]: USER_START pid=5169 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:36.752000 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:37.618515 sshd[5169]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:37.620000 audit[5169]: USER_END pid=5169 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:37.621000 audit[5169]: CRED_DISP pid=5169 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:37.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.243.81.46:22-139.178.68.195:58736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:37.625167 systemd-logind[1282]: Session 24 logged out. Waiting for processes to exit. Dec 13 15:29:37.625581 systemd[1]: sshd@23-10.243.81.46:22-139.178.68.195:58736.service: Deactivated successfully. Dec 13 15:29:37.628971 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 15:29:37.629727 systemd-logind[1282]: Removed session 24. Dec 13 15:29:42.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.243.81.46:22-139.178.68.195:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:42.770501 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 15:29:42.770669 kernel: audit: type=1130 audit(1734103782.764:554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.243.81.46:22-139.178.68.195:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:42.765321 systemd[1]: Started sshd@24-10.243.81.46:22-139.178.68.195:54752.service. Dec 13 15:29:43.671000 audit[5202]: USER_ACCT pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.673460 sshd[5202]: Accepted publickey for core from 139.178.68.195 port 54752 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:43.680139 kernel: audit: type=1101 audit(1734103783.671:555): pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.680000 audit[5202]: CRED_ACQ pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.682513 sshd[5202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:43.688128 kernel: audit: type=1103 audit(1734103783.680:556): pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.693958 kernel: audit: type=1006 audit(1734103783.680:557): pid=5202 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 15:29:43.694525 kernel: audit: type=1300 audit(1734103783.680:557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe903a9ef0 a2=3 a3=0 items=0 ppid=1 pid=5202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:43.680000 audit[5202]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe903a9ef0 a2=3 a3=0 items=0 ppid=1 pid=5202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:43.680000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:43.702149 kernel: audit: type=1327 audit(1734103783.680:557): proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:43.708205 systemd-logind[1282]: New session 25 of user core. Dec 13 15:29:43.708898 systemd[1]: Started session-25.scope. Dec 13 15:29:43.715000 audit[5202]: USER_START pid=5202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.724295 kernel: audit: type=1105 audit(1734103783.715:558): pid=5202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.715000 audit[5205]: CRED_ACQ pid=5205 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:43.745141 kernel: audit: type=1103 audit(1734103783.715:559): pid=5205 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:44.475432 sshd[5202]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:44.475000 audit[5202]: USER_END pid=5202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:44.499155 kernel: audit: type=1106 audit(1734103784.475:560): pid=5202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:44.476000 audit[5202]: CRED_DISP pid=5202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:44.502384 systemd[1]: sshd@24-10.243.81.46:22-139.178.68.195:54752.service: Deactivated successfully. Dec 13 15:29:44.505047 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 15:29:44.506143 kernel: audit: type=1104 audit(1734103784.476:561): pid=5202 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:44.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.243.81.46:22-139.178.68.195:54752 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:44.509394 systemd-logind[1282]: Session 25 logged out. Waiting for processes to exit. Dec 13 15:29:44.512241 systemd-logind[1282]: Removed session 25. Dec 13 15:29:49.623024 systemd[1]: Started sshd@25-10.243.81.46:22-139.178.68.195:42336.service. Dec 13 15:29:49.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.243.81.46:22-139.178.68.195:42336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:49.627640 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:29:49.628130 kernel: audit: type=1130 audit(1734103789.623:563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.243.81.46:22-139.178.68.195:42336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:50.517000 audit[5218]: USER_ACCT pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.518509 sshd[5218]: Accepted publickey for core from 139.178.68.195 port 42336 ssh2: RSA SHA256:BRWuvX4vngANWcecei9LW91Zd3OWx+vtbErQ53ehsZc Dec 13 15:29:50.525139 kernel: audit: type=1101 audit(1734103790.517:564): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.527043 sshd[5218]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:29:50.525000 audit[5218]: CRED_ACQ pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.536149 kernel: audit: type=1103 audit(1734103790.525:565): pid=5218 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.541131 kernel: audit: type=1006 audit(1734103790.525:566): pid=5218 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 15:29:50.525000 audit[5218]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda3e62190 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:50.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:50.550237 kernel: audit: type=1300 audit(1734103790.525:566): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda3e62190 a2=3 a3=0 items=0 ppid=1 pid=5218 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:29:50.550308 kernel: audit: type=1327 audit(1734103790.525:566): proctitle=737368643A20636F7265205B707269765D Dec 13 15:29:50.553910 systemd-logind[1282]: New session 26 of user core. Dec 13 15:29:50.555232 systemd[1]: Started session-26.scope. Dec 13 15:29:50.564000 audit[5218]: USER_START pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.574775 kernel: audit: type=1105 audit(1734103790.564:567): pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.581306 kernel: audit: type=1103 audit(1734103790.573:568): pid=5221 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:50.573000 audit[5221]: CRED_ACQ pid=5221 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:51.251549 sshd[5218]: pam_unix(sshd:session): session closed for user core Dec 13 15:29:51.262510 kernel: audit: type=1106 audit(1734103791.253:569): pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:51.253000 audit[5218]: USER_END pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:51.262243 systemd[1]: sshd@25-10.243.81.46:22-139.178.68.195:42336.service: Deactivated successfully. Dec 13 15:29:51.263455 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 15:29:51.264401 systemd-logind[1282]: Session 26 logged out. Waiting for processes to exit. Dec 13 15:29:51.253000 audit[5218]: CRED_DISP pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:51.271523 kernel: audit: type=1104 audit(1734103791.253:570): pid=5218 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Dec 13 15:29:51.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.243.81.46:22-139.178.68.195:42336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:29:51.272615 systemd-logind[1282]: Removed session 26.